The Resource The practical guide to HIPAA privacy and security compliance, Rebecca Herold, Kevin Beaver
The practical guide to HIPAA privacy and security compliance, Rebecca Herold, Kevin Beaver
Resource Information
The item The practical guide to HIPAA privacy and security compliance, Rebecca Herold, Kevin Beaver represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Missouri University of Science & Technology Library.This item is available to borrow from 1 library branch.
Resource Information
The item The practical guide to HIPAA privacy and security compliance, Rebecca Herold, Kevin Beaver represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Missouri University of Science & Technology Library.
This item is available to borrow from 1 library branch.
- Summary
-
- "Updated and revised, with several new sections, this one-stop resource for HIPAA privacy and security provides immediately applicable advice for any organization's unique situation. It defines what HIPAA is, what it requires, and what can be done to achieve and maintain compliance. It describes the HIPAA Privacy and Security Rules and compliance tasks in easy-to-understand language and enables organizations to determine how HIPAA will impact them. Anyone preparing an organization for HIPAA laws will receive expert guidance on requirements and other commonly-discussed topics"--
- "Preface Introduction to this Book The Practical Guide to HIPAA Privacy and Security Compliance is designed to help you understand what the Health Insurance Portability and Accountability Act (HIPAA) is about, what it requires, what you can do to work toward compliance, and how you can maintain compliance on an ongoing basis. We have designed this book to be the one stop "how-to" practical reference for real-world HIPAA privacy and security advice that you can immediately apply to your organization's unique and specific situation, based upon the authors' actual experiences helping hundreds of covered entities (CEs) and business associates (BAs) to meet HIPAA compliance. This book describes the HIPAA Privacy and Security Rules and compliance tasks in easy to understand language. Although we provide actual definitions and passages from the regulatory text where appropriate, instead of focusing on technical and legal theory and jargon, we lay out what you actually need to do according to the final HIPAA Privacy and Security Rules, as well as the Health Information Technology for Economic and Clinical Health Act and the changes that came with the 2013 Omnibus Rule, to become compliant. All these HIPAArelated requirements are very complex. Privacy and security are also very complex. Given that, we don't claim to have coverage in this book AU: Is it"--
- Language
- eng
- Edition
- Second edition.
- Extent
- 1 online resource (xxx, 514 pages)
- Contents
-
- Front Cover; Contents; Foreword; Preface; Authors ; Chapter 1: Introduction to HIPAA; Chapter 2: Related Regulations, Laws, Standards, and Guidance; Chapter 3: Preparing for HIPAA, HITECH, and Other Compliance Changes; Chapter 4: HIPAA Cost Considerations; Chapter 5: Relationship between Security and Privacy; Chapter 6: HIPAA Privacy Rule Requirements Overview; Chapter 7: Performing a Privacy Rule Gap Analysis and Risk Analysis; Chapter 8: Writing Effective Privacy Policies; Chapter 9: State Preemption; Chapter 10: Crafting a Privacy Implementation Plan
- Chapter 11: Privacy Rule Compliance ChecklistChapter 12: Security Rule Requirements Overview; Chapter 13: Performing a Security Rule Risk Analysis; Chapter 14: Writing Effective Information Security Policies; Chapter 15: Crafting a Security Implementation Plan; Chapter 16: Security Rule Compliance Checklist; Chapter 17: Health Care Provider Issues; Chapter 18: Health Care Clearinghouse Issues; Chapter 19: Health Plan Issues; Chapter 20: Employer Issues; Chapter 21: Business Associate Issues; Chapter 22: Building a HIPAA-Compliant Technology Infrastructure
- Chapter 23: Crafting Security Incident Procedures and Contingency PlansChapter 24: Outsourcing Information Technology Services; Chapter 25: HIPAA Training, Education, and Awareness; Chapter 26: Performing Ongoing HIPAA Compliance Reviews and Audits; Appendix A: Enforcement and Sanctions; Appendix B: HIPAA Glossary; Appendix C: Model Incident and Privacy Response Procedures; Appendix D: HIPAA Resources; References; Further Reading; Back Cover
- Isbn
- 9781439855591
- Label
- The practical guide to HIPAA privacy and security compliance
- Title
- The practical guide to HIPAA privacy and security compliance
- Statement of responsibility
- Rebecca Herold, Kevin Beaver
- Title variation
- HIPAA privacy and security compliance
- Subject
-
- COMPUTERS -- Security | General
- Electronic books
- Health insurance continuation coverage
- Health insurance continuation coverage -- United States
- LAW -- Administrative Law & Regulatory Practice
- Medical care -- Security measures
- Medical care -- Security measures -- United States
- Medical records -- Access control
- Medical records -- Access control -- United States
- Medical records -- Law and legislation
- Medical records -- Law and legislation -- United States
- United States
- COMPUTERS -- Information Technology
- BUSINESS & ECONOMICS -- Management
- Language
- eng
- Summary
-
- "Updated and revised, with several new sections, this one-stop resource for HIPAA privacy and security provides immediately applicable advice for any organization's unique situation. It defines what HIPAA is, what it requires, and what can be done to achieve and maintain compliance. It describes the HIPAA Privacy and Security Rules and compliance tasks in easy-to-understand language and enables organizations to determine how HIPAA will impact them. Anyone preparing an organization for HIPAA laws will receive expert guidance on requirements and other commonly-discussed topics"--
- "Preface Introduction to this Book The Practical Guide to HIPAA Privacy and Security Compliance is designed to help you understand what the Health Insurance Portability and Accountability Act (HIPAA) is about, what it requires, what you can do to work toward compliance, and how you can maintain compliance on an ongoing basis. We have designed this book to be the one stop "how-to" practical reference for real-world HIPAA privacy and security advice that you can immediately apply to your organization's unique and specific situation, based upon the authors' actual experiences helping hundreds of covered entities (CEs) and business associates (BAs) to meet HIPAA compliance. This book describes the HIPAA Privacy and Security Rules and compliance tasks in easy to understand language. Although we provide actual definitions and passages from the regulatory text where appropriate, instead of focusing on technical and legal theory and jargon, we lay out what you actually need to do according to the final HIPAA Privacy and Security Rules, as well as the Health Information Technology for Economic and Clinical Health Act and the changes that came with the 2013 Omnibus Rule, to become compliant. All these HIPAArelated requirements are very complex. Privacy and security are also very complex. Given that, we don't claim to have coverage in this book AU: Is it"--
- Assigning source
-
- Provided by publisher
- Provided by publisher
- Cataloging source
- VLB
- http://library.link/vocab/creatorName
- Herold, Rebecca
- Dewey number
- 344.7304/1
- Index
- index present
- LC call number
- KF3827.R4
- LC item number
- B43 2015eb
- Literary form
- non fiction
- Nature of contents
-
- dictionaries
- bibliography
- http://library.link/vocab/relatedWorkOrContributorName
- Beaver, Kevin
- http://library.link/vocab/subjectName
-
- Medical records
- Medical records
- Medical care
- Health insurance continuation coverage
- BUSINESS & ECONOMICS
- COMPUTERS
- COMPUTERS
- LAW
- Health insurance continuation coverage
- Medical care
- Medical records
- Medical records
- United States
- Label
- The practical guide to HIPAA privacy and security compliance, Rebecca Herold, Kevin Beaver
- Antecedent source
- file reproduced from original
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Front Cover; Contents; Foreword; Preface; Authors ; Chapter 1: Introduction to HIPAA; Chapter 2: Related Regulations, Laws, Standards, and Guidance; Chapter 3: Preparing for HIPAA, HITECH, and Other Compliance Changes; Chapter 4: HIPAA Cost Considerations; Chapter 5: Relationship between Security and Privacy; Chapter 6: HIPAA Privacy Rule Requirements Overview; Chapter 7: Performing a Privacy Rule Gap Analysis and Risk Analysis; Chapter 8: Writing Effective Privacy Policies; Chapter 9: State Preemption; Chapter 10: Crafting a Privacy Implementation Plan
- Chapter 11: Privacy Rule Compliance ChecklistChapter 12: Security Rule Requirements Overview; Chapter 13: Performing a Security Rule Risk Analysis; Chapter 14: Writing Effective Information Security Policies; Chapter 15: Crafting a Security Implementation Plan; Chapter 16: Security Rule Compliance Checklist; Chapter 17: Health Care Provider Issues; Chapter 18: Health Care Clearinghouse Issues; Chapter 19: Health Plan Issues; Chapter 20: Employer Issues; Chapter 21: Business Associate Issues; Chapter 22: Building a HIPAA-Compliant Technology Infrastructure
- Chapter 23: Crafting Security Incident Procedures and Contingency PlansChapter 24: Outsourcing Information Technology Services; Chapter 25: HIPAA Training, Education, and Awareness; Chapter 26: Performing Ongoing HIPAA Compliance Reviews and Audits; Appendix A: Enforcement and Sanctions; Appendix B: HIPAA Glossary; Appendix C: Model Incident and Privacy Response Procedures; Appendix D: HIPAA Resources; References; Further Reading; Back Cover
- Control code
- 892491827
- Dimensions
- unknown
- Edition
- Second edition.
- Extent
- 1 online resource (xxx, 514 pages)
- Form of item
- online
- Isbn
- 9781439855591
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Reformatting quality
- access
- Specific material designation
- remote
- System control number
- (OCoLC)892491827
- Label
- The practical guide to HIPAA privacy and security compliance, Rebecca Herold, Kevin Beaver
- Antecedent source
- file reproduced from original
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Front Cover; Contents; Foreword; Preface; Authors ; Chapter 1: Introduction to HIPAA; Chapter 2: Related Regulations, Laws, Standards, and Guidance; Chapter 3: Preparing for HIPAA, HITECH, and Other Compliance Changes; Chapter 4: HIPAA Cost Considerations; Chapter 5: Relationship between Security and Privacy; Chapter 6: HIPAA Privacy Rule Requirements Overview; Chapter 7: Performing a Privacy Rule Gap Analysis and Risk Analysis; Chapter 8: Writing Effective Privacy Policies; Chapter 9: State Preemption; Chapter 10: Crafting a Privacy Implementation Plan
- Chapter 11: Privacy Rule Compliance ChecklistChapter 12: Security Rule Requirements Overview; Chapter 13: Performing a Security Rule Risk Analysis; Chapter 14: Writing Effective Information Security Policies; Chapter 15: Crafting a Security Implementation Plan; Chapter 16: Security Rule Compliance Checklist; Chapter 17: Health Care Provider Issues; Chapter 18: Health Care Clearinghouse Issues; Chapter 19: Health Plan Issues; Chapter 20: Employer Issues; Chapter 21: Business Associate Issues; Chapter 22: Building a HIPAA-Compliant Technology Infrastructure
- Chapter 23: Crafting Security Incident Procedures and Contingency PlansChapter 24: Outsourcing Information Technology Services; Chapter 25: HIPAA Training, Education, and Awareness; Chapter 26: Performing Ongoing HIPAA Compliance Reviews and Audits; Appendix A: Enforcement and Sanctions; Appendix B: HIPAA Glossary; Appendix C: Model Incident and Privacy Response Procedures; Appendix D: HIPAA Resources; References; Further Reading; Back Cover
- Control code
- 892491827
- Dimensions
- unknown
- Edition
- Second edition.
- Extent
- 1 online resource (xxx, 514 pages)
- Form of item
- online
- Isbn
- 9781439855591
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Reformatting quality
- access
- Specific material designation
- remote
- System control number
- (OCoLC)892491827
Subject
- COMPUTERS -- Security | General
- Electronic books
- Health insurance continuation coverage
- Health insurance continuation coverage -- United States
- LAW -- Administrative Law & Regulatory Practice
- Medical care -- Security measures
- Medical care -- Security measures -- United States
- Medical records -- Access control
- Medical records -- Access control -- United States
- Medical records -- Law and legislation
- Medical records -- Law and legislation -- United States
- United States
- COMPUTERS -- Information Technology
- BUSINESS & ECONOMICS -- Management
Genre
Member of
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/portal/The-practical-guide-to-HIPAA-privacy-and-security/GefSYe3xyCM/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/portal/The-practical-guide-to-HIPAA-privacy-and-security/GefSYe3xyCM/">The practical guide to HIPAA privacy and security compliance, Rebecca Herold, Kevin Beaver</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item The practical guide to HIPAA privacy and security compliance, Rebecca Herold, Kevin Beaver
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/portal/The-practical-guide-to-HIPAA-privacy-and-security/GefSYe3xyCM/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/portal/The-practical-guide-to-HIPAA-privacy-and-security/GefSYe3xyCM/">The practical guide to HIPAA privacy and security compliance, Rebecca Herold, Kevin Beaver</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>