• Home
  • Blog
  • Contact
HIPAA ComplianceHIPAA Compliance
HIPAA ComplianceHIPAA Compliance
  • Home
  • Blog
  • Contact

Exploring HIPAA and HITECH Act Definitions: Part 3

October 29, 2009 5010 No Comments

From now through November, HIPAA.com is providing a run through of HIPAA transaction & code set, privacy, and security definitions, along with relevant HITECH Act definitions pertaining to breach notification and securing of protected health information. These definitions are key to understanding the referenced HIPAA and HITECH Act enabling regulations that are effective now and that will require compliance by covered entities and business associates now or in the months ahead, as indicated in HIPAA.com’s timeline. Each posting will contain three definitions, with a date reference to the Federal Register and citation to the Code of Federal Regulations (CFR). We begin the first series of postings with definitions from “Health Insurance Reform; Modifications to the Health Insurance Portability and Accountability Act (HIPAA); Final Rules,” Federal Register,  January 16, 2009. 45 CFR 162, Administrative Requirements:  162.103, Definitions.

Descriptor

The text defining a code.

Designated Standard Maintenance Organization (DSMO)

An organization designated by the Secretary [of HHS] under 45 CFR 162.910(a).

Direct Data Entry

The direct entry of data (for example, using dumb terminals or web browsers) that is immediately transmitted into a health plan’s computer.


Tags: Administrative RequirementsBreach Notificationbusiness associatesCFRCode of Federal Regulationscompliancecovered entitiesdefinitiondescriptordesignated standard maintenance organizationdirect data entryDSMOeffectiveenabling regulationsFederal RegisterHealth Insurance ReformHIPAAHITECH ActPrivacysecuring of protected health informationSecuritytimelinetransaction & code set
No Comments
Share
0

You also might be interested in

Three Key Properties of HIPAA Privacy and Security of Protected Health Information

Sep 11, 2009

HIPAA.com has received from its readers requests for information on[...]

Security Incident Procedures: What This HIPAA Security Rule Administrative Safeguard Standard Means

Mar 2, 2009

This is the sixth Administrative Safeguard Standard of the HIPAA[...]

Red Flags Rules Compliance Countdown: 1 day

Apr 30, 2009

The Federal Trade Commission’s (FTC’s) red flags rules for financial[...]

Leave a Reply Cancel Reply

Categories

  • 5010
  • American Recovery and Reinvestment Act
  • Enforcement
  • GINA
  • Health Care Reform
  • Health IT and HITECH
  • HIPAA Law
  • Identifiers
  • Meaningful Use
  • Privacy
  • Red Flags Rules
  • Security
  • Transactions & Code Sets
  • Uncategorized

Recent Posts

  • Contracting with Vendors that are NOT HIPAA Business Associates: Best Practices
  • HIPAA Breach: Who You Gonna Call?
  • Can I Be Sued for a HIPAA Violation?
  • Business Associate Agreements – a First Look at Indemnification
  • Gmail, Google Apps for Business HIPAA Business Associate Agreements

Archives

Contact Us

We're currently offline. Send us an email and we'll get back to you, asap.

Send Message
HIPAA- Health Insurance Portability Accountability Act

© 2023 · hipaa.com

Prev Next