Protected Health Information (PHI) Policy and Procedures


The "Protected Health Information (PHI) Policy and Procedures" document is an incredibly in-depth, industry leading policy that covers all essential information security issues pertaining to the use, protection, and disclosure of PHI.  Extensively researched and developed by information security experts, such as former military I.T. personnel, cyber security specialists - and others - it's a must-have document for helping put in place industry leading security policies, procedures, and practices.  

Additionally, the document contains sections, categories, along with supporting best practices pertaining to the most critical areas regarding Protected Health Information (PHI), such as examples of PHI, identifying PHI, incident response measures, and much more.  Moreover, the document has also been developed using noted provisions from many of the world's most recognized and respected information security benchmarks, standards, frameworks, and best practices, such as NIST, FIPS, ISO, COBIT, US CERT, Cloud Security, Defense-in-Depth, Layered Security - just to name a select few.

Length11 pages.

Format: Microsoft Word Document.

Topics Covered:

  • PHI Examples
  • Regulatory Compliance
  • PHI Privacy Initiatives
  • Identifying PHI
  • PII Impact Levels
  • Protecting PHI
  • Minimization of PHI
  • Security Awareness
  • Incident Response Measures
  • Reporting PHI Breaches
  • and more.

This document is just one of the hundreds of operational, business specific, and I.T. policies, procedures, forms, checklists, templates, provisioning and hardening material - and more - available for immediate download from, the global leader in information security documentation.  View sample information security documents today and you'll see how incredibly in-depth and high-quality all of the templates are.

    Related products