The Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules

The Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules
Author :
Publisher : CRC Press
Total Pages : 475
Release :
ISBN-10 : 9781466507678
ISBN-13 : 1466507675
Rating : 4/5 (675 Downloads)

Book Synopsis The Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules by : John J. Trinckes, Jr.

Download or read book The Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules written by John J. Trinckes, Jr. and published by CRC Press. This book was released on 2012-12-03 with total page 475 pages. Available in PDF, EPUB and Kindle. Book excerpt: The Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules is a comprehensive manual to ensuring compliance with the implementation standards of the Privacy and Security Rules of HIPAA and provides recommendations based on other related regulations and industry best practices. The book is designed to assist you in reviewing the accessibility of electronic protected health information (EPHI) to make certain that it is not altered or destroyed in an unauthorized manner, and that it is available as needed only by authorized individuals for authorized use. It can also help those entities that may not be covered by HIPAA regulations but want to assure their customers they are doing their due diligence to protect their personal and private information. Since HIPAA/HITECH rules generally apply to covered entities, business associates, and their subcontractors, these rules may soon become de facto standards for all companies to follow. Even if you aren’t required to comply at this time, you may soon fall within the HIPAA/HITECH purview. So, it is best to move your procedures in the right direction now. The book covers administrative, physical, and technical safeguards; organizational requirements; and policies, procedures, and documentation requirements. It provides sample documents and directions on using the policies and procedures to establish proof of compliance. This is critical to help prepare entities for a HIPAA assessment or in the event of an HHS audit. Chief information officers and security officers who master the principles in this book can be confident they have taken the proper steps to protect their clients’ information and strengthen their security posture. This can provide a strategic advantage to their organization, demonstrating to clients that they not only care about their health and well-being, but are also vigilant about protecting their clients’ privacy.


The Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules Related Books

The Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules
Language: en
Pages: 475
Authors: John J. Trinckes, Jr.
Categories: Computers
Type: BOOK - Published: 2012-12-03 - Publisher: CRC Press

DOWNLOAD EBOOK

The Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules is a comprehensive manual to ensuring compliance with the implementation stan
Information Security Management Handbook, Volume 7
Language: en
Pages: 416
Authors: Richard O'Hanley
Categories: Computers
Type: BOOK - Published: 2013-08-29 - Publisher: CRC Press

DOWNLOAD EBOOK

Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on informat
Guide to the De-Identification of Personal Health Information
Language: en
Pages: 417
Authors: Khaled El Emam
Categories: Business & Economics
Type: BOOK - Published: 2013-05-06 - Publisher: CRC Press

DOWNLOAD EBOOK

Offering compelling practical and legal reasons why de-identification should be one of the main approaches to protecting patients’ privacy, the Guide to the D
Information Security Policy Development for Compliance
Language: en
Pages: 154
Authors: Barry L. Williams
Categories: Business & Economics
Type: BOOK - Published: 2016-04-19 - Publisher: CRC Press

DOWNLOAD EBOOK

Although compliance standards can be helpful guides to writing comprehensive security policies, many of the standards state the same requirements in slightly di
Managing Risk and Security in Outsourcing IT Services
Language: en
Pages: 234
Authors: Frank Siepmann
Categories: Business & Economics
Type: BOOK - Published: 2013-12-09 - Publisher: CRC Press

DOWNLOAD EBOOK

With cloud computing quickly becoming a standard in today's IT environments, many security experts are raising concerns regarding security and privacy in outsou