000 05553cam a2200685Ii 4500
001 ocn946997515
003 OCoLC
005 20190328114814.0
006 m o d
007 cr cnu---unuuu
008 160420s2016 ne o 001 0 eng d
040 _aN$T
_beng
_erda
_epn
_cN$T
_dIDEBK
_dYDXCP
_dN$T
_dOCLCF
_dEBLCP
_dOPELS
_dUPM
_dIDB
_dOTZ
_dMERUC
_dOCLCQ
_dU3W
_dD6H
_dWRM
_dAU@
_dGGVRL
_dEZC
_dOCLCQ
_dWYU
_dOCLCA
_dMERER
_dOCLCO
_dOCLCA
_dOCLCQ
_dOCLCA
016 7 _a101688820
_2DNLM
019 _a956735902
_a1066495867
020 _a9780128044117
_q(electronic bk.)
020 _a012804411X
_q(electronic bk.)
020 _z9780128043929
020 _z012804392X
035 _a(OCoLC)946997515
_z(OCoLC)956735902
_z(OCoLC)1066495867
043 _ae-uk---
050 4 _aRA976
060 0 0 _a2016 F-929
060 1 0 _aWX 175
072 7 _aBUS
_x000000
_2bisacsh
082 0 4 _a651.504261
_223
100 1 _aCerrato, Paul,
_eauthor.
245 1 0 _aProtecting patient information : a decision-maker's guide to risk, prevention, and damage control /
_h[electronic resource]
_cPaul Cerrato ; Jason Andress, technical editor.
264 1 _aAmsterdam :
_bSyngress is an imprint of Elsevier,
_c2016.
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
588 0 _aOnline resource; title from PDF title page (EBSCO, viewed April 25, 2016).
500 _aIncludes index.
505 0 _aCover ; Title Page; Copyright Page; Disclaimer; Dedication; Contents; About the Author; Preface; Chapter 1 -- Dissecting a Book Title; Chapter 2 -- How Well Protected is Your Protected Health Information? Perception Versus Reality; The Cost of Insecurity is Steep; A Closer Look at Data Breach Fines; Do not ignore individual states in breach investigations; Fines are Only Part of the Problem; Factoring in the Meaningful Use Program; Calculating the Cost of Security; References; Chapter 3 -- Regulations Governing Protected Health Information; Defining the Crown Jewels.
505 8 _aHIPAA Privacy Versus Security Rules: Related But DifferentTechnology is only part of the equation; Enforcing HIPAA Regulations; A closer look at the HIPAA Security Rule; The HIPAA Breach Notification Rule; The Role of the Federal Trade Commission; Do not forget State Laws; References; Chapter 4 -- Risk Analysis; Learning the jargon; Vulnerability; Threat Versus Risk; Compliance Versus Management; The ONC Approach to Risk Analysis and Security Management; Step 1; Step 2; Step 3; Step 4; Finding the Right Analysis Tools; Tapping the HHS Resources.
505 8 _aBeware the "Required" Versus "Addressable" ConfusionMoving Beyond a Checklist of Security Questions; References; Chapter 5 -- Reducing the Risk of a Data Breach; Seeing the larger picture; The best mindset: guilty until proven innocent; Passwords, Policies, and Procedures; Establishing Effective Governance; Technological Solutions; Encryption; Firewalls; Antimalware/Antiviral Software; Access Control; Intrusion Detection and Intrusion Prevention Systems; Faxing Solutions; Auditing Your Computer Systems; Making Email More Secure; Establishing Physical Safeguards; Protecting Big Data.
505 8 _aTesting Your Network SecurityCybersecurity Insurance; References; Chapter 6 -- Mobile Device Security; Thinking strategically; Covering the Basics; BYOD: Bring Your Own Disaster?; Mobile Device Management Software; The Virtues of Virtual Private Networks; Appreciating the Difference Between Http and Https; References; Chapter 7 -- Medical Device Security; How real is the threat?; Taking a closer look at the "pathology" behind medjacking; What is the FDA Doing?; Dealing with Existing Medical Device Vulnerabilities; How are medical device companies coping?; Firming up the Firmware.
505 8 _aAre medical device manufacturers HIPAA accountable?Weighing Your Security Options; References; Chapter 8 -- Educating Medical and Administrative Staff; Culture before education; Seeing the Bigger Picture; Understanding the Psychology of Change; Managing the Training Process; What Should the Training Consist of?; References; Chapter 9 -- HIPAA, HITECH, and the Business Associate; Evaluating the Threat; Are you a Business Associate?; Formal Agreements are a Must; More Exceptions to the Rule; What Should a Business Associate Agreement Look Like?; References.
505 8 _aChapter 10 -- Preparing for and Coping With a Data Breach.
504 _aIncludes bibliographical references and index.
650 0 _aMedical records
_xAccess control.
650 0 _aData protection
_zGreat Britain.
650 0 _aConfidential communications
_xPhysicians.
650 7 _aBUSINESS & ECONOMICS
_xGeneral.
_2bisacsh
650 7 _aConfidential communications
_xPhysicians.
_2fast
_0(OCoLC)fst00874720
650 7 _aData protection.
_2fast
_0(OCoLC)fst00887958
650 7 _aMedical records
_xAccess control.
_2fast
_0(OCoLC)fst01014549
651 7 _aGreat Britain.
_2fast
_0(OCoLC)fst01204623
650 1 2 _aElectronic Health Records.
_0(DNLM)D057286
650 1 2 _aComputer Security.
_0(DNLM)D016494
650 2 2 _aConfidentiality.
_0(DNLM)D003219
650 2 2 _aDecision Making.
_0(DNLM)D003657
650 2 2 _aRisk.
_0(DNLM)D012306
650 2 2 _aHealth Information Management
_xstandards.
_0(DNLM)D063025Q000592
655 4 _aElectronic books.
655 0 _aElectronic book.
700 1 _aAndress, Jason,
_eeditor.
856 4 0 _3ScienceDirect
_uhttp://www.sciencedirect.com/science/book/9780128043929
999 _c247318
_d247318