Health IT and Electronic Health
Activate your FREE membership today
|
Log-in
Site FAQ
Home
>
IT Answers
>
Health care reform and federal initiatives
> HITECH security breach reporting requirements
BillyShakes
20 pts.
HITECH security breach reporting requirements
breaches
,
HITECH Act
Is the HITECH act's breach reporting requirement (based on the size of the breach) appropriate? Is it too strict or not strict enough?
ASKED:
December 14, 2012 7:51 PM
Discuss
 
Add to Watchlist
RELATED QUESTIONS
Windows 10 updates keep failing
Changing the default DTD
Trouble Editing Data on iSeries from Web Application
Who nurtures the leads?
How Google keywords affect SEO
Answer Wiki:
Last Wiki Answer Submitted:
Be the first to answer this question.
All Answer Wiki Contributors:
Be the first to answer this question.
adelvecchio
1,115 pts.
To see all answers submitted to the Answer Wiki:
View Answer History
.
Please complete the following information:
REGISTER / LOG-IN TO ANSWER QUESTION
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Submit your e-mail address below to continue
E-mail: 
E-mail:
User Name:
Password:
Forgot Password?
Create User Name:
Your user name identifies you in IT Answers. Max 30 char.
Create Password:
Confirm Password:
Describe Company:
Select your organization's type...
Hospital/Medical Center/Multi-Hospital System/IDN
Ambulatory Care/Outpatient Center/Group Physician Practice
Ancillary Clinical Service Provider
Payer/Insurance Company/Managed Care Organization
Pharmaceutical/Biotechnology/Biomedical Company
Federal/State/Municipal Health Agency
Vendor
Other
How many beds:
Select your organization's bed count...
1 to 99
100 to 249
250 to 499
500+
Yes, I'd like to receive the Health IT Exchange Community Newsletter
Yes, I agree to the
Terms and Conditions.
If you live outside the United States, by submitting your email address you consent to having your personal data transferred to and processed in the United States.
hidden modal window
RSS - Discussions
Help
Discuss This Question:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
Please complete the following information:
REGISTER / LOG-IN TO DISCUSS
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Submit your e-mail address below to continue
E-mail: 
E-mail:
User Name:
Password:
Forgot Password?
Create User Name:
Your user name identifies you in IT Answers. Max 30 char.
Create Password:
Confirm Password:
Describe Company:
Select your organization's type...
Hospital/Medical Center/Multi-Hospital System/IDN
Ambulatory Care/Outpatient Center/Group Physician Practice
Ancillary Clinical Service Provider
Payer/Insurance Company/Managed Care Organization
Pharmaceutical/Biotechnology/Biomedical Company
Federal/State/Municipal Health Agency
Vendor
Other
How many beds:
Select your organization's bed count...
1 to 99
100 to 249
250 to 499
500+
Yes, I'd like to receive the Health IT Exchange Community Newsletter
Yes, I agree to the
Terms and Conditions.
If you live outside the United States, by submitting your email address you consent to having your personal data transferred to and processed in the United States.
hidden modal window
Ask a Question
Question Title:
(150 char. limit.)
Question:
(Please be specific.)
Tags:
(Separate with commas.)
What is a Tag?
Browse by Topic
Clinical IT, CDS and data analytics
Coding and documentation
Data management and data standards
Devices
Disaster recovery and business continuity
EHR systems
Hardware and software
Health care applications and vendor organizations
Health care models and frameworks
Health care reform and federal initiatives
Industry leaders
Industry organizations, associations and events
Interoperability and health information exchange
IT funding
Meaningful use
Mobile devices and telehealth
Networking
PHRs and patient engagement
Practice and care management
Privacy and security
Regional health networks and management
Regulations
Regulatory compliance
Staffing
Storage and PACS
Virtualization and cloud computing
>>
VIEW ALL TAGS
Forgot Password
No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.
E-mail:
Submit
Your password has been sent to:
cguarrera@techtarget.com