Normal view MARC view ISBD view

The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition.

By: Herold, Rebecca.
Contributor(s): Beaver, Kevin.
Material type: TextTextSeries: eBooks on Demand.Publisher: Hoboken : Taylor and Francis, 2014Edition: 2nd ed.Description: 1 online resource (532 p.).ISBN: 9781439855591.Subject(s): Health insurance continuation coverage -- United States | Medical care -- Security measures -- United States | Medical records -- Law and legislation -- United States | Medical records -- United States -- Access controlGenre/Form: Electronic books.Additional physical formats: Print version:: The Practical Guide to HIPAA Privacy and Security Compliance, Second EditionDDC classification: 344.73041 LOC classification: KF3827.R4 .H384 2014Online resources: Click here to view this ebook.
Contents:
Front Cover; Contents; Foreword; Preface; Authors; Chapter 1: Introduction to HIPAA; Chapter 2: Related Regulations, Laws, Standards, and Guidance; Chapter 3: Preparing for HIPAA, HITECH, and Other Compliance Changes; Chapter 4: HIPAA Cost Considerations; Chapter 5: Relationship between Security and Privacy; Chapter 6: HIPAA Privacy Rule Requirements Overview; Chapter 7: Performing a Privacy Rule Gap Analysis and Risk Analysis; Chapter 8: Writing Effective Privacy Policies; Chapter 9: State Preemption; Chapter 10: Crafting a Privacy Implementation Plan
Chapter 11: Privacy Rule Compliance ChecklistChapter 12: Security Rule Requirements Overview; Chapter 13: Performing a Security Rule Risk Analysis; Chapter 14: Writing Effective Information Security Policies; Chapter 15: Crafting a Security Implementation Plan; Chapter 16: Security Rule Compliance Checklist; Chapter 17: Health Care Provider Issues; Chapter 18: Health Care Clearinghouse Issues; Chapter 19: Health Plan Issues; Chapter 20: Employer Issues; Chapter 21: Business Associate Issues; Chapter 22: Building a HIPAA-Compliant Technology Infrastructure
Chapter 23: Crafting Security Incident Procedures and Contingency PlansChapter 24: Outsourcing Information Technology Services; Chapter 25: HIPAA Training, Education, and Awareness; Chapter 26: Performing Ongoing HIPAA Compliance Reviews and Audits; Appendix A: Enforcement and Sanctions; Appendix B: HIPAA Glossary; Appendix C: Model Incident and Privacy Response Procedures; Appendix D: HIPAA Resources; References; Further Reading; Back Cover
Summary: Following in the footsteps of its bestselling predecessor, The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition is a one-stop, up-to-date resource on Health Insurance Portability and Accountability Act (HIPAA) privacy and security, including details on the HITECH Act, the 2013 Omnibus Rule, and the pending rules. Updated and revised with several new sections, this edition defines what HIPAA is, what it requires, and what you need to do to achieve compliance. The book provides an easy-to-understand overview of HIPAA privacy and security rules and compliance tasks. Supply
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number URL Status Date due Barcode
Electronic Book UT Tyler Online
Online
KF3827.R4 .H384 2014 (Browse shelf) http://uttyler.eblib.com/patron/FullRecord.aspx?p=1407949 Available EBL1407949

Front Cover; Contents; Foreword; Preface; Authors; Chapter 1: Introduction to HIPAA; Chapter 2: Related Regulations, Laws, Standards, and Guidance; Chapter 3: Preparing for HIPAA, HITECH, and Other Compliance Changes; Chapter 4: HIPAA Cost Considerations; Chapter 5: Relationship between Security and Privacy; Chapter 6: HIPAA Privacy Rule Requirements Overview; Chapter 7: Performing a Privacy Rule Gap Analysis and Risk Analysis; Chapter 8: Writing Effective Privacy Policies; Chapter 9: State Preemption; Chapter 10: Crafting a Privacy Implementation Plan

Chapter 11: Privacy Rule Compliance ChecklistChapter 12: Security Rule Requirements Overview; Chapter 13: Performing a Security Rule Risk Analysis; Chapter 14: Writing Effective Information Security Policies; Chapter 15: Crafting a Security Implementation Plan; Chapter 16: Security Rule Compliance Checklist; Chapter 17: Health Care Provider Issues; Chapter 18: Health Care Clearinghouse Issues; Chapter 19: Health Plan Issues; Chapter 20: Employer Issues; Chapter 21: Business Associate Issues; Chapter 22: Building a HIPAA-Compliant Technology Infrastructure

Chapter 23: Crafting Security Incident Procedures and Contingency PlansChapter 24: Outsourcing Information Technology Services; Chapter 25: HIPAA Training, Education, and Awareness; Chapter 26: Performing Ongoing HIPAA Compliance Reviews and Audits; Appendix A: Enforcement and Sanctions; Appendix B: HIPAA Glossary; Appendix C: Model Incident and Privacy Response Procedures; Appendix D: HIPAA Resources; References; Further Reading; Back Cover

Following in the footsteps of its bestselling predecessor, The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition is a one-stop, up-to-date resource on Health Insurance Portability and Accountability Act (HIPAA) privacy and security, including details on the HITECH Act, the 2013 Omnibus Rule, and the pending rules. Updated and revised with several new sections, this edition defines what HIPAA is, what it requires, and what you need to do to achieve compliance. The book provides an easy-to-understand overview of HIPAA privacy and security rules and compliance tasks. Supply

Description based upon print version of record.

Author notes provided by Syndetics

<p>Kevin Beaver is an independent information security consultant, writer, professional speaker, and expert witness with Atlanta, Georgia based Principle Logic, LLC. He has worked in IT since 1989 and specializes in performing information security assessments for corporations, security product vendors, independent software developers, universities, government agencies, and nonprofit organizations. Before starting his information security consulting practice in 2001, Kevin served in various information technology and security roles for several health care, e-commerce, financial, and educational institutions.<br> <br> Kevin has appeared on CNN as an information security expert and has been quoted in The Wall Street Journal, Entrepreneur, Fortune Small Business, Men's Health, Women's Health, Woman's Day, and Inc. Magazine. His work has also been referenced by the PCI Security Standards Council in their PCI DSS Wireless Guidelines . He has given and participated in hundreds of highly rated presentations, panel discussions, seminars, and webcasts on information security and compliance.<br> <br> Kevin has authored or coauthored 11 information security books, including Hacking For Dummies and Hacking Wireless Networks For Dummies (Wiley) as well as Implementation Strategies for Fulfilling and Maintaining IT Compliance (Realtimepublishers.com). He has written dozens of whitepapers and hundreds of articles and guest blog posts, and he is a regular contributor to SearchSecurity.com, SearchEnterpriseDesktop.com, SearchWindowsServer.com, and Security Technology Executive magazine.<br> <br> Kevin is the creator and producer of the Security On Wheels audiobooks, which provide security learning for IT professionals on the go (http://www.securityonwheels.com) and its associated blog (http:// www.securityonwheels.com/blog). He also covers information security and rela</p>

There are no comments for this item.

Log in to your account to post a comment.