0
Skip to Content
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Rules
Licensing
Account
Folder: Libaries
Back
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
164.312(e)(2)(i): Integrity Controls
Audit, Authenticate, Integrity, Logs, Workforce Jeremy Pickett 11/18/24 Audit, Authenticate, Integrity, Logs, Workforce Jeremy Pickett 11/18/24

164.312(e)(2)(i): Integrity Controls

Implement security measures to ensure that electronically transmitted ePHI is not improperly modified without detection until disposed of.

Read More
164.312(e)(1): Transmission Security
Audit, Authenticate, Integrity, Logs, Workforce, In Transit, In Motion Jeremy Pickett 11/15/24 Audit, Authenticate, Integrity, Logs, Workforce, In Transit, In Motion Jeremy Pickett 11/15/24

164.312(e)(1): Transmission Security

Implement technical security measures to guard against unauthorized access to ePHI that is being transmitted over an electronic communications network.

Read More
164.312(d): Person or Entity Authentication
Audit, Authenticate, Integrity, Logs, Workforce Jeremy Pickett 11/14/24 Audit, Authenticate, Integrity, Logs, Workforce Jeremy Pickett 11/14/24

164.312(d): Person or Entity Authentication

Implement procedures to verify that a person or entity seeking access to ePHI is the one claimed.

Read More
164.312(c)(2): Mechanism to Authenticate ePHI
Audit, Authenticate, Integrity, Logs Jeremy Pickett 11/13/24 Audit, Authenticate, Integrity, Logs Jeremy Pickett 11/13/24

164.312(c)(2): Mechanism to Authenticate ePHI

Implement electronic mechanisms to corroborate that ePHI has not been altered or destroyed in an unauthorized manner.

Read More

Contact: jeremy@japhontech.com : : japhontech, LLC