Cargando…

Protecting patient information : a decision-maker's guide to risk, prevention, and damage control /

This book demonstrates how to conduct an in-depth analysis of a healthcare organization's information risk level, offers specific measures for lowering the risk of a data breach, and outlines the steps necessary when an organization experiences a data breach, even when it has taken all the righ...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Cerrato, Paul (Autor)
Otros Autores: Andress, Jason (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam : Syngress is an imprint of Elsevier, 2016.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Cover ; Title Page; Copyright Page; Disclaimer; Dedication; Contents; About the Author; Preface; Chapter 1
  • Dissecting a Book Title; Chapter 2
  • How Well Protected is Your Protected Health Information? Perception Versus Reality; The Cost of Insecurity is Steep; A Closer Look at Data Breach Fines; Do not ignore individual states in breach investigations; Fines are Only Part of the Problem; Factoring in the Meaningful Use Program; Calculating the Cost of Security; References; Chapter 3
  • Regulations Governing Protected Health Information; Defining the Crown Jewels.
  • HIPAA Privacy Versus Security Rules: Related But DifferentTechnology is only part of the equation; Enforcing HIPAA Regulations; A closer look at the HIPAA Security Rule; The HIPAA Breach Notification Rule; The Role of the Federal Trade Commission; Do not forget State Laws; References; Chapter 4
  • Risk Analysis; Learning the jargon; Vulnerability; Threat Versus Risk; Compliance Versus Management; The ONC Approach to Risk Analysis and Security Management; Step 1; Step 2; Step 3; Step 4; Finding the Right Analysis Tools; Tapping the HHS Resources.
  • Beware the "Required" Versus "Addressable" ConfusionMoving Beyond a Checklist of Security Questions; References; Chapter 5
  • Reducing the Risk of a Data Breach; Seeing the larger picture; The best mindset: guilty until proven innocent; Passwords, Policies, and Procedures; Establishing Effective Governance; Technological Solutions; Encryption; Firewalls; Antimalware/Antiviral Software; Access Control; Intrusion Detection and Intrusion Prevention Systems; Faxing Solutions; Auditing Your Computer Systems; Making Email More Secure; Establishing Physical Safeguards; Protecting Big Data.
  • Testing Your Network SecurityCybersecurity Insurance; References; Chapter 6
  • Mobile Device Security; Thinking strategically; Covering the Basics; BYOD: Bring Your Own Disaster?; Mobile Device Management Software; The Virtues of Virtual Private Networks; Appreciating the Difference Between Http and Https; References; Chapter 7
  • Medical Device Security; How real is the threat?; Taking a closer look at the "pathology" behind medjacking; What is the FDA Doing?; Dealing with Existing Medical Device Vulnerabilities; How are medical device companies coping?; Firming up the Firmware.
  • Are medical device manufacturers HIPAA accountable?Weighing Your Security Options; References; Chapter 8
  • Educating Medical and Administrative Staff; Culture before education; Seeing the Bigger Picture; Understanding the Psychology of Change; Managing the Training Process; What Should the Training Consist of?; References; Chapter 9
  • HIPAA, HITECH, and the Business Associate; Evaluating the Threat; Are you a Business Associate?; Formal Agreements are a Must; More Exceptions to the Rule; What Should a Business Associate Agreement Look Like?; References.
  • Chapter 10
  • Preparing for and Coping With a Data Breach.