Implement technical security measures to guard against unauthorized access to ePHI being transmitted over an electronic communications network.
Acceptance criteria
Source: § 2.4.1
Covered entities MUST implement technical security measures to guard against unauthorized access to ePHI being transmitted over an electronic communications network.
Implement technical security measures to guard against unauthorized access to ePHI being transmitted over an electronic communications network.
Acceptance criteria
Source: § 2.4.1