Transmission Security
Implement technical security measures to guard against unauthorized access to ePHI that is being transmitted over an electronic communications network.
Implementation Guidance
Required Documentation
Best Practices
Common Violations
Testing Procedures
Implementation Resources
Download expert-developed templates and checklists to implement this control:
Quick Facts
Related Controls
Explore other controls in the Technical Safeguards category.
Person or Entity Authentication
Implement procedures to verify that a person or entity seeking access to ePHI is the one claimed....
Audit Controls
Implement hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use ePHI....
Integrity
Implement policies and procedures to protect ePHI from improper alteration or destruction....
Need Help Implementing This Control?
Our certified HIPAA experts can help you implement this control correctly and efficiently.