Introduction -- Background and history of HIPAA, HITECH, and beyond -- HIPAA/HITECH privacy and security -- Scope and applicability of the HIPAA security rule -- The security rule -- The breach notification rule and handling breaches -- Compliance and enforcement -- Litigation and risk management -- Emerging technologies -- Conclusion.