The IT Law Wiki
Edit Page
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 17: Line 17:
 
A '''breach''' is the
 
A '''breach''' is the
   
βˆ’
{{Quote|[[unauthorized]] acquisition, [[access]], use, or [[disclosure]] of [[protected health information]] which [[compromise]]s the [[security]] or [[privacy]] of such [[information]], except where an [[unauthorized]] person to whom such [[information]] is [[disclose]]d would not reasonably have been able to retain such [[information]].<ref>Pub. L. No. 111-5, Β§13400(1). Not included in the definition of breach are any [[unintentional]] acquisition, use, or [[access]] of [[PHI]] by an [[employee]] or other [[authorized]] individual of a [[covered entity]] or a business associate done in [[good faith]] and within the scope of [[employment]] or the relationship where such [[information]] is not breached any further; or [[inadvertent disclosure]]s by authorized persons of [[PHI]] within the same facility; and [[information]] received as a result of such [[disclosure]] is not further [[disclose]]d without [[authorization]].</ref>}}
+
{{Quote|unauthorized acquisition, access, use, or disclosure of protected health information which compromises the security or privacy of such information, except where an unauthorized person to whom such information is disclosed would not reasonably have been able to retain such information.<ref>Pub. L. No. 111-5, Β§13400(1). Not included in the definition of breach are any [[unintentional]] acquisition, use, or [[access]] of [[PHI]] by an [[employee]] or other [[authorized]] individual of a [[covered entity]] or a business associate done in [[good faith]] and within the scope of [[employment]] or the relationship where such [[information]] is not breached any further; or [[inadvertent disclosure]]s by authorized persons of [[PHI]] within the same facility; and [[information]] received as a result of such [[disclosure]] is not further [[disclose]]d without [[authorization]].</ref>}}
   
 
=== Privacy law ===
 
=== Privacy law ===
Please note that all contributions to the The IT Law Wiki are considered to be released under the CC-BY-SA
Cancel Editing help (opens in new window)

Template used on this page: