Health data is regarded de identified if it doesn’t identify a person, if there isn’t any low cost foundation to trust case study solution data can be used to determine a person, and if case examine answer covered entity or business associate complies with case look at solution privacy rule requisites for de picking information. Disclosure of properly secured data via use of accepted encryption techniques is exempted from case examine solution notification mandates. Encryption approach case study solution use of an algorithmic manner to radically change data into a sort by which there is a low opportunity of assigning meaning to case look at solution data without use of a private technique or encryption key. It is essential to needless to say if case examine answer personal system or encryption secret is found or improperly disclosed, this could constitute a breach if any PHI were improperly accessed. The Guidance suggests that encryption breaches are best avoided if case look at solution exclusive system or encryption secret is kept on contraptions or at locations become independent from in which case examine solution PHI is saved. Destruction of hard copy PHI is achieved by shredding or destroying case look at solution data in such a way that it can’t be read or otherwise reconstructed.