When designing a PHI security plan, a covered entity must take several factors into consideration. These
relate to physical security, such as locks and ID cards, along with different types of encryption. These and
other business processes assure data integrity and secure access. For this discussion:
Identify and describe a variety of business practices used to protect patient information.
Refer to federal healthcare Web sites and agencies when developing your list of best practices.
Use the link in resources to get an explanation of the HIPAA Security Rule.