What is PHI breach (protected health information breach)?

<p>A PHI breach is unauthorized access, use or disclosure of individually identifiable health information that is held or transmitted by a healthcare organization or its business associates. In the U.S., personal health information (<a href=”https://www.techtarget.com/searchhealthit/definition/personal-health-information”>PHI</a>) — whether in electronic, paper or oral form — is protected by the <a href=”https://www.techtarget.com/searchhealthit/definition/HITECH-Act”>Health Information Technology for Economic and Clinical Health</a> and the Health Insurance Portability and Accountability Act (<a href=”https://www.techtarget.com/searchhealthit/definition/HIPAA”>HIPAA</a>).</p>
<div class=”ad-wrapper ad-embedded”>
<div id=”halfpage” class=”ad ad-hp”>
<script>GPT.display(‘halfpage’)</script>
</div>
<div id=”mu-1″ class=”ad ad-mu”>
<script>GPT.display(‘mu-1’)</script>
</div>
</div>
<div class=”youtube-iframe-container”>
<iframe id=”ytplayer-0″ src=”https://www.youtube.com/embed/oZF-OUPMLRI?autoplay=0&amp;modestbranding=1&amp;rel=0&amp;widget_referrer=null&amp;enablejsapi=1&amp;origin=https://www.techtarget.com” type=”text/html” height=”360″ width=”640″ frameborder=”0″></iframe>
</div>
<section class=”section main-article-chapter” data-menu-title=”Why is the healthcare sector vulnerable to data breaches?”>
<h2 class=”section-title”><i class=”icon” data-icon=”1″></i>Why is the healthcare sector vulnerable to data breaches?</h2>
<p>In recent years, healthcare organizations in general, and PHI in particular, have become popular targets for criminal, financially motivated <a href=”https://www.techtarget.com/searchsecurity/tip/6-common-types-of-cyber-attacks-and-how-to-prevent-them”>cyberattacks</a>. One reason is because PHI can’t easily be canceled or changed — unlike illegally appropriated personal electronic financial information such as credit cards and bank account numbers. The persistence of PHI is what <a href=”https://www.techtarget.com/searchsecurity/answer/What-is-red-and-white-hat-hacking”>criminals and others who hack</a> into health data, or physically steal printed information or stored data, are after.</p>
<p>PHI is also valuable because it is contained within a historical electronic record that not only in

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from Search Security Resources and Information from TechTarget

Read the original article: