The HIPAA Security Rule focuses on safeguarding electronic protected health information (ePHI) held or maintained by regulated entities. The ePHI that a regulated entity creates, receives, maintains, or transmits must be protected against reasonably anticipated threats, hazards, and impermissible uses and/or disclosures. This publication provides practical guidance and resources that can be used by regulated entities of all sizes to safeguard ePHI and better understand the security concepts discussed in the HIPAA Security Rule.
Three years after entering a 10-year partnership with Google, Mayo Clinic is "hoping to gather the medical records of everybody in the world."
Written by HITRUST Independent Security Journalist Sean Martin. Given the complex regulatory and standards environment – albeit, designed to raise the level of an organization’s security posture – many organizations... Read more »
Formerly IBM FHIR Server
https://www.ibm.com/products/fhir-server
IBM FHIR Server is capable of processing, validating, and storing healthcare data in an industry-standard format that can be used for running search and other reporting capabilities.
[dead page -- see:]
https://web.archive.org/web/https://ibm.github.io/FHIR/announcement/
[IBM spun off their healthcare division as Merative]
https://www.ibm.com/watson-health/merative-divestiture