0 valutazioniIl 0% ha trovato utile questo documento (0 voti)
17 visualizzazioni1 pagina
This document discusses an organization that develops standards related to healthcare information architecture, content, storage, security, confidentiality, and communication. The organization aims to ensure healthcare information passes seamlessly between applications, systems, and settings across the entire healthcare enterprise through integration profiles. It also promotes individuals' right to privacy and protects confidential information to the fullest extent permitted by law.
This document discusses an organization that develops standards related to healthcare information architecture, content, storage, security, confidentiality, and communication. The organization aims to ensure healthcare information passes seamlessly between applications, systems, and settings across the entire healthcare enterprise through integration profiles. It also promotes individuals' right to privacy and protects confidential information to the fullest extent permitted by law.
This document discusses an organization that develops standards related to healthcare information architecture, content, storage, security, confidentiality, and communication. The organization aims to ensure healthcare information passes seamlessly between applications, systems, and settings across the entire healthcare enterprise through integration profiles. It also promotes individuals' right to privacy and protects confidential information to the fullest extent permitted by law.
storage, security, confidentiality, functionality, and communication of information used within healthcare and healthcare decision making, including patient-specific information and knowledge. develop integration profiles to assure that health information seamlessly is passing from application to application, system to system, and setting to setting across the entire healthcare enterprise. promoting the right of privacy for all individuals and protecting the maintenance of confidential information to the fullest extent permitted by law
Aims to ensure information security and confidentiality "ensuring that information is accessible only to those authorized to have access"