The practical guide to HIPAA privacy and security compliance / Rebecca Herold and Kevin Beaver.

Publisher's description: Following in the footsteps of its bestselling predecessor, The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition is a one-stop, up-to-date resource on Health Insurance Portability and Accountability Act (HIPAA) privacy and security, including deta...

Full description

Saved in:
Bibliographic Details
Main Authors: Herold, Rebecca (Author), Beaver, Kevin (Author)
Other title:HIPAA privacy and security compliance.
Health Insurance Portability and Accountability Act privacy and security compliance.
Format: Book
Language:English
Published: Boca Raton : CRC Press, Taylor & Francis Group, [2015]
Edition:Second edition.
Subjects:

MARC

LEADER 00000cam a2200000 i 4500
001 lb638397
003 CoU-L
008 140818s2015 flua b 001 0 eng
005 20231101205810.5
010 |a  2014033165 
020 |a 9781439855584 (hardback) 
020 |a 1439855587 (hardback) 
035 |a (OCoLC)888026424 
035 |a .b638397x  |b lst1   |c - 
040 |a DLC  |b eng  |e rda  |c DLC  |d OCLCO  |d IMX  |d UKMGB  |d UtOrBLW 
042 |a pcc 
043 |a n-us--- 
049 |a UCXA 
082 0 0 |a 344.7304/1  |2 23 
090 |a KF3827.R4  |b B43 2015 
100 1 |a Herold, Rebecca,  |e author.  |0 http://id.loc.gov/authorities/names/n2001093306  |1 http://isni.org/isni/0000000117275076 
245 1 4 |a The practical guide to HIPAA privacy and security compliance /  |c Rebecca Herold and Kevin Beaver. 
246 3 0 |a HIPAA privacy and security compliance. 
246 3 |a Health Insurance Portability and Accountability Act privacy and security compliance. 
250 |a Second edition. 
264 1 |a Boca Raton :  |b CRC Press, Taylor & Francis Group,  |c [2015] 
300 |a xxx, 514 pages ;  |c 23 cm 
336 |a text  |b txt  |2 rdacontent. 
337 |a unmediated  |b n  |2 rdamedia. 
338 |a volume  |b nc  |2 rdacarrier. 
500 |a Revised edition of: The practical guide to HIPAA privacy and security compliance / Kevin Beaver and Rebecca Herold. 2004. 
500 |a "An Auerbach book." 
504 |a Includes bibliographical references (pages 485-498) and index. 
505 0 0 |g Foreword /  |r Mark Lutes,  |r Epstein Becker Green --  |t Introduction to HIPAA --  |t Related regulations, laws, standards, and guidance --  |t Preparing for HIPAA, HITECH, and other compliance changes --  |t HIPAA cost considerations --  |t Relationship between security and privacy --  |t HIPAA privacy rule requirements overview --  |t Performing a privacy rule gap analysis and risk analysis --  |t Writing effective privacy policies --  |t State preemption --  |t Crafting a privacy implementation plan --  |t Privacy rule compliance checklist --  |t Security rule requirements overview --  |t Performing a security rule risk analysis --  |t Writing effective information security policies --  |t Crafting a security implementation plan --  |t Security rule compliance checklist --  |t Health care provider issues --  |t Health care clearinghouse issues --  |t Health plan issues --  |t Employer issues --  |t Business associate issues --  |t Building a HIPAA-compliant technology infrastructure --  |t Crafting security incident procedures and contingency plans --  |t Outsourcing information technology services --  |t HIPAA training, education, and awareness --  |t Performing ongoing HIPAA compliance reviews and audits --  |g Appendices. 
520 |a Publisher's description: Following in the footsteps of its bestselling predecessor, The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition is a one-stop, up-to-date resource on Health Insurance Portability and Accountability Act (HIPAA) privacy and security, including details on the HITECH Act, the 2013 Omnibus Rule, and the pending rules. Updated and revised with several new sections, this edition defines what HIPAA is, what it requires, and what you need to do to achieve compliance. The book provides an easy-to-understand overview of HIPAA privacy and security rules and compliance tasks. Supplying authoritative insights into real-world HIPAA privacy and security issues, it summarizes the analysis, training, and technology needed to properly plan and implement privacy and security policies, training, and an overall program to manage information risks. Instead of focusing on technical jargon, the book spells out what your organization must do to achieve and maintain compliance requirements on an ongoing basis. 
650 0 |a Medical records  |x Law and legislation  |z United States.  |0 http://id.loc.gov/authorities/subjects/sh2008107621 
650 0 |a Medical records  |x Access control  |z United States.  |0 http://id.loc.gov/authorities/subjects/sh2007008835 
650 0 |a Medical care  |x Security measures  |z United States. 
650 0 |a Health insurance continuation coverage  |z United States. 
700 1 |a Beaver, Kevin,  |e author.  |0 http://id.loc.gov/authorities/names/n2002159101  |1 http://isni.org/isni/0000000458948339 
775 0 8 |i Revision of:  |a Beaver, Kevin.  |t Practical guide to HIPAA privacy and security compliance.  |d Boca Raton : Auerbach Publications, c2004  |z 0849319536  |w (DLC) 2003057900. 
902 |a 230517 
944 |a MARS - RDA ENRICHED 
945 |l lst1  
994 |a lst1 
999 f f |i b674ebea-4c3a-54a9-9056-ade31cee8853  |s fbceaf57-98da-57c9-8b51-638e2818760a 
999 |b 1  |c 150114  |d m  |e a  |f -  |g 4 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Law Campus  |c Law  |d Law Library - Stacks 1st floor  |e KF3827.R4 B43 2015  |h Library of Congress classification  |i book  |m U182004799033  |n 1 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Law Campus  |c Law  |d Law Library - Reserve 2nd floor  |e KF3827.R4 B43 2015  |h Library of Congress classification  |i Book, no Prospector  |m U182005226261  |n 2