This report from JD Supra looks at the HIPAA Security Rule and breaks it down to help organizations tailor policies to best fit their business while still remaining in compliance.
Understanding the HIPAA Security Rule and Tailoring Policies to Fit Your Business

CIPM, CIPP/A, CIPP/C, CIPP/E, CIPP/G, CIPP/US, CIPT
Credits: 2
Related Stories
Health Insurance Portability and Accountability Act
This topic page contains a curation of the IAPP's coverage, analysis and relevant resources covering the Health Insurance Portability and Accountability Act (HIPAA)....
HIPAA Policy and Procedure Manual
These documents are a model HIPAA Policy and Procedure Manual, published by the Long Term Care Consortium (LTCC).
Click to View...
Guidance on HIPAA and Individual Authorization of Uses and Disclosures of Protected Health Information for Research
The Office for Civil Rights of the U.S. Department of Health and Human Services has released this guidance for researchers, including information on the 21st Century Cures Act of 2016 mandate and guidance on sufficient descriptions of purpose of a use and authorizations for future use, revocation of...
HIPAA Privacy and Security for Beginners
This article by Kirk Nahra, CIPP/US, of Wiley Rein offers an overview of the Health Insurance Portability and Accountability Act from its inception. The article outlines the goals of the law, highlighting the principles found in the HIPAA privacy and security rules.
Click to View...
Sample HIPAA Privacy & Security Plan
This document is a sample HIPAA Privacy and Security plan, published by Axis Community Health, displaying examples of privacy policies, protocols and HIPAA compliance.
Click to View (PDF)...