X hits on this document

93 views

0 shares

0 downloads

0 comments

24 / 42

TECHNICAL SECURITY SERVICES (CONT.)

AUTHORIZATION CONTROL

Mechanism to obtain consent to use and disclose health information through implementation of role or user based access

DATA AUTHENTICIATION

Verification that data has not been altered or destroyed

Implementation includes check digits, double keying, digital signature

Document info
Document views93
Page views93
Page last viewedMon Dec 05 08:28:42 UTC 2016
Pages42
Paragraphs423
Words1566

Comments