Cargando…

Protecting patient information : a decision-maker's guide to risk, prevention, and damage control /

This book demonstrates how to conduct an in-depth analysis of a healthcare organization's information risk level, offers specific measures for lowering the risk of a data breach, and outlines the steps necessary when an organization experiences a data breach, even when it has taken all the righ...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Cerrato, Paul (Autor)
Otros Autores: Andress, Jason (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam : Syngress is an imprint of Elsevier, 2016.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ii 4500
001 SCIDIR_ocn946997515
003 OCoLC
005 20231120112103.0
006 m o d
007 cr cnu---unuuu
008 160420s2016 ne ob 001 0 eng d
010 |a  2016930217 
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d IDEBK  |d YDXCP  |d N$T  |d OCLCF  |d EBLCP  |d OPELS  |d UPM  |d IDB  |d OTZ  |d MERUC  |d OCLCQ  |d U3W  |d D6H  |d WRM  |d AU@  |d GGVRL  |d EZC  |d OCLCQ  |d WYU  |d OCLCA  |d MERER  |d OCLCO  |d OCLCA  |d OCLCQ  |d OCLCA  |d UKMGB  |d OCLCQ  |d SDF  |d LVT  |d VT2  |d KUWAI  |d OCLCO  |d OCLCQ  |d OCL  |d OCLCO 
015 |a GBB655475  |2 bnb 
016 7 |a 101688820  |2 DNLM 
016 7 |a 017809428  |2 Uk 
019 |a 956735902  |a 1066495867  |a 1229386285  |a 1235825340 
020 |a 9780128044117  |q (electronic bk.) 
020 |a 012804411X  |q (electronic bk.) 
020 |z 9780128043929 
020 |z 012804392X 
035 |a (OCoLC)946997515  |z (OCoLC)956735902  |z (OCoLC)1066495867  |z (OCoLC)1229386285  |z (OCoLC)1235825340 
043 |a e-uk--- 
050 4 |a RA976 
060 4 |a 2016 F-929 
060 4 |a WX 175 
072 7 |a BUS  |x 000000  |2 bisacsh 
082 0 4 |a 651.504261  |2 23 
100 1 |a Cerrato, Paul,  |e author. 
245 1 0 |a Protecting patient information :  |b a decision-maker's guide to risk, prevention, and damage control /  |c Paul Cerrato ; Jason Andress, technical editor. 
264 1 |a Amsterdam :  |b Syngress is an imprint of Elsevier,  |c 2016. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from PDF title page (EBSCO, viewed April 25, 2016). 
500 |a Includes index. 
505 0 |a Cover ; Title Page; Copyright Page; Disclaimer; Dedication; Contents; About the Author; Preface; Chapter 1 -- Dissecting a Book Title; Chapter 2 -- How Well Protected is Your Protected Health Information? Perception Versus Reality; The Cost of Insecurity is Steep; A Closer Look at Data Breach Fines; Do not ignore individual states in breach investigations; Fines are Only Part of the Problem; Factoring in the Meaningful Use Program; Calculating the Cost of Security; References; Chapter 3 -- Regulations Governing Protected Health Information; Defining the Crown Jewels. 
505 8 |a HIPAA Privacy Versus Security Rules: Related But DifferentTechnology is only part of the equation; Enforcing HIPAA Regulations; A closer look at the HIPAA Security Rule; The HIPAA Breach Notification Rule; The Role of the Federal Trade Commission; Do not forget State Laws; References; Chapter 4 -- Risk Analysis; Learning the jargon; Vulnerability; Threat Versus Risk; Compliance Versus Management; The ONC Approach to Risk Analysis and Security Management; Step 1; Step 2; Step 3; Step 4; Finding the Right Analysis Tools; Tapping the HHS Resources. 
505 8 |a Beware the "Required" Versus "Addressable" ConfusionMoving Beyond a Checklist of Security Questions; References; Chapter 5 -- Reducing the Risk of a Data Breach; Seeing the larger picture; The best mindset: guilty until proven innocent; Passwords, Policies, and Procedures; Establishing Effective Governance; Technological Solutions; Encryption; Firewalls; Antimalware/Antiviral Software; Access Control; Intrusion Detection and Intrusion Prevention Systems; Faxing Solutions; Auditing Your Computer Systems; Making Email More Secure; Establishing Physical Safeguards; Protecting Big Data. 
505 8 |a Testing Your Network SecurityCybersecurity Insurance; References; Chapter 6 -- Mobile Device Security; Thinking strategically; Covering the Basics; BYOD: Bring Your Own Disaster?; Mobile Device Management Software; The Virtues of Virtual Private Networks; Appreciating the Difference Between Http and Https; References; Chapter 7 -- Medical Device Security; How real is the threat?; Taking a closer look at the "pathology" behind medjacking; What is the FDA Doing?; Dealing with Existing Medical Device Vulnerabilities; How are medical device companies coping?; Firming up the Firmware. 
505 8 |a Are medical device manufacturers HIPAA accountable?Weighing Your Security Options; References; Chapter 8 -- Educating Medical and Administrative Staff; Culture before education; Seeing the Bigger Picture; Understanding the Psychology of Change; Managing the Training Process; What Should the Training Consist of?; References; Chapter 9 -- HIPAA, HITECH, and the Business Associate; Evaluating the Threat; Are you a Business Associate?; Formal Agreements are a Must; More Exceptions to the Rule; What Should a Business Associate Agreement Look Like?; References. 
505 8 |a Chapter 10 -- Preparing for and Coping With a Data Breach. 
504 |a Includes bibliographical references and index. 
520 |a This book demonstrates how to conduct an in-depth analysis of a healthcare organization's information risk level, offers specific measures for lowering the risk of a data breach, and outlines the steps necessary when an organization experiences a data breach, even when it has taken all the right precautions. 
650 0 |a Medical records  |x Access control. 
650 0 |a Data protection  |z Great Britain. 
650 0 |a Confidential communications  |x Physicians. 
650 0 |a Computer security. 
650 0 |a Confidential communications. 
650 0 |a Decision making. 
650 0 |a Risk. 
650 1 2 |a Electronic Health Records  |0 (DNLM)D057286 
650 1 2 |a Computer Security  |0 (DNLM)D016494 
650 2 2 |a Confidentiality  |0 (DNLM)D003219 
650 2 2 |a Decision Making  |0 (DNLM)D003657 
650 2 2 |a Risk  |0 (DNLM)D012306 
650 2 2 |a Health Information Management  |x standards  |0 (DNLM)D063025Q000592 
650 6 |a Dossiers m�edicaux  |x Acc�es  |x Contr�ole.  |0 (CaQQLa)201-0053718 
650 6 |a Protection de l'information (Informatique)  |0 (CaQQLa)201-0061151  |z Grande-Bretagne.  |0 (CaQQLa)201-0441031 
650 6 |a M�edecine  |x Secret professionnel.  |0 (CaQQLa)201-0046507 
650 6 |a S�ecurit�e informatique.  |0 (CaQQLa)201-0061152 
650 6 |a Secret professionnel.  |0 (CaQQLa)201-0008318 
650 6 |a Prise de d�ecision.  |0 (CaQQLa)201-0007575 
650 6 |a Risque.  |0 (CaQQLa)201-0013134 
650 7 |a decision making.  |2 aat  |0 (CStmoGRI)aat300054615 
650 7 |a BUSINESS & ECONOMICS  |x General.  |2 bisacsh 
650 7 |a Risk  |2 fast  |0 (OCoLC)fst01098118 
650 7 |a Decision making  |2 fast  |0 (OCoLC)fst00889035 
650 7 |a Confidential communications  |2 fast  |0 (OCoLC)fst00874701 
650 7 |a Computer security  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Confidential communications  |x Physicians  |2 fast  |0 (OCoLC)fst00874720 
650 7 |a Data protection  |2 fast  |0 (OCoLC)fst00887958 
650 7 |a Medical records  |x Access control  |2 fast  |0 (OCoLC)fst01014549 
651 7 |a Great Britain  |2 fast  |0 (OCoLC)fst01204623 
700 1 |a Andress, Jason,  |e editor. 
776 0 8 |i Print version :  |z 9780128043929 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9780128043929  |z Texto completo