Skip to main content

HIPAA Security Rule and Cybersecurity Operations

  • Chapter
  • First Online:
Designing a HIPAA-Compliant Security Operations Center

Abstract

Before jumping into specific safeguards of HIPAA and how security operations center (SOC) activities relate, some background may help put things in perspective. The Health Insurance Portability and Accountability Act (HIPAA) was enacted on August 21, 1996. HIPAA focused on health coverage during gaps when workers change jobs to another. The act provided early incentives for entities to adopt digital records. The Security Rule was implemented on April 21, 2005, focusing on electronic Protected Health Information (ePHI) stored digitally. Enforcement of HIPAA was granted to the Department of Health and Human Services (HHS) on March 16, 2006, under the Enforcement Rule. HHS had the authority to investigate complaints and levy fines for privacy violations. The Health Information Technology for Economic and Clinical Act (HITECH) of 2009 incentivized healthcare organizations for adopting digital medical records. These incentives were part of a program termed Meaningful Use. Finally, in 2013 the Final Omnibus Rule went into effect. It was at this point when news of proactive audit programs surfaced, more news about investigations by HHS after breaches and fines became mainstream news.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    www.hipaajournal.com/hipaa-history/

  2. 2.

    www.hhs.gov/sites/default/files/ocr/privacy/hipaa/administrative/combined/hipaa-simplification-201303.pdf

  3. 3.

    Thompson, Eric

  4. 4.

    Cite HHS documents stating this

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Eric C. Thompson

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Thompson, E.C. (2020). HIPAA Security Rule and Cybersecurity Operations. In: Designing a HIPAA-Compliant Security Operations Center. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-5608-4_2

Download citation

Publish with us

Policies and ethics