Healthcare information privacy and security regulatory compliance and data security in the age of electronic health records

This book outlines the new regulatory regime, and provides IT professionals with the processes and protocols, standards, and governance tools they need to maintain a secure and legal environment for data and records. Topics covered include : identity and access management systems; proper application...

Full description

Bibliographic Details
Main Author: Robichau, Bernard Peter
Format: eBook
Language:English
Published: [New York, N.Y.], New York, NY Apress, Distributed to the Book trade worldwide by Springer Science + Business Media New York 2014
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 04620nmm a2200529 u 4500
001 EB001923941
003 EBX01000000000000001086843
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 9781430266778 
020 |a 1430266775 
050 4 |a R864 
100 1 |a Robichau, Bernard Peter 
245 0 0 |a Healthcare information privacy and security  |b regulatory compliance and data security in the age of electronic health records  |c Bernard Peter Robichau 
246 3 1 |a Healthcare information privacy + security 
260 |a [New York, N.Y.], New York, NY  |b Apress, Distributed to the Book trade worldwide by Springer Science + Business Media New York  |c 2014 
300 |a xi, 167 pages  |b illustrations (some color) 
505 0 |a Includes bibliographical references and index 
505 0 |a Introduction -- Part I: The evolution of a monster. Waking the sleeping giant -- It's not just HIPAA -- Part II: Divide and conquer: defining ownership to develop solutions. Assembling the team -- Sifting through the wreckage -- Review your policies and develop a plan -- Part III: Sustainable solutions. Identity and access management -- Application design -- Access validation process -- Physical and environmental safeguards -- Systemwide and client-based security -- Safeguarding patient data from prying eyes -- Part IV: From project to program: transitioning to a sustainable support model. People, the most crucial element -- Business associates -- Security project versus operational support -- Putting the plan in place -- Part V: Appendices. Appendix A: sample business associate agreement -- Appendix B: sample rules of behavior for privileged user accounts -- Appendix C: breach notification process 
653 |a Data encryption (Computer science) / fast 
653 |a Dossiers médicaux / Informatique 
653 |a Dossiers médicaux / Accès / Contrôle 
653 |a Chiffrement (Informatique) 
653 |a Medical records / Access control / fast 
653 |a Data protection / fast 
653 |a Medical Records / standards 
653 |a BUSINESS & ECONOMICS / General / bisacsh 
653 |a Data protection / http://id.loc.gov/authorities/subjects/sh85035859 
653 |a Data encryption (Computer science) / http://id.loc.gov/authorities/subjects/sh94001524 
653 |a Medical records / Access control / http://id.loc.gov/authorities/subjects/sh85083012 
653 |a Medical records / Data processing / http://id.loc.gov/authorities/subjects/sh85083013 
653 |a Medical records / Data processing / fast 
653 |a Protection de l'information (Informatique) 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
024 8 |a 10.1007/978-1-4302-6677-8 
773 0 |t Springer eBooks 
776 |z 1430266775 
776 |z 9781430266778 
776 |z 1430266767 
776 |z 9781430266761 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781430266778/?ar  |x Verlag  |3 Volltext 
082 0 |a 500 
082 0 |a 651.5/04261 
082 0 |a 330 
520 |a This book outlines the new regulatory regime, and provides IT professionals with the processes and protocols, standards, and governance tools they need to maintain a secure and legal environment for data and records. Topics covered include : identity and access management systems; proper application design; physical and environmental safeguards; systemwide and client-based security configurations; safeguards for patient data; training and auditing procedures; governance and policy administration; the basics of HITECH, HIPAA, and other federal laws driving change in healthcare IT; how to identify the core issues of privacy and security in a healthcare environment; the steps required to develop and execute a security project plan; the technologies and tools available to aid in the process of deploying a secure EHR system; the core regulatory issues and practical matters of security in a healthcare environment; the frameworks and methodology that will assist in tackling the issues of privacy and security; and the technologies impacted by matters of privacy and security along with proposals for managing them effectively. This book is for healthcare professionals who work in information technology, information security, health information management, as well as in the more specialized areas of privacy, compliance, and informatics. The book is also useful for consultants working in the field of information security, EMR vendors, and technology professionals seeking to make an entry into the world of healthcare IT.