X hits on this document

137 views

0 shares

0 downloads

0 comments

24 / 42

TECHNICAL SECURITY SERVICES (CONT.)

AUTHORIZATION CONTROL

Mechanism to obtain consent to use and disclose health information through implementation of role or user based access

DATA AUTHENTICIATION

Verification that data has not been altered or destroyed

Implementation includes check digits, double keying, digital signature

Document info
Document views137
Page views137
Page last viewedWed Jan 18 20:46:39 UTC 2017
Pages42
Paragraphs423
Words1566

Comments