The practical guide to HIPAA privacy and security compliance, Rebecca Herold, Kevin Beaver
Resource Information
The instance The practical guide to HIPAA privacy and security compliance, Rebecca Herold, Kevin Beaver represents a material embodiment of a distinct intellectual or artistic creation found in Missouri University of Science & Technology Library. This resource is a combination of several types including: Instance, Electronic.
The Resource
The practical guide to HIPAA privacy and security compliance, Rebecca Herold, Kevin Beaver
Resource Information
The instance The practical guide to HIPAA privacy and security compliance, Rebecca Herold, Kevin Beaver represents a material embodiment of a distinct intellectual or artistic creation found in Missouri University of Science & Technology Library. This resource is a combination of several types including: Instance, Electronic.
- Label
- The practical guide to HIPAA privacy and security compliance, Rebecca Herold, Kevin Beaver
- Statement of responsibility
- Rebecca Herold, Kevin Beaver
- Antecedent source
- file reproduced from original
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Front Cover; Contents; Foreword; Preface; Authors ; Chapter 1: Introduction to HIPAA; Chapter 2: Related Regulations, Laws, Standards, and Guidance; Chapter 3: Preparing for HIPAA, HITECH, and Other Compliance Changes; Chapter 4: HIPAA Cost Considerations; Chapter 5: Relationship between Security and Privacy; Chapter 6: HIPAA Privacy Rule Requirements Overview; Chapter 7: Performing a Privacy Rule Gap Analysis and Risk Analysis; Chapter 8: Writing Effective Privacy Policies; Chapter 9: State Preemption; Chapter 10: Crafting a Privacy Implementation Plan
- Chapter 11: Privacy Rule Compliance ChecklistChapter 12: Security Rule Requirements Overview; Chapter 13: Performing a Security Rule Risk Analysis; Chapter 14: Writing Effective Information Security Policies; Chapter 15: Crafting a Security Implementation Plan; Chapter 16: Security Rule Compliance Checklist; Chapter 17: Health Care Provider Issues; Chapter 18: Health Care Clearinghouse Issues; Chapter 19: Health Plan Issues; Chapter 20: Employer Issues; Chapter 21: Business Associate Issues; Chapter 22: Building a HIPAA-Compliant Technology Infrastructure
- Chapter 23: Crafting Security Incident Procedures and Contingency PlansChapter 24: Outsourcing Information Technology Services; Chapter 25: HIPAA Training, Education, and Awareness; Chapter 26: Performing Ongoing HIPAA Compliance Reviews and Audits; Appendix A: Enforcement and Sanctions; Appendix B: HIPAA Glossary; Appendix C: Model Incident and Privacy Response Procedures; Appendix D: HIPAA Resources; References; Further Reading; Back Cover
- Control code
- 892491827
- Dimensions
- unknown
- Edition
- Second edition.
- Extent
- 1 online resource (xxx, 514 pages)
- Form of item
- online
- Isbn
- 9781439855591
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Record ID
- .b134627209
- Reformatting quality
- access
- Specific material designation
- remote
- System control number
- (OCoLC)892491827
Context
Context of The practical guide to HIPAA privacy and security compliance, Rebecca Herold, Kevin BeaverEmbed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/resource/GefSYe3xyCM/" typeof="Book http://bibfra.me/vocab/lite/Instance"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/resource/GefSYe3xyCM/">The practical guide to HIPAA privacy and security compliance, Rebecca Herold, Kevin Beaver</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Instance The practical guide to HIPAA privacy and security compliance, Rebecca Herold, Kevin Beaver
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/resource/GefSYe3xyCM/" typeof="Book http://bibfra.me/vocab/lite/Instance"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/resource/GefSYe3xyCM/">The practical guide to HIPAA privacy and security compliance, Rebecca Herold, Kevin Beaver</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>