eBooks-it.org Logo
eBooks-IT.org Inner Image

Healthcare Information Privacy and Security

Regulatory Compliance and Data Security in the Age of Electronic Health Records

Healthcare Information Privacy and Security Image

Book Details:

Publisher:Apress
Series: Apress
Author:Bernard Peter Robichau
Edition:1
ISBN-10:1430266767
ISBN-13:9781430266761
Pages:194
Published:Jun 24 2014
Posted:May 07 2015
Language:English
Book format:PDF
Book size:2.34 MB

Book Description:

Healthcare IT is the growth industry right now, and the need for guidance in regard to privacy and security is huge. Why? With new federal incentives and penalties tied to the HITECH Act, HIPAA, and the implementation of Electronic Health Record (EHR) systems, medical practices and healthcare systems are implementing new software at breakneck speed. Yet privacy and security considerations are often an afterthought, putting healthcare organizations at risk of fines and damage to their reputations. Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records outlines the new regulatory regime, and it also provides IT professionals with the processes and protocols, standards, and governance tools they need to maintain a secure and legal environment for data and records. Its a concrete resource that will help you understand the issues affecting the law and regulatory compliance, privacy, and security in the enterprise. As healthcare IT security expert Bernard Peter Robichau II shows, the success of a privacy and security initiative lies not just in proper planning but also in identifying who will own the implementation and maintain technologies and processes. From executive sponsors to system analysts and administrators, a properly designed security program requires that that the right people are assigned to the right tasks and have the tools they need. Robichau explains how to design and implement that program with an eye toward long-term success. Putting processes and systems in place is, of course, only the start. Robichau also shows how to manage your security program and maintain operational support including ongoing maintenance and policy updates. (Because regulations never sleep!) This book will help you devise solutions that include: Identity and access management systems Proper application design Physical and environmental safeguards Systemwide and client-based security configurations Safeguards for patient data Training and auditing procedures Governance and policy administration Healthcare Information Privacy and Security is the definitive guide to help you through the process of maintaining privacy and security in the healthcare industry. It will help you keep health information safe, and it will help keep your organizationwhether local clinic or major hospital systemon the right side of the law. What youll learn The basics ofHITECH, HIPAA, and other federal laws driving change in healthcare IT How to identify the core issues of privacy and security in a healthcare environment. The steps required to develop and execute a security project plan. The technologies and tools available to aid in the process of deploying a secure EHR system. The core regulatory issues and practical matters of security in a healthcare environment. The frameworks and methodology that will assist in tackling the issues of privacy and security. The technologies impacted by matters of privacy and security along with proposals for managing them effectively. Who this book is for Healthcare professionals who work in information technology, information security, health information management, as well as in the more specialized areas of privacy, compliance, and informatics. The book is also useful for consultants working in the field of information security who require a better understanding of the challenges facing the healthcare industry, EMR Vendors who are tasked with guiding their customers through a secure implementation of their product, and technology professionals seeking to make an entry into the world of Healthcare IT. Table of ContentsChapter 1. Introduction: The Long-Awaited Manual Chapter 2. Waking the Sleeping Giant: A Brief History of Healthcare ITChapter 3. It's Not Just HIPAA: Legislating Privacy and SecurityChapter 4. Assembling the Team: Bringing the Right Human Resources to the TableChapter 5. Sifting Through the Wreckage: The Security Audit Chapter 6. Review Your Policies and Develop a Plan: Strategies for SuccessChapter 7. Identity and Access Management: Know Your User BaseChapter 8. Application Design: Maximum Efficiency or Minimum Necessary?Chapter 9. Access Validation ProcessChapter 10. Physical and Environmental Safeguards: Security Beyond the Ones and ZerosChapter 11. Systemwide and Client-Based Security Configuration: Making Sure All the Pieces Fit Together Chapter 12. Safeguarding Patient Data from Prying Eyes: Knowing Where Your PHI ResidesChapter 13. People, the Most Crucial Element: Training the Masses to Respect the SystemChapter 14. Business Associates: The Human Resources Just Beyond Your ReachChapter 15. Security Project vs. Operational Support Chapter 16. Putting the Plan in Place: Ongoing Maintenance and Life after the Security ProjectAppendix A. Sample Business Associate AgreementAppendix B. Sample Rules of Behavior for Privileged User AccountsAppendix C. Breach Notification Process

Download Link:

Related Books:

Privacy and Security for Cloud Computing

Privacy and Security for Cloud Computing Image
This book analyzes the latest advances in privacy, security and risk technologies within cloud environments. With contributions from leading experts, the text presents both a solid overview of the field and novel, cutting-edge research. A Glossary is also included at the end of the book. Topics and features: considers the various forensic challenges for legal access to data in a cloud computing environment; discusses privacy impact assessments for the cloud, and examines the use of cloud audits to attenuate cloud security problems; reviews conceptual issues, basic requirements and practical suggestions for provisioning dynamically configured access control services in the cloud; proposes scoped invariants as a primitive for analyzing a cloud server f...

The Practical Guide to HIPAA Privacy and Security Compliance

The Practical Guide to HIPAA Privacy and Security Compliance Image
HIPAA is very complex. So are the privacy and security initiatives that must occur to reach and maintain HIPAA compliance. Organizations need a quick, concise reference in order to meet HIPAA requirements and maintain ongoing compliance. The Practical Guide to HIPAA Privacy and Security Compliance is a one-stop resource for real-world HIPAA privacy and security advice that you can immediately apply to your organization's unique situation. This how-to reference explains what HIPAA is about, what it requires, and what you can do to achieve and maintain compliance. It describes the HIPAA Privacy and Security Rules and compliance tasks in easy-to-understand language, focusing not on technical jargon, but on what you need to do to meet requirements.IT man...

CSA Guide to Cloud Computing

Implementing Cloud Privacy and Security
CSA Guide to Cloud Computing Image
CSA Guide to Cloud Computing brings you the most current and comprehensive understanding of cloud security issues and deployment techniques from industry thought leaders at the Cloud Security Alliance (CSA). For many years the CSA has been at the forefront of research and analysis into the most pressing security and privacy related issues associated with cloud computing. CSA Guide to Cloud Computing provides you with a one-stop source for industry-leading content, as well as a roadmap into the future considerations that the cloud presents. The authors of CSA Guide to Cloud Computing provide a wealth of industry expertise you won't find anywhere else. Author Raj Samani is the Chief Technical Officer for McAfee EMEA; author Jim Reavis is the Executive ...



2007 - 2021 © eBooks-IT.org