Healthcare information privacy and security : regulatory compliance and data security in the age of electronic health records
著者
書誌事項
Healthcare information privacy and security : regulatory compliance and data security in the age of electronic health records
Apress , Springer Science+Business Media [distributor], c2014
- : pbk
- タイトル別名
-
Healthcare information privacy + security
大学図書館所蔵 全1件
  青森
  岩手
  宮城
  秋田
  山形
  福島
  茨城
  栃木
  群馬
  埼玉
  千葉
  東京
  神奈川
  新潟
  富山
  石川
  福井
  山梨
  長野
  岐阜
  静岡
  愛知
  三重
  滋賀
  京都
  大阪
  兵庫
  奈良
  和歌山
  鳥取
  島根
  岡山
  広島
  山口
  徳島
  香川
  愛媛
  高知
  福岡
  佐賀
  長崎
  熊本
  大分
  宮崎
  鹿児島
  沖縄
  韓国
  中国
  タイ
  イギリス
  ドイツ
  スイス
  フランス
  ベルギー
  オランダ
  スウェーデン
  ノルウェー
  アメリカ
注記
Includes bibliographical references and index
内容説明・目次
内容説明
Healthcare IT is the growth industry right now, and the need for guidance in regard to privacy and security is huge. Why? With new federal incentives and penalties tied to the HITECH Act, HIPAA, and the implementation of Electronic Health Record (EHR) systems, medical practices and healthcare systems are implementing new software at breakneck speed. Yet privacy and security considerations are often an afterthought, putting healthcare organizations at risk of fines and damage to their reputations.
Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records outlines the new regulatory regime, and it also provides IT professionals with the processes and protocols, standards, and governance tools they need to maintain a secure and legal environment for data and records. It's a concrete resource that will help you understand the issues affecting the law and regulatory compliance, privacy, and security in the enterprise.
As healthcare IT security expert Bernard Peter Robichau II shows, the success of a privacy and security initiative lies not just in proper planning but also in identifying who will own the implementation and maintain technologies and processes. From executive sponsors to system analysts and administrators, a properly designed security program requires that that the right people are assigned to the right tasks and have the tools they need. Robichau explains how to design and implement that program with an eye toward long-term success. Putting processes and systems in place is, of course, only the start. Robichau also shows how to manage your security program and maintain operational support including ongoing maintenance and policy updates. (Because regulations never sleep!)
This book will help you devise solutions that include:
Identity and access management systems
Proper application design
Physical and environmental safeguards
Systemwide and client-based security configurations
Safeguards for patient data
Training and auditing procedures
Governance and policy administration
Healthcare Information Privacy and Security is the definitive guide to help you through the process of maintaining privacy and security in the healthcare industry. It will help you keep health information safe, and it will help keep your organization-whether local clinic or major hospital system-on the right side of the law.
目次
Chapter 1. Introduction: The Long-Awaited Manual
Chapter 2. Waking the Sleeping Giant: A Brief History of Healthcare IT
Chapter 3. It's Not Just HIPAA: Legislating Privacy and Security
Chapter 4. Assembling the Team: Bringing the Right Human Resources to the Table
Chapter 5. Sifting Through the Wreckage: The Security Audit
Chapter 6. Review Your Policies and Develop a Plan: Strategies for Success
Chapter 7. Identity and Access Management: Know Your User Base
Chapter 8. Application Design: Maximum Efficiency or Minimum Necessary?
Chapter 9. Access Validation Process
Chapter 10. Physical and Environmental Safeguards: Security Beyond the Ones and Zeros
Chapter 11. Systemwide and Client-Based Security Configuration: Making Sure All the Pieces Fit Together
Chapter 12. Safeguarding Patient Data from Prying Eyes: Knowing Where Your PHI Resides
Chapter 13. People, the Most Crucial Element: Training the Masses to Respect the System
Chapter 14. Business Associates: The Human Resources Just Beyond Your Reach
Chapter 15. Security Project vs. Operational Support
Chapter 16. Putting the Plan in Place: Ongoing Maintenance and Life after the Security Project
Appendix A. Sample Business Associate Agreement
Appendix B. Sample Rules of Behavior for Privileged User Accounts
Appendix C. Breach Notification Process
「Nielsen BookData」 より