Developers and HIPAA

Cloud Security

What are the suggested encryption protocols that one should implement in order to fulfill the 164.312(a)(2)(iv)

 

Have you implemented a mechanism to encrypt and decrypt EPHI?

Tags (If you have a multi-word tag, add a hyphen (-) between the words.)

Voting

5 votes
5 up votes
0 down votes
Answered Questions
Question No. 21