000 | 05553cam a2200685Ii 4500 | ||
---|---|---|---|
001 | ocn946997515 | ||
003 | OCoLC | ||
005 | 20190328114814.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 160420s2016 ne o 001 0 eng d | ||
040 |
_aN$T _beng _erda _epn _cN$T _dIDEBK _dYDXCP _dN$T _dOCLCF _dEBLCP _dOPELS _dUPM _dIDB _dOTZ _dMERUC _dOCLCQ _dU3W _dD6H _dWRM _dAU@ _dGGVRL _dEZC _dOCLCQ _dWYU _dOCLCA _dMERER _dOCLCO _dOCLCA _dOCLCQ _dOCLCA |
||
016 | 7 |
_a101688820 _2DNLM |
|
019 |
_a956735902 _a1066495867 |
||
020 |
_a9780128044117 _q(electronic bk.) |
||
020 |
_a012804411X _q(electronic bk.) |
||
020 | _z9780128043929 | ||
020 | _z012804392X | ||
035 |
_a(OCoLC)946997515 _z(OCoLC)956735902 _z(OCoLC)1066495867 |
||
043 | _ae-uk--- | ||
050 | 4 | _aRA976 | |
060 | 0 | 0 | _a2016 F-929 |
060 | 1 | 0 | _aWX 175 |
072 | 7 |
_aBUS _x000000 _2bisacsh |
|
082 | 0 | 4 |
_a651.504261 _223 |
100 | 1 |
_aCerrato, Paul, _eauthor. |
|
245 | 1 | 0 |
_aProtecting patient information : a decision-maker's guide to risk, prevention, and damage control / _h[electronic resource] _cPaul Cerrato ; Jason Andress, technical editor. |
264 | 1 |
_aAmsterdam : _bSyngress is an imprint of Elsevier, _c2016. |
|
300 | _a1 online resource | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
588 | 0 | _aOnline resource; title from PDF title page (EBSCO, viewed April 25, 2016). | |
500 | _aIncludes index. | ||
505 | 0 | _aCover ; Title Page; Copyright Page; Disclaimer; Dedication; Contents; About the Author; Preface; Chapter 1 -- Dissecting a Book Title; Chapter 2 -- How Well Protected is Your Protected Health Information? Perception Versus Reality; The Cost of Insecurity is Steep; A Closer Look at Data Breach Fines; Do not ignore individual states in breach investigations; Fines are Only Part of the Problem; Factoring in the Meaningful Use Program; Calculating the Cost of Security; References; Chapter 3 -- Regulations Governing Protected Health Information; Defining the Crown Jewels. | |
505 | 8 | _aHIPAA Privacy Versus Security Rules: Related But DifferentTechnology is only part of the equation; Enforcing HIPAA Regulations; A closer look at the HIPAA Security Rule; The HIPAA Breach Notification Rule; The Role of the Federal Trade Commission; Do not forget State Laws; References; Chapter 4 -- Risk Analysis; Learning the jargon; Vulnerability; Threat Versus Risk; Compliance Versus Management; The ONC Approach to Risk Analysis and Security Management; Step 1; Step 2; Step 3; Step 4; Finding the Right Analysis Tools; Tapping the HHS Resources. | |
505 | 8 | _aBeware the "Required" Versus "Addressable" ConfusionMoving Beyond a Checklist of Security Questions; References; Chapter 5 -- Reducing the Risk of a Data Breach; Seeing the larger picture; The best mindset: guilty until proven innocent; Passwords, Policies, and Procedures; Establishing Effective Governance; Technological Solutions; Encryption; Firewalls; Antimalware/Antiviral Software; Access Control; Intrusion Detection and Intrusion Prevention Systems; Faxing Solutions; Auditing Your Computer Systems; Making Email More Secure; Establishing Physical Safeguards; Protecting Big Data. | |
505 | 8 | _aTesting Your Network SecurityCybersecurity Insurance; References; Chapter 6 -- Mobile Device Security; Thinking strategically; Covering the Basics; BYOD: Bring Your Own Disaster?; Mobile Device Management Software; The Virtues of Virtual Private Networks; Appreciating the Difference Between Http and Https; References; Chapter 7 -- Medical Device Security; How real is the threat?; Taking a closer look at the "pathology" behind medjacking; What is the FDA Doing?; Dealing with Existing Medical Device Vulnerabilities; How are medical device companies coping?; Firming up the Firmware. | |
505 | 8 | _aAre medical device manufacturers HIPAA accountable?Weighing Your Security Options; References; Chapter 8 -- Educating Medical and Administrative Staff; Culture before education; Seeing the Bigger Picture; Understanding the Psychology of Change; Managing the Training Process; What Should the Training Consist of?; References; Chapter 9 -- HIPAA, HITECH, and the Business Associate; Evaluating the Threat; Are you a Business Associate?; Formal Agreements are a Must; More Exceptions to the Rule; What Should a Business Associate Agreement Look Like?; References. | |
505 | 8 | _aChapter 10 -- Preparing for and Coping With a Data Breach. | |
504 | _aIncludes bibliographical references and index. | ||
650 | 0 |
_aMedical records _xAccess control. |
|
650 | 0 |
_aData protection _zGreat Britain. |
|
650 | 0 |
_aConfidential communications _xPhysicians. |
|
650 | 7 |
_aBUSINESS & ECONOMICS _xGeneral. _2bisacsh |
|
650 | 7 |
_aConfidential communications _xPhysicians. _2fast _0(OCoLC)fst00874720 |
|
650 | 7 |
_aData protection. _2fast _0(OCoLC)fst00887958 |
|
650 | 7 |
_aMedical records _xAccess control. _2fast _0(OCoLC)fst01014549 |
|
651 | 7 |
_aGreat Britain. _2fast _0(OCoLC)fst01204623 |
|
650 | 1 | 2 |
_aElectronic Health Records. _0(DNLM)D057286 |
650 | 1 | 2 |
_aComputer Security. _0(DNLM)D016494 |
650 | 2 | 2 |
_aConfidentiality. _0(DNLM)D003219 |
650 | 2 | 2 |
_aDecision Making. _0(DNLM)D003657 |
650 | 2 | 2 |
_aRisk. _0(DNLM)D012306 |
650 | 2 | 2 |
_aHealth Information Management _xstandards. _0(DNLM)D063025Q000592 |
655 | 4 | _aElectronic books. | |
655 | 0 | _aElectronic book. | |
700 | 1 |
_aAndress, Jason, _eeditor. |
|
856 | 4 | 0 |
_3ScienceDirect _uhttp://www.sciencedirect.com/science/book/9780128043929 |
999 |
_c247318 _d247318 |