• Home
  • Blog
  • Contact
HIPAA ComplianceHIPAA Compliance
HIPAA ComplianceHIPAA Compliance
  • Home
  • Blog
  • Contact

Exploring HIPAA and HITECH Act Definitions: Part 1

October 23, 2009 5010 No Comments

From now through November, HIPAA.com is providing a run through of HIPAA transaction & code set, privacy, and security definitions, along with relevant HITECH Act definitions pertaining to breach notification and securing of protected health information. These definitions are key to understanding the referenced HIPAA and HITECH Act enabling regulations that are effective now and that will require compliance by covered entities and business associates now or in the months ahead, as indicated in HIPAA.com’s timeline. Each posting will contain three definitions, with a date reference to the Federal Register and citation to the Code of Federal Regulations (CFR).

We begin the first series of postings with definitions from “Health Insurance Reform; Modifications to the Health Insurance Portability and Accountability Act (HIPAA); Final Rules,” Federal Register,  January 16, 2009.  45 CFR 162, Administrative Requirements:  162.103, Definitions.

Code Set

Any set of codes used to encode data elements, such as tables of terms, medical concepts, medical diagnostic codes, or medical procedure codes.  A code set includes the codes and the descriptors of the codes.

Code Set Maintaining Organization

An organization that creates and maintains the code sets adopted by the Secretary [of HHS] for use in the transactions for which standards are adopted in this part [162].

Data Condition

The rule that describes the circumstances under which a covered entity must use a particular data element or segment.

Tags: Administrative RequirementsBreach Notificationbusiness associatesCFRCode of Federal Regulationscode setcode set maintenance organizationcompliancecovered entitiesdata conditiondefinitioneffectiveenabling regulationsFederal RegisterHealth Insurance ReformHIPAAHITECH ActJanuary 16Privacysecuring protected health informationSecuritytimelinetransaction & code set
No Comments
Share
0

You also might be interested in

Integrity: Mechanism to Authenticate Electronic Protected Health Information-What to Do and How to Do It

Jun 12, 2009

In our series on the HIPAA Administrative Simplification Security Rule,[...]

HHS Secretary Sebelius Delegates Oversight and Enforcement of HIPAA Security Rule to OCR

Aug 4, 2009

U.S. Health and Human Services (HHS) Secretary Kathleen Sebelius has[...]

Don’t Overthink HIPAA Privacy Rules

Don’t Overthink HIPAA Privacy Rules

Oct 11, 2013

Ever since HIPAA Privacy Rules became finalized law in 2003,[...]

Leave a Reply Cancel Reply

Categories

  • 5010
  • American Recovery and Reinvestment Act
  • Enforcement
  • GINA
  • Health Care Reform
  • Health IT and HITECH
  • HIPAA Law
  • Identifiers
  • Meaningful Use
  • Privacy
  • Red Flags Rules
  • Security
  • Transactions & Code Sets
  • Uncategorized

Recent Posts

  • Contracting with Vendors that are NOT HIPAA Business Associates: Best Practices
  • HIPAA Breach: Who You Gonna Call?
  • Can I Be Sued for a HIPAA Violation?
  • Business Associate Agreements – a First Look at Indemnification
  • Gmail, Google Apps for Business HIPAA Business Associate Agreements

Archives

Contact Us

We're currently offline. Send us an email and we'll get back to you, asap.

Send Message
HIPAA- Health Insurance Portability Accountability Act

© 2023 · hipaa.com

Prev Next