The Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules

Book description

The Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules is a comprehensive manual to ensuring compliance with the implementation standards of the Privacy and Security Rules of HIPAA and provides recommendations based on other related regulations and industry best practices. The book is designed to assist you in reviewing the accessibility of electronic protected health information (EPHI) to make certain that it is not altered or destroyed in an unauthorized manner, and that it is available as needed only by authorized individuals for authorized use. It can also help those entities that may not be covered by HIPAA regulations but want to assure their customers they are doing their due diligence to protect their personal and private information. Since HIPAA/HITECH rules generally apply to covered entities, business associates, and their subcontractors, these rules may soon become de facto standards for all companies to follow. Even if you aren't required to comply at this time, you may soon fall within the HIPAA/HITECH purview. So, it is best to move your procedures in the right direction now. The book covers administrative, physical, and technical safeguards; organizational requirements; and policies, procedures, and documentation requirements. It provides sample documents and directions on using the policies and procedures to establish proof of compliance. This is critical to help prepare entities for a HIPAA assessment or in the event of an HHS audit. Chief information officers and security officers who master the principles in this book can be confident they have taken the proper steps to protect their clients' information and strengthen their security posture. This can provide a strategic advantage to their organization, demonstrating to clients that they not only care about their health and well-being, but are also vigilant about protecting their clients' privacy.

Table of contents

  1. Front Cover (1/2)
  2. Front Cover (2/2)
  3. Contents (1/3)
  4. Contents (2/3)
  5. Contents (3/3)
  6. Foreword
  7. Preface
  8. Acknowledgments
  9. About the Author
  10. Contributors
  11. Reviewer
  12. Author’s Note
  13. Legal Disclaimer
  14. Chapter 1 - HIPAA/HITECH Overview (1/8)
  15. Chapter 1 - HIPAA/HITECH Overview (2/8)
  16. Chapter 1 - HIPAA/HITECH Overview (3/8)
  17. Chapter 1 - HIPAA/HITECH Overview (4/8)
  18. Chapter 1 - HIPAA/HITECH Overview (5/8)
  19. Chapter 1 - HIPAA/HITECH Overview (6/8)
  20. Chapter 1 - HIPAA/HITECH Overview (7/8)
  21. Chapter 1 - HIPAA/HITECH Overview (8/8)
  22. Chapter 2 - Relevance of HIPAA/HITECH to Healthcare Organizations (1/5)
  23. Chapter 2 - Relevance of HIPAA/HITECH to Healthcare Organizations (2/5)
  24. Chapter 2 - Relevance of HIPAA/HITECH to Healthcare Organizations (3/5)
  25. Chapter 2 - Relevance of HIPAA/HITECH to Healthcare Organizations (4/5)
  26. Chapter 2 - Relevance of HIPAA/HITECH to Healthcare Organizations (5/5)
  27. Chapter 3 - Compliance Overview (1/3)
  28. Chapter 3 - Compliance Overview (2/3)
  29. Chapter 3 - Compliance Overview (3/3)
  30. Chapter 4 - Privacy Rule Detailed (1/8)
  31. Chapter 4 - Privacy Rule Detailed (2/8)
  32. Chapter 4 - Privacy Rule Detailed (3/8)
  33. Chapter 4 - Privacy Rule Detailed (4/8)
  34. Chapter 4 - Privacy Rule Detailed (5/8)
  35. Chapter 4 - Privacy Rule Detailed (6/8)
  36. Chapter 4 - Privacy Rule Detailed (7/8)
  37. Chapter 4 - Privacy Rule Detailed (8/8)
  38. Chapter 5 - Electronic Transactions and Code Set Rule Detailed (1/3)
  39. Chapter 5 - Electronic Transactions and Code Set Rule Detailed (2/3)
  40. Chapter 5 - Electronic Transactions and Code Set Rule Detailed (3/3)
  41. Chapter 6 - National Provider Identifier Requirements Detailed
  42. Chapter 7 - Meaningful Use Detailed (1/4)
  43. Chapter 7 - Meaningful Use Detailed (2/4)
  44. Chapter 7 - Meaningful Use Detailed (3/4)
  45. Chapter 7 - Meaningful Use Detailed (4/4)
  46. Chapter 8 - Breach Notification Detailed (1/3)
  47. Chapter 8 - Breach Notification Detailed (2/3)
  48. Chapter 8 - Breach Notification Detailed (3/3)
  49. Chapter 9 - Enforcement Rule Detailed
  50. Chapter 10 - Security Rule Detailed (1/2)
  51. Chapter 10 - Security Rule Detailed (2/2)
  52. Chapter 11 - Security Rule: Administrative Safeguards (1/11)
  53. Chapter 11 - Security Rule: Administrative Safeguards (2/11)
  54. Chapter 11 - Security Rule: Administrative Safeguards (3/11)
  55. Chapter 11 - Security Rule: Administrative Safeguards (4/11)
  56. Chapter 11 - Security Rule: Administrative Safeguards (5/11)
  57. Chapter 11 - Security Rule: Administrative Safeguards (6/11)
  58. Chapter 11 - Security Rule: Administrative Safeguards (7/11)
  59. Chapter 11 - Security Rule: Administrative Safeguards (8/11)
  60. Chapter 11 - Security Rule: Administrative Safeguards (9/11)
  61. Chapter 11 - Security Rule: Administrative Safeguards (10/11)
  62. Chapter 11 - Security Rule: Administrative Safeguards (11/11)
  63. Chapter 12 - Security Rule: Risk Assessments (1/4)
  64. Chapter 12 - Security Rule: Risk Assessments (2/4)
  65. Chapter 12 - Security Rule: Risk Assessments (3/4)
  66. Chapter 12 - Security Rule: Risk Assessments (4/4)
  67. Chapter 13 - Security Rule: Security Awareness Training (1/3)
  68. Chapter 13 - Security Rule: Security Awareness Training (2/3)
  69. Chapter 13 - Security Rule: Security Awareness Training (3/3)
  70. Chapter 14 - Security Rule: Incident Response (1/2)
  71. Chapter 14 - Security Rule: Incident Response (2/2)
  72. Chapter 15 - Security Rule: Business Continuity Planning and Disaster Recovery (1/6)
  73. Chapter 15 - Security Rule: Business Continuity Planning and Disaster Recovery (2/6)
  74. Chapter 15 - Security Rule: Business Continuity Planning and Disaster Recovery (3/6)
  75. Chapter 15 - Security Rule: Business Continuity Planning and Disaster Recovery (4/6)
  76. Chapter 15 - Security Rule: Business Continuity Planning and Disaster Recovery (5/6)
  77. Chapter 15 - Security Rule: Business Continuity Planning and Disaster Recovery (6/6)
  78. Chapter 16 - Security Rule: Compliance Assessment (1/3)
  79. Chapter 16 - Security Rule: Compliance Assessment (2/3)
  80. Chapter 16 - Security Rule: Compliance Assessment (3/3)
  81. Chapter 17 - Security Rule: Physical Safeguards (1/6)
  82. Chapter 17 - Security Rule: Physical Safeguards (2/6)
  83. Chapter 17 - Security Rule: Physical Safeguards (3/6)
  84. Chapter 17 - Security Rule: Physical Safeguards (4/6)
  85. Chapter 17 - Security Rule: Physical Safeguards (5/6)
  86. Chapter 17 - Security Rule: Physical Safeguards (6/6)
  87. Chapter 18 - Security Rule: Technical Safeguards (1/5)
  88. Chapter 18 - Security Rule: Technical Safeguards (2/5)
  89. Chapter 18 - Security Rule: Technical Safeguards (3/5)
  90. Chapter 18 - Security Rule: Technical Safeguards (4/5)
  91. Chapter 18 - Security Rule: Technical Safeguards (5/5)
  92. Chapter 19 - Security Rule: Organizational Requirements (1/2)
  93. Chapter 19 - Security Rule: Organizational Requirements (2/2)
  94. Chapter 20 - Frequently Asked Questions (1/4)
  95. Chapter 20 - Frequently Asked Questions (2/4)
  96. Chapter 20 - Frequently Asked Questions (3/4)
  97. Chapter 20 - Frequently Asked Questions (4/4)
  98. Chapter 21 - Checklists
  99. Acronyms
  100. Glossary (1/4)
  101. Glossary (2/4)
  102. Glossary (3/4)
  103. Glossary (4/4)
  104. References (1/2)
  105. References (2/2)
  106. Additional Resources
  107. Back Cover

Product information

  • Title: The Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules
  • Author(s): J. Trinckes Jr.
  • Release date: December 2012
  • Publisher(s): Auerbach Publications
  • ISBN: 9781466507685