Health Information Technology for Economic and Clinical Health Act (HITECH)

Health Information Technology for Economic and Clinical Health Act (HITECH)

The Enacted as part of the American Recovery and Reinvestment Act of 2009, the HITECH Act, among other objectives, further addresses privacy and security issues involving PHI as defined by HIPAA. The HITECH privacy provisions include the introduction of categories of violations based on culpability that, in turn, are tied to tiered ranges of civil monetary penalties. Its most noteworthy elements elaborate upon breach notifications resulting from the use or disclosure of information that compromises its security or privacy.


    • Related Articles

    • Protected Health Information (PHI)

      Any individually identifiable health information transmitted or maintained in any form or medium that is held by a covered entity or its business associate; identifies the individual or offers a reasonable basis for identification; is created or ...
    • Health Insurance Portability and Accountability Act (HIPAA)

      A U.S. law passed to create national standards for electronic healthcare transactions, among other purposes. HIPAA required the U.S. Department of Health and Human Services to promulgate regulations to protect the privacy and security of personal ...
    • Personal Information

      The information about an individual that can directly or indirectly distinguish or trace an individual’s identity, associate or link an individual to private information, distinguish one person from another, or could be used to re-identify anonymous ...
    • Customer Information

      (US) In contrast to employee information, customer information includes data relating to the customers or clients of private sector organizations, patients within the healthcare sector and the general public within the context of public-sector ...
    • Information Security

      The protection of information for the purposes of preventing loss, unauthorized access and/or misuse. It is also the process of assessing threats and risks to information and the procedures and controls to preserve confidentiality, integrity and ...