Problem
I. Access the Privacy Rule requirements in the Federal Register 45 CFR Parts 160, 162, and 164. Review one or more of the parts and develop a list of policies that would need to be written to address all that is required. Submit a list of the policy names and what it is to cover.
II. Access the one website for advice on managing cybersecurity for a healthcare provider. Review the suggestions in the documents or other sources of your choice, and provide a paper detailing the top three actions a healthcare provider needs to make to protect the EHR from an unauthorized breach.