|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
SCIDIR_ocn946997515 |
003 |
OCoLC |
005 |
20231120112103.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
160420s2016 ne ob 001 0 eng d |
010 |
|
|
|a 2016930217
|
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d IDEBK
|d YDXCP
|d N$T
|d OCLCF
|d EBLCP
|d OPELS
|d UPM
|d IDB
|d OTZ
|d MERUC
|d OCLCQ
|d U3W
|d D6H
|d WRM
|d AU@
|d GGVRL
|d EZC
|d OCLCQ
|d WYU
|d OCLCA
|d MERER
|d OCLCO
|d OCLCA
|d OCLCQ
|d OCLCA
|d UKMGB
|d OCLCQ
|d SDF
|d LVT
|d VT2
|d KUWAI
|d OCLCO
|d OCLCQ
|d OCL
|d OCLCO
|
015 |
|
|
|a GBB655475
|2 bnb
|
016 |
7 |
|
|a 101688820
|2 DNLM
|
016 |
7 |
|
|a 017809428
|2 Uk
|
019 |
|
|
|a 956735902
|a 1066495867
|a 1229386285
|a 1235825340
|
020 |
|
|
|a 9780128044117
|q (electronic bk.)
|
020 |
|
|
|a 012804411X
|q (electronic bk.)
|
020 |
|
|
|z 9780128043929
|
020 |
|
|
|z 012804392X
|
035 |
|
|
|a (OCoLC)946997515
|z (OCoLC)956735902
|z (OCoLC)1066495867
|z (OCoLC)1229386285
|z (OCoLC)1235825340
|
043 |
|
|
|a e-uk---
|
050 |
|
4 |
|a RA976
|
060 |
|
4 |
|a 2016 F-929
|
060 |
|
4 |
|a WX 175
|
072 |
|
7 |
|a BUS
|x 000000
|2 bisacsh
|
082 |
0 |
4 |
|a 651.504261
|2 23
|
100 |
1 |
|
|a Cerrato, Paul,
|e author.
|
245 |
1 |
0 |
|a Protecting patient information :
|b a decision-maker's guide to risk, prevention, and damage control /
|c Paul Cerrato ; Jason Andress, technical editor.
|
264 |
|
1 |
|a Amsterdam :
|b Syngress is an imprint of Elsevier,
|c 2016.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from PDF title page (EBSCO, viewed April 25, 2016).
|
500 |
|
|
|a Includes index.
|
505 |
0 |
|
|a Cover ; Title Page; Copyright Page; Disclaimer; Dedication; Contents; About the Author; Preface; Chapter 1 -- Dissecting a Book Title; Chapter 2 -- How Well Protected is Your Protected Health Information? Perception Versus Reality; The Cost of Insecurity is Steep; A Closer Look at Data Breach Fines; Do not ignore individual states in breach investigations; Fines are Only Part of the Problem; Factoring in the Meaningful Use Program; Calculating the Cost of Security; References; Chapter 3 -- Regulations Governing Protected Health Information; Defining the Crown Jewels.
|
505 |
8 |
|
|a HIPAA Privacy Versus Security Rules: Related But DifferentTechnology is only part of the equation; Enforcing HIPAA Regulations; A closer look at the HIPAA Security Rule; The HIPAA Breach Notification Rule; The Role of the Federal Trade Commission; Do not forget State Laws; References; Chapter 4 -- Risk Analysis; Learning the jargon; Vulnerability; Threat Versus Risk; Compliance Versus Management; The ONC Approach to Risk Analysis and Security Management; Step 1; Step 2; Step 3; Step 4; Finding the Right Analysis Tools; Tapping the HHS Resources.
|
505 |
8 |
|
|a Beware the "Required" Versus "Addressable" ConfusionMoving Beyond a Checklist of Security Questions; References; Chapter 5 -- Reducing the Risk of a Data Breach; Seeing the larger picture; The best mindset: guilty until proven innocent; Passwords, Policies, and Procedures; Establishing Effective Governance; Technological Solutions; Encryption; Firewalls; Antimalware/Antiviral Software; Access Control; Intrusion Detection and Intrusion Prevention Systems; Faxing Solutions; Auditing Your Computer Systems; Making Email More Secure; Establishing Physical Safeguards; Protecting Big Data.
|
505 |
8 |
|
|a Testing Your Network SecurityCybersecurity Insurance; References; Chapter 6 -- Mobile Device Security; Thinking strategically; Covering the Basics; BYOD: Bring Your Own Disaster?; Mobile Device Management Software; The Virtues of Virtual Private Networks; Appreciating the Difference Between Http and Https; References; Chapter 7 -- Medical Device Security; How real is the threat?; Taking a closer look at the "pathology" behind medjacking; What is the FDA Doing?; Dealing with Existing Medical Device Vulnerabilities; How are medical device companies coping?; Firming up the Firmware.
|
505 |
8 |
|
|a Are medical device manufacturers HIPAA accountable?Weighing Your Security Options; References; Chapter 8 -- Educating Medical and Administrative Staff; Culture before education; Seeing the Bigger Picture; Understanding the Psychology of Change; Managing the Training Process; What Should the Training Consist of?; References; Chapter 9 -- HIPAA, HITECH, and the Business Associate; Evaluating the Threat; Are you a Business Associate?; Formal Agreements are a Must; More Exceptions to the Rule; What Should a Business Associate Agreement Look Like?; References.
|
505 |
8 |
|
|a Chapter 10 -- Preparing for and Coping With a Data Breach.
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a This book demonstrates how to conduct an in-depth analysis of a healthcare organization's information risk level, offers specific measures for lowering the risk of a data breach, and outlines the steps necessary when an organization experiences a data breach, even when it has taken all the right precautions.
|
650 |
|
0 |
|a Medical records
|x Access control.
|
650 |
|
0 |
|a Data protection
|z Great Britain.
|
650 |
|
0 |
|a Confidential communications
|x Physicians.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Confidential communications.
|
650 |
|
0 |
|a Decision making.
|
650 |
|
0 |
|a Risk.
|
650 |
1 |
2 |
|a Electronic Health Records
|0 (DNLM)D057286
|
650 |
1 |
2 |
|a Computer Security
|0 (DNLM)D016494
|
650 |
2 |
2 |
|a Confidentiality
|0 (DNLM)D003219
|
650 |
2 |
2 |
|a Decision Making
|0 (DNLM)D003657
|
650 |
2 |
2 |
|a Risk
|0 (DNLM)D012306
|
650 |
2 |
2 |
|a Health Information Management
|x standards
|0 (DNLM)D063025Q000592
|
650 |
|
6 |
|a Dossiers m�edicaux
|x Acc�es
|x Contr�ole.
|0 (CaQQLa)201-0053718
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|0 (CaQQLa)201-0061151
|z Grande-Bretagne.
|0 (CaQQLa)201-0441031
|
650 |
|
6 |
|a M�edecine
|x Secret professionnel.
|0 (CaQQLa)201-0046507
|
650 |
|
6 |
|a S�ecurit�e informatique.
|0 (CaQQLa)201-0061152
|
650 |
|
6 |
|a Secret professionnel.
|0 (CaQQLa)201-0008318
|
650 |
|
6 |
|a Prise de d�ecision.
|0 (CaQQLa)201-0007575
|
650 |
|
6 |
|a Risque.
|0 (CaQQLa)201-0013134
|
650 |
|
7 |
|a decision making.
|2 aat
|0 (CStmoGRI)aat300054615
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Risk
|2 fast
|0 (OCoLC)fst01098118
|
650 |
|
7 |
|a Decision making
|2 fast
|0 (OCoLC)fst00889035
|
650 |
|
7 |
|a Confidential communications
|2 fast
|0 (OCoLC)fst00874701
|
650 |
|
7 |
|a Computer security
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Confidential communications
|x Physicians
|2 fast
|0 (OCoLC)fst00874720
|
650 |
|
7 |
|a Data protection
|2 fast
|0 (OCoLC)fst00887958
|
650 |
|
7 |
|a Medical records
|x Access control
|2 fast
|0 (OCoLC)fst01014549
|
651 |
|
7 |
|a Great Britain
|2 fast
|0 (OCoLC)fst01204623
|
700 |
1 |
|
|a Andress, Jason,
|e editor.
|
776 |
0 |
8 |
|i Print version :
|z 9780128043929
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9780128043929
|z Texto completo
|