Site Overlay



The Security Rule

Covered entities must implement appropriate administrative, physical and technical measures to:
  • Ensure the confidentiality, integrity, and availability of all e-PHI they create, receive, maintain or transmit.
  • Identify and protect against reasonably anticipated security threats.



    1. Build and Maintain a Secure Network and Systems
    2. Protect Cardholder Data
    3. Maintain a Vulnerability Management Program
    4. Implement Strong Access Control Measures
    5. Regularly Monitor and Test Networks
    6. Maintain an Information Security Policy


    K-12 Family Educational Rights and Privacy Act

    Back Title

    This is back side content.

    Exploited-Missing person investigations

    sex trafficking

    missing persons


    DATA breaches

    Data Loss Protection Solutions