The definitive guide to complying with the HIPAA/HITECH privacy and security rules /
"The security standards in HIPAA were developed to implement appropriate security safeguards for the protection of certain Electronic Protected Health Information (EPHI) that may be at risk while permitting authorized individuals to use this information. This book assists the health care provid...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Boca Raton, FL :
Auerbach Publications,
2012.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Front Cover; Contents; Foreword; Preface; Acknowledgments; About the Author; Contributors; Reviewer; Author's Note; Legal Disclaimer; Chapter 1
- HIPAA/HITECH Overview; Chapter 2
- Relevance of HIPAA/HITECH to Healthcare Organizations; Chapter 3
- Compliance Overview; Chapter 4
- Privacy Rule Detailed; Chapter 5
- Electronic Transactions and Code Set Rule Detailed; Chapter 6
- National Provider Identifier Requirements Detailed; Chapter 7
- Meaningful Use Detailed; Chapter 8
- Breach Notification Detailed; Chapter 9
- Enforcement Rule Detailed; Chapter 10
- Security Rule Detailed.
- Chapter 11
- Security Rule: Administrative SafeguardsChapter 12
- Security Rule: Risk Assessments; Chapter 13
- Security Rule: Security Awareness Training; Chapter 14
- Security Rule: Incident Response; Chapter 15
- Security Rule: Business Continuity Planning and Disaster Recovery; Chapter 16
- Security Rule: Compliance Assessment; Chapter 17
- Security Rule: Physical Safeguards; Chapter 18
- Security Rule: Technical Safeguards; Chapter 19
- Security Rule: Organizational Requirements; Chapter 20
- Frequently Asked Questions; Chapter 21
- Checklists; Acronyms; Glossary; References.