Cargando…

The definitive guide to complying with the HIPAA/HITECH privacy and security rules /

"The security standards in HIPAA were developed to implement appropriate security safeguards for the protection of certain Electronic Protected Health Information (EPHI) that may be at risk while permitting authorized individuals to use this information. This book assists the health care provid...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Trinckes, John J.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boca Raton, FL : Auerbach Publications, 2012.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn823169933
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 130102s2012 flu ob 001 0 eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d YDXCP  |d OCLCO  |d NLE  |d EBLCP  |d DEBSZ  |d CRCPR  |d OCLCQ  |d OCLCF  |d OCLCQ  |d D6H  |d MERUC  |d SAV  |d OCLCQ  |d OCLCO  |d UKMGB  |d OCLCQ  |d OCLCO  |d UKAHL  |d OCLCQ  |d OCLCO  |d OCLCQ 
016 7 |a 018372891  |2 Uk 
019 |a 823719972  |a 860547717 
020 |a 9781466507685  |q (electronic bk.) 
020 |a 1466507683  |q (electronic bk.) 
020 |z 9781466507678 
020 |z 1466507675 
029 1 |a DEBSZ  |b 397458827 
029 1 |a DEBSZ  |b 431295859 
029 1 |a UKMGB  |b 018372891 
029 1 |a AU@  |b 000055230980 
035 |a (OCoLC)823169933  |z (OCoLC)823719972  |z (OCoLC)860547717 
037 |b EBSCO 
043 |a n-us--- 
050 4 |a KF3827.R4  |b T75 2012eb 
072 7 |a LAW  |x 001000  |2 bisacsh 
082 0 4 |a 346.73/086382  |2 23 
084 |a COM032000  |a COM053000  |2 bisacsh 
049 |a UAMI 
100 1 |a Trinckes, John J. 
245 1 4 |a The definitive guide to complying with the HIPAA/HITECH privacy and security rules /  |c John J. Trinckes, Jr. 
260 |a Boca Raton, FL :  |b Auerbach Publications,  |c 2012. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a "The security standards in HIPAA were developed to implement appropriate security safeguards for the protection of certain Electronic Protected Health Information (EPHI) that may be at risk while permitting authorized individuals to use this information. This book assists the health care provider in reviewing the accessibility of EPHI to verify that it is not altered or destroyed in an unauthorized manner and that it is available as needed by authorized individuals. The text covers implementation standards and provides recommendations on how to comply with these standards."--  |c Provided by publisher 
520 |a "Preface The Department of Health and Human Services (HHS) has published four major rules implementing a number of provisions and regulations set out by the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and amended by the Health Information Technology for Economic and Clinical Health (HITECH) Act of 1999 as part of the American Recovery and Reinvestment Act (ARRA). These rules are the Privacy Rule; the Electronic Transactions and Code Sets Rule; the National Identifier requirements for employers, providers, and health plans; and the Security Rule. It also include more regulatory control over enforcement actions and stiffer penalties for noncompliance. There are many healthcare providers, healthcare clearinghouses, and health plans that are required to implement and comply with these rules, especially the Security Rule. Failure to implement or comply with these rules can leave the covered entity or others that need to comply open for large monetary fines, civil lawsuits, and other penalties. With the rise of security breaches and other high-profile incidences regarding successful hacking events, it is very apparent that information has become a valuable commodity. The United States has moved from a nation built on manufacturing and industry to an information/knowledge powerhouse. With the advancement in technology comes the opportunity for criminals to find another source of income by exploiting vulnerabilities within this technology. Retail, financial, and governmental entities have been the target and have fallen victim to these types of crimes; however, these industries are not the only industries susceptible. Technology has made companies more efficient and even now healthcare providers are required to submit Medicaid and"--  |c Provided by publisher 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
505 0 |a Front Cover; Contents; Foreword; Preface; Acknowledgments; About the Author; Contributors; Reviewer; Author's Note; Legal Disclaimer; Chapter 1 -- HIPAA/HITECH Overview; Chapter 2 -- Relevance of HIPAA/HITECH to Healthcare Organizations; Chapter 3 -- Compliance Overview; Chapter 4 -- Privacy Rule Detailed; Chapter 5 -- Electronic Transactions and Code Set Rule Detailed; Chapter 6 -- National Provider Identifier Requirements Detailed; Chapter 7 -- Meaningful Use Detailed; Chapter 8 -- Breach Notification Detailed; Chapter 9 -- Enforcement Rule Detailed; Chapter 10 -- Security Rule Detailed. 
505 8 |a Chapter 11 -- Security Rule: Administrative SafeguardsChapter 12 -- Security Rule: Risk Assessments; Chapter 13 -- Security Rule: Security Awareness Training; Chapter 14 -- Security Rule: Incident Response; Chapter 15 -- Security Rule: Business Continuity Planning and Disaster Recovery; Chapter 16 -- Security Rule: Compliance Assessment; Chapter 17 -- Security Rule: Physical Safeguards; Chapter 18 -- Security Rule: Technical Safeguards; Chapter 19 -- Security Rule: Organizational Requirements; Chapter 20 -- Frequently Asked Questions; Chapter 21 -- Checklists; Acronyms; Glossary; References. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
610 1 0 |a United States.  |t American Recovery and Reinvestment Act of 2009. 
610 1 0 |a United States.  |t Health Insurance Portability and Accountability Act of 1996. 
610 1 0 |a United States.  |t Health Information Technology for Economic and Clinical Health Act. 
630 0 7 |a American Recovery and Reinvestment Act of 2009 (United States)  |2 fast  |0 (OCoLC)fst01911505 
630 0 7 |a Health Information Technology for Economic and Clinical Health Act (United States)  |2 fast  |0 (OCoLC)fst01937910 
630 0 7 |a Health Insurance Portability and Accountability Act of 1996 (United States)  |2 fast  |0 (OCoLC)fst01386851 
650 0 |a Medical records  |x Law and legislation  |z United States. 
650 0 |a Medical records  |x Access control  |z United States. 
650 0 |a Data protection  |x Law and legislation  |z United States. 
650 0 |a Health insurance  |x Law and legislation  |z United States. 
650 0 |a Health insurance claims  |z United States. 
650 6 |a Dossiers médicaux  |x Accès  |x Contrôle  |z États-Unis. 
650 6 |a Assurance-maladie  |x Demandes de règlement  |z États-Unis. 
650 7 |a COMPUTERS  |x Information Technology.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a LAW  |x Administrative Law & Regulatory Practice.  |2 bisacsh 
650 7 |a Data protection  |x Law and legislation.  |2 fast  |0 (OCoLC)fst00887963 
650 7 |a Health insurance claims.  |2 fast  |0 (OCoLC)fst00953087 
650 7 |a Health insurance  |x Law and legislation.  |2 fast  |0 (OCoLC)fst01715845 
650 7 |a Medical records  |x Access control.  |2 fast  |0 (OCoLC)fst01014549 
650 7 |a Medical records  |x Law and legislation.  |2 fast  |0 (OCoLC)fst01014561 
651 7 |a United States.  |2 fast  |0 (OCoLC)fst01204155 
776 0 8 |i Print version:  |a Trinckes, John J.  |t Definitive guide to complying with the HIPAA/HITECH privacy and security rules.  |d Boca Raton, FL : Auerbach Publications, 2012  |z 9781466507678  |w (DLC) 2012035126  |w (OCoLC)759916469 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781466507685/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH24641513 
938 |a Askews and Holts Library Services  |b ASKH  |n AH24367921 
938 |a CRC Press  |b CRCP  |n AUP0KE16192PDF 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1107612 
938 |a EBSCOhost  |b EBSC  |n 513759 
938 |a YBP Library Services  |b YANK  |n 9727322 
994 |a 92  |b IZTAP