Read Anywhere and on Any Device!

Special Offer | $0.00

Join Today And Start a 30-Day Free Trial and Get Exclusive Member Benefits to Access Millions Books for Free!

Read Anywhere and on Any Device!

  • Download on iOS
  • Download on Android
  • Download on iOS

HIPAA Security Made Simple: Practical Compliance Advice for Covered Entities and Business Associates

Kate Borten
4.9/5 (19287 ratings)
Description:HIPAA Security Made Simple: Practical Compliance Advice for Covered Entities and Business Associates, Second EditionKate Borten, CISSP, CISM  SynopsisWritten by highly respected author Kate Borten, CISSP, CISM, this updated edition explains how the Omnibus Rule affects organizations that are subject to HIPAA. It will help facilities and business associates understand how they and their information security programs can remain in compliance with new and continuing regulatory requirements. This second edition emphasizes that security is not a one-time project and reminds readers that they should already be performing risk assessments to comply with the HIPAA Security Rule. A new Introduction explains the significance of the HITECH Act and the  Omnibus Rule to covered entities and their business associates (BA). HITECH made BAs directly liable for Security Rule compliance, and the Omnibus Rule went further, revising the definition to include all downstream subcontractors with access to PHI. This closed a major loophole in privacy protection, significantly expanding the number of organizations deemed BAs and directly subject to HIPAA compliance and enforcement.This book explains how HIPAA and the Omnibus Rule do the following:Clarify the definition of BA, which now includes all downstream subcontractors with access to PHIClarify that covered entities and BAs must have ongoing programs to protect electronic PHI, including regular updates to security documentationRevise and modernize the definition of electronic media to align it with the terminology used by the National Institute of Standards and TechnologyEnsure that access termination procedures apply to all workforce members, not only to employeesEncourage encryption but not require it across the boardTable of Contents:Introduction HITECH Act and Omnibus Rule Impact on SecurityChapter One: HIPAA Security Introduction and Overview         What is HIPAA?                 How Security Fits In          How to Use This Book Layered Approach           Some Pitfalls to Avoid    Documentation Tips      Chapter Two: HIPAA Security Rule: General Rules General Requirements  Flexibility of Approach   Standards            Implementation Specifications  Maintenance    Chapter Three: HIPAA Security Rule: Administrative Safeguards               Security Management Process  Risk Analysis       Traditional Risk Assessment Methodology Risk Management           Sanction Policy  Information System Activity Review        Assigned Security Responsibility               Workforce Security         Authorization and/or Supervision             Workforce Clearance Procedure               Termination Procedures               Information Access Management            Isolating Healthcare Clearinghouse Function Access Authorization      Access Establishment and Modification Security Awareness and Training              Security Reminders         Protection From Malicious Software       Login Monitoring              Password Management                Security Incident Procedures      Response and Reporting              Contingency Plan             Data Backup Plan             Disaster Recovery Plan  Emergency Mode Operation Plan             Testing and Revision Procedures              Applications and Data Criticality Analysis                Evaluation           Business Associate Contracts and Other Arrangements  Written Contracts or Other Arrangements          Chapter Four: HIPAA Security Rule: Physical Safeguards            Facility Access Controls  Contingency Operations               Facility Security Plan       Access Control and Validation Procedures Maintenance Records    Workstation Use              Workstation Security        Device and Media Controls          Disposal               Media Reuse     Accountability   Data Backup and Storage             Chapter Five: HIPAA Security Rule: Technical Safeguards         Access Control  Unique User Identification          Emergency Access Procedures  Automatic Logoff             Encryption and Decryption          Audit Controls   Integrity                 Mechanism to Authenticate Electronic Protected Health Information       Transmission Security    Integrity Controls             Encryption         Chapter Six: HIPAA Security Rule: Additional Organizational Requirements Business Associate Contracts or Other Arrangements     Business Associate Contracts With Subcontractors           Requirements for Group Health Plans      Policies and Procedures               ...We have made it easy for you to find a PDF Ebooks without any digging. And by having access to our ebooks online or by storing it on your computer, you have convenient answers with HIPAA Security Made Simple: Practical Compliance Advice for Covered Entities and Business Associates. To get started finding HIPAA Security Made Simple: Practical Compliance Advice for Covered Entities and Business Associates, you are right to find our website which has a comprehensive collection of manuals listed.
Our library is the biggest of these that have literally hundreds of thousands of different products represented.
Pages
Format
PDF, EPUB & Kindle Edition
Publisher
Release
ISBN
1615692738

HIPAA Security Made Simple: Practical Compliance Advice for Covered Entities and Business Associates

Kate Borten
4.4/5 (1290744 ratings)
Description: HIPAA Security Made Simple: Practical Compliance Advice for Covered Entities and Business Associates, Second EditionKate Borten, CISSP, CISM  SynopsisWritten by highly respected author Kate Borten, CISSP, CISM, this updated edition explains how the Omnibus Rule affects organizations that are subject to HIPAA. It will help facilities and business associates understand how they and their information security programs can remain in compliance with new and continuing regulatory requirements. This second edition emphasizes that security is not a one-time project and reminds readers that they should already be performing risk assessments to comply with the HIPAA Security Rule. A new Introduction explains the significance of the HITECH Act and the  Omnibus Rule to covered entities and their business associates (BA). HITECH made BAs directly liable for Security Rule compliance, and the Omnibus Rule went further, revising the definition to include all downstream subcontractors with access to PHI. This closed a major loophole in privacy protection, significantly expanding the number of organizations deemed BAs and directly subject to HIPAA compliance and enforcement.This book explains how HIPAA and the Omnibus Rule do the following:Clarify the definition of BA, which now includes all downstream subcontractors with access to PHIClarify that covered entities and BAs must have ongoing programs to protect electronic PHI, including regular updates to security documentationRevise and modernize the definition of electronic media to align it with the terminology used by the National Institute of Standards and TechnologyEnsure that access termination procedures apply to all workforce members, not only to employeesEncourage encryption but not require it across the boardTable of Contents:Introduction HITECH Act and Omnibus Rule Impact on SecurityChapter One: HIPAA Security Introduction and Overview         What is HIPAA?                 How Security Fits In          How to Use This Book Layered Approach           Some Pitfalls to Avoid    Documentation Tips      Chapter Two: HIPAA Security Rule: General Rules General Requirements  Flexibility of Approach   Standards            Implementation Specifications  Maintenance    Chapter Three: HIPAA Security Rule: Administrative Safeguards               Security Management Process  Risk Analysis       Traditional Risk Assessment Methodology Risk Management           Sanction Policy  Information System Activity Review        Assigned Security Responsibility               Workforce Security         Authorization and/or Supervision             Workforce Clearance Procedure               Termination Procedures               Information Access Management            Isolating Healthcare Clearinghouse Function Access Authorization      Access Establishment and Modification Security Awareness and Training              Security Reminders         Protection From Malicious Software       Login Monitoring              Password Management                Security Incident Procedures      Response and Reporting              Contingency Plan             Data Backup Plan             Disaster Recovery Plan  Emergency Mode Operation Plan             Testing and Revision Procedures              Applications and Data Criticality Analysis                Evaluation           Business Associate Contracts and Other Arrangements  Written Contracts or Other Arrangements          Chapter Four: HIPAA Security Rule: Physical Safeguards            Facility Access Controls  Contingency Operations               Facility Security Plan       Access Control and Validation Procedures Maintenance Records    Workstation Use              Workstation Security        Device and Media Controls          Disposal               Media Reuse     Accountability   Data Backup and Storage             Chapter Five: HIPAA Security Rule: Technical Safeguards         Access Control  Unique User Identification          Emergency Access Procedures  Automatic Logoff             Encryption and Decryption          Audit Controls   Integrity                 Mechanism to Authenticate Electronic Protected Health Information       Transmission Security    Integrity Controls             Encryption         Chapter Six: HIPAA Security Rule: Additional Organizational Requirements Business Associate Contracts or Other Arrangements     Business Associate Contracts With Subcontractors           Requirements for Group Health Plans      Policies and Procedures               ...We have made it easy for you to find a PDF Ebooks without any digging. And by having access to our ebooks online or by storing it on your computer, you have convenient answers with HIPAA Security Made Simple: Practical Compliance Advice for Covered Entities and Business Associates. To get started finding HIPAA Security Made Simple: Practical Compliance Advice for Covered Entities and Business Associates, you are right to find our website which has a comprehensive collection of manuals listed.
Our library is the biggest of these that have literally hundreds of thousands of different products represented.
Pages
Format
PDF, EPUB & Kindle Edition
Publisher
Release
ISBN
1615692738

More Books

loader