John Moehrke*

In this chapter, you will learn how to

• Explain the relationship between identity, access control, authorization, authentication, and role assignment

• Identify and explain access control to data from the perspective of patient, user, and resource, as well as in the context of information use

• Identify and explain how to apply security concepts to a healthcare information exchange (HIE)

This chapter describes how to control access to healthcare information. This includes the typical rules of any business that provides specific types of data to specific types of people while forbidding access to those who don’t have a need for access. Access control is an important part of any system that holds information. Even systems that simply ...

Get Healthcare Information Technology Exam Guide for CompTIA Healthcare IT Technician and HIT Pro Certifications now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.