{"id":63,"date":"2020-02-21T13:06:25","date_gmt":"2020-02-21T18:06:25","guid":{"rendered":"http:\/\/apexcompliance.net\/blog\/target\/the-hipaa-security-rule-and-vulnerability-scans\/"},"modified":"2020-03-21T10:08:33","modified_gmt":"2020-03-21T14:08:33","slug":"the-hipaa-security-rule-and-vulnerability-scans","status":"publish","type":"post","link":"https:\/\/apexcompliance.net\/blog\/2020\/02\/21\/the-hipaa-security-rule-and-vulnerability-scans\/","title":{"rendered":"The HIPAA Security Rule and Vulnerability Scans"},"content":{"rendered":"

Under the HIPAA Security Rule, covered entities must implement safeguards to protect the confidentiality, integrity, and availability of electronic protected health information (ePHI). ePHI is any protected health information that is created, stored, transmitted, or received in any electronic format. To this end, the HIPAA Security Rule requires covered entities to perform a security risk analysis (also known as security risk assessment), which the Security Rule defines as an \u201caccurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information held by the covered entity or business associate.\u201d Scans known as vulnerability scans may be performed to identify known vulnerabilities in applications, networks, and firewalls.<\/p>\n

Vulnerabilities are weaknesses which, if triggered or exploited by a threat, create a risk of improper access to or disclosure of ePHI. Vulnerability scans are scans designed to identify vulnerabilities, or weaknesses, that have the potential to cause a security incident.<\/p>\n

[…]<\/strong><\/p>\n

This is an excerpt of a previously published article.<\/strong><\/em><\/p>\n

 <\/p><\/blockquote>\n

Click here to view original web page at www.jdsupra.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"

Under the HIPAA Security Rule, covered entities must implement safeguards to protect the confidentiality, integrity, and availability of electronic protected health information (ePHI). ePHI is any protected health information that is created, stored, transmitted, or received in any electronic format. To this end, the HIPAA Security Rule requires covered entities to perform a security risk analysis (also known as security risk assessment), which the Security Rule defines as an \u201caccurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information held by the covered entity or business associate.\u201d… Read More <\/a><\/p>","protected":false},"author":1,"featured_media":156,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,46,15],"tags":[17,42,16],"_links":{"self":[{"href":"https:\/\/apexcompliance.net\/wp-json\/wp\/v2\/posts\/63"}],"collection":[{"href":"https:\/\/apexcompliance.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/apexcompliance.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/apexcompliance.net\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/apexcompliance.net\/wp-json\/wp\/v2\/comments?post=63"}],"version-history":[{"count":0,"href":"https:\/\/apexcompliance.net\/wp-json\/wp\/v2\/posts\/63\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/apexcompliance.net\/wp-json\/wp\/v2\/media\/156"}],"wp:attachment":[{"href":"https:\/\/apexcompliance.net\/wp-json\/wp\/v2\/media?parent=63"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/apexcompliance.net\/wp-json\/wp\/v2\/categories?post=63"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/apexcompliance.net\/wp-json\/wp\/v2\/tags?post=63"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}