Coverart for item
The Resource The practical guide to HIPAA privacy and security compliance, Rebecca Herold, Kevin Beaver

The practical guide to HIPAA privacy and security compliance, Rebecca Herold, Kevin Beaver

Label
The practical guide to HIPAA privacy and security compliance
Title
The practical guide to HIPAA privacy and security compliance
Statement of responsibility
Rebecca Herold, Kevin Beaver
Title variation
HIPAA privacy and security compliance
Creator
Contributor
Author
Subject
Genre
Language
eng
Summary
  • "Updated and revised, with several new sections, this one-stop resource for HIPAA privacy and security provides immediately applicable advice for any organization's unique situation. It defines what HIPAA is, what it requires, and what can be done to achieve and maintain compliance. It describes the HIPAA Privacy and Security Rules and compliance tasks in easy-to-understand language and enables organizations to determine how HIPAA will impact them. Anyone preparing an organization for HIPAA laws will receive expert guidance on requirements and other commonly-discussed topics"--
  • "Preface Introduction to this Book The Practical Guide to HIPAA Privacy and Security Compliance is designed to help you understand what the Health Insurance Portability and Accountability Act (HIPAA) is about, what it requires, what you can do to work toward compliance, and how you can maintain compliance on an ongoing basis. We have designed this book to be the one stop "how-to" practical reference for real-world HIPAA privacy and security advice that you can immediately apply to your organization's unique and specific situation, based upon the authors' actual experiences helping hundreds of covered entities (CEs) and business associates (BAs) to meet HIPAA compliance. This book describes the HIPAA Privacy and Security Rules and compliance tasks in easy to understand language. Although we provide actual definitions and passages from the regulatory text where appropriate, instead of focusing on technical and legal theory and jargon, we lay out what you actually need to do according to the final HIPAA Privacy and Security Rules, as well as the Health Information Technology for Economic and Clinical Health Act and the changes that came with the 2013 Omnibus Rule, to become compliant. All these HIPAArelated requirements are very complex. Privacy and security are also very complex. Given that, we don't claim to have coverage in this book AU: Is it"--
Member of
Has edition
Assigning source
  • Provided by publisher
  • Provided by publisher
Cataloging source
VLB
http://library.link/vocab/creatorName
Herold, Rebecca
Dewey number
344.7304/1
Index
index present
LC call number
KF3827.R4
LC item number
B43 2015eb
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
Beaver, Kevin
http://library.link/vocab/subjectName
  • Medical records
  • Medical records
  • Medical care
  • Health insurance continuation coverage
  • BUSINESS & ECONOMICS
  • COMPUTERS
  • COMPUTERS
  • LAW
  • Health insurance continuation coverage
  • Medical care
  • Medical records
  • Medical records
  • United States
Label
The practical guide to HIPAA privacy and security compliance, Rebecca Herold, Kevin Beaver
Instantiates
Publication
Copyright
Antecedent source
file reproduced from original
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Front Cover; Contents; Foreword; Preface; Authors ; Chapter 1: Introduction to HIPAA; Chapter 2: Related Regulations, Laws, Standards, and Guidance; Chapter 3: Preparing for HIPAA, HITECH, and Other Compliance Changes; Chapter 4: HIPAA Cost Considerations; Chapter 5: Relationship between Security and Privacy; Chapter 6: HIPAA Privacy Rule Requirements Overview; Chapter 7: Performing a Privacy Rule Gap Analysis and Risk Analysis; Chapter 8: Writing Effective Privacy Policies; Chapter 9: State Preemption; Chapter 10: Crafting a Privacy Implementation Plan
  • Chapter 11: Privacy Rule Compliance ChecklistChapter 12: Security Rule Requirements Overview; Chapter 13: Performing a Security Rule Risk Analysis; Chapter 14: Writing Effective Information Security Policies; Chapter 15: Crafting a Security Implementation Plan; Chapter 16: Security Rule Compliance Checklist; Chapter 17: Health Care Provider Issues; Chapter 18: Health Care Clearinghouse Issues; Chapter 19: Health Plan Issues; Chapter 20: Employer Issues; Chapter 21: Business Associate Issues; Chapter 22: Building a HIPAA-Compliant Technology Infrastructure
  • Chapter 23: Crafting Security Incident Procedures and Contingency PlansChapter 24: Outsourcing Information Technology Services; Chapter 25: HIPAA Training, Education, and Awareness; Chapter 26: Performing Ongoing HIPAA Compliance Reviews and Audits; Appendix A: Enforcement and Sanctions; Appendix B: HIPAA Glossary; Appendix C: Model Incident and Privacy Response Procedures; Appendix D: HIPAA Resources; References; Further Reading; Back Cover
Control code
892491827
Dimensions
unknown
Edition
Second edition.
Extent
1 online resource (xxx, 514 pages)
Form of item
online
Isbn
9781439855591
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Reformatting quality
access
Specific material designation
remote
System control number
(OCoLC)892491827
Label
The practical guide to HIPAA privacy and security compliance, Rebecca Herold, Kevin Beaver
Publication
Copyright
Antecedent source
file reproduced from original
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Front Cover; Contents; Foreword; Preface; Authors ; Chapter 1: Introduction to HIPAA; Chapter 2: Related Regulations, Laws, Standards, and Guidance; Chapter 3: Preparing for HIPAA, HITECH, and Other Compliance Changes; Chapter 4: HIPAA Cost Considerations; Chapter 5: Relationship between Security and Privacy; Chapter 6: HIPAA Privacy Rule Requirements Overview; Chapter 7: Performing a Privacy Rule Gap Analysis and Risk Analysis; Chapter 8: Writing Effective Privacy Policies; Chapter 9: State Preemption; Chapter 10: Crafting a Privacy Implementation Plan
  • Chapter 11: Privacy Rule Compliance ChecklistChapter 12: Security Rule Requirements Overview; Chapter 13: Performing a Security Rule Risk Analysis; Chapter 14: Writing Effective Information Security Policies; Chapter 15: Crafting a Security Implementation Plan; Chapter 16: Security Rule Compliance Checklist; Chapter 17: Health Care Provider Issues; Chapter 18: Health Care Clearinghouse Issues; Chapter 19: Health Plan Issues; Chapter 20: Employer Issues; Chapter 21: Business Associate Issues; Chapter 22: Building a HIPAA-Compliant Technology Infrastructure
  • Chapter 23: Crafting Security Incident Procedures and Contingency PlansChapter 24: Outsourcing Information Technology Services; Chapter 25: HIPAA Training, Education, and Awareness; Chapter 26: Performing Ongoing HIPAA Compliance Reviews and Audits; Appendix A: Enforcement and Sanctions; Appendix B: HIPAA Glossary; Appendix C: Model Incident and Privacy Response Procedures; Appendix D: HIPAA Resources; References; Further Reading; Back Cover
Control code
892491827
Dimensions
unknown
Edition
Second edition.
Extent
1 online resource (xxx, 514 pages)
Form of item
online
Isbn
9781439855591
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Reformatting quality
access
Specific material designation
remote
System control number
(OCoLC)892491827

Library Locations

    • Curtis Laws Wilson LibraryBorrow it
      400 West 14th Street, Rolla, MO, 65409, US
      37.955220 -91.772210
Processing Feedback ...