The practical guide to HIPAA privacy and security compliance / Rebecca Herold and Kevin Beaver.
Publisher's description: Following in the footsteps of its bestselling predecessor, The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition is a one-stop, up-to-date resource on Health Insurance Portability and Accountability Act (HIPAA) privacy and security, including deta...
Saved in:
Main Authors: | , |
---|---|
Other title: | HIPAA privacy and security compliance. Health Insurance Portability and Accountability Act privacy and security compliance. |
Format: | Book |
Language: | English |
Published: |
Boca Raton :
CRC Press, Taylor & Francis Group,
[2015]
|
Edition: | Second edition. |
Subjects: |
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | lb638397 | ||
003 | CoU-L | ||
008 | 140818s2015 flua b 001 0 eng | ||
005 | 20231101205810.5 | ||
010 | |a 2014033165 | ||
020 | |a 9781439855584 (hardback) | ||
020 | |a 1439855587 (hardback) | ||
035 | |a (OCoLC)888026424 | ||
035 | |a .b638397x |b lst1 |c - | ||
040 | |a DLC |b eng |e rda |c DLC |d OCLCO |d IMX |d UKMGB |d UtOrBLW | ||
042 | |a pcc | ||
043 | |a n-us--- | ||
049 | |a UCXA | ||
082 | 0 | 0 | |a 344.7304/1 |2 23 |
090 | |a KF3827.R4 |b B43 2015 | ||
100 | 1 | |a Herold, Rebecca, |e author. |0 http://id.loc.gov/authorities/names/n2001093306 |1 http://isni.org/isni/0000000117275076 | |
245 | 1 | 4 | |a The practical guide to HIPAA privacy and security compliance / |c Rebecca Herold and Kevin Beaver. |
246 | 3 | 0 | |a HIPAA privacy and security compliance. |
246 | 3 | |a Health Insurance Portability and Accountability Act privacy and security compliance. | |
250 | |a Second edition. | ||
264 | 1 | |a Boca Raton : |b CRC Press, Taylor & Francis Group, |c [2015] | |
300 | |a xxx, 514 pages ; |c 23 cm | ||
336 | |a text |b txt |2 rdacontent. | ||
337 | |a unmediated |b n |2 rdamedia. | ||
338 | |a volume |b nc |2 rdacarrier. | ||
500 | |a Revised edition of: The practical guide to HIPAA privacy and security compliance / Kevin Beaver and Rebecca Herold. 2004. | ||
500 | |a "An Auerbach book." | ||
504 | |a Includes bibliographical references (pages 485-498) and index. | ||
505 | 0 | 0 | |g Foreword / |r Mark Lutes, |r Epstein Becker Green -- |t Introduction to HIPAA -- |t Related regulations, laws, standards, and guidance -- |t Preparing for HIPAA, HITECH, and other compliance changes -- |t HIPAA cost considerations -- |t Relationship between security and privacy -- |t HIPAA privacy rule requirements overview -- |t Performing a privacy rule gap analysis and risk analysis -- |t Writing effective privacy policies -- |t State preemption -- |t Crafting a privacy implementation plan -- |t Privacy rule compliance checklist -- |t Security rule requirements overview -- |t Performing a security rule risk analysis -- |t Writing effective information security policies -- |t Crafting a security implementation plan -- |t Security rule compliance checklist -- |t Health care provider issues -- |t Health care clearinghouse issues -- |t Health plan issues -- |t Employer issues -- |t Business associate issues -- |t Building a HIPAA-compliant technology infrastructure -- |t Crafting security incident procedures and contingency plans -- |t Outsourcing information technology services -- |t HIPAA training, education, and awareness -- |t Performing ongoing HIPAA compliance reviews and audits -- |g Appendices. |
520 | |a Publisher's description: Following in the footsteps of its bestselling predecessor, The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition is a one-stop, up-to-date resource on Health Insurance Portability and Accountability Act (HIPAA) privacy and security, including details on the HITECH Act, the 2013 Omnibus Rule, and the pending rules. Updated and revised with several new sections, this edition defines what HIPAA is, what it requires, and what you need to do to achieve compliance. The book provides an easy-to-understand overview of HIPAA privacy and security rules and compliance tasks. Supplying authoritative insights into real-world HIPAA privacy and security issues, it summarizes the analysis, training, and technology needed to properly plan and implement privacy and security policies, training, and an overall program to manage information risks. Instead of focusing on technical jargon, the book spells out what your organization must do to achieve and maintain compliance requirements on an ongoing basis. | ||
650 | 0 | |a Medical records |x Law and legislation |z United States. |0 http://id.loc.gov/authorities/subjects/sh2008107621 | |
650 | 0 | |a Medical records |x Access control |z United States. |0 http://id.loc.gov/authorities/subjects/sh2007008835 | |
650 | 0 | |a Medical care |x Security measures |z United States. | |
650 | 0 | |a Health insurance continuation coverage |z United States. | |
700 | 1 | |a Beaver, Kevin, |e author. |0 http://id.loc.gov/authorities/names/n2002159101 |1 http://isni.org/isni/0000000458948339 | |
775 | 0 | 8 | |i Revision of: |a Beaver, Kevin. |t Practical guide to HIPAA privacy and security compliance. |d Boca Raton : Auerbach Publications, c2004 |z 0849319536 |w (DLC) 2003057900. |
902 | |a 230517 | ||
944 | |a MARS - RDA ENRICHED | ||
945 | |l lst1 | ||
994 | |a lst1 | ||
999 | f | f | |i b674ebea-4c3a-54a9-9056-ade31cee8853 |s fbceaf57-98da-57c9-8b51-638e2818760a |
999 | |b 1 |c 150114 |d m |e a |f - |g 4 | ||
952 | f | f | |p Can circulate |a University of Colorado Boulder |b Law Campus |c Law |d Law Library - Stacks 1st floor |e KF3827.R4 B43 2015 |h Library of Congress classification |i book |m U182004799033 |n 1 |
952 | f | f | |p Can circulate |a University of Colorado Boulder |b Law Campus |c Law |d Law Library - Reserve 2nd floor |e KF3827.R4 B43 2015 |h Library of Congress classification |i Book, no Prospector |m U182005226261 |n 2 |