The Practical Guide to HIPAA Privacy and Security Compliance, 2nd Edition

Book description

Following in the footsteps of its bestselling predecessor, The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition is a one-stop, up-to-date resource on Health Insurance Portability and Accountability Act (HIPAA) privacy and security, including details on the HITECH Act, the 2013 Omnibus Rule, and the pending rules. Updated and revised with several new sections, this edition defines what HIPAA is, what it requires, and what you need to do to achieve compliance.

The book provides an easy-to-understand overview of HIPAA privacy and security rules and compliance tasks. Supplying authoritative insights into real-world HIPAA privacy and security issues, it summarizes the analysis, training, and technology needed to properly plan and implement privacy and security policies, training, and an overall program to manage information risks. Instead of focusing on technical jargon, the book spells out what your organization must do to achieve and maintain compliance requirements on an ongoing basis.

Table of contents

  1. Front Cover (1/2)
  2. Front Cover (2/2)
  3. Contents (1/2)
  4. Contents (2/2)
  5. Foreword
  6. Preface
  7. Authors (1/2)
  8. Authors (2/2)
  9. Chapter 1: Introduction to HIPAA (1/6)
  10. Chapter 1: Introduction to HIPAA (2/6)
  11. Chapter 1: Introduction to HIPAA (3/6)
  12. Chapter 1: Introduction to HIPAA (4/6)
  13. Chapter 1: Introduction to HIPAA (5/6)
  14. Chapter 1: Introduction to HIPAA (6/6)
  15. Chapter 2: Related Regulations, Laws, Standards, and Guidance (1/2)
  16. Chapter 2: Related Regulations, Laws, Standards, and Guidance (2/2)
  17. Chapter 3: Preparing for HIPAA, HITECH, and Other Compliance Changes (1/2)
  18. Chapter 3: Preparing for HIPAA, HITECH, and Other Compliance Changes (2/2)
  19. Chapter 4: HIPAA Cost Considerations (1/3)
  20. Chapter 4: HIPAA Cost Considerations (2/3)
  21. Chapter 4: HIPAA Cost Considerations (3/3)
  22. Chapter 5: Relationship between Security and Privacy (1/3)
  23. Chapter 5: Relationship between Security and Privacy (2/3)
  24. Chapter 5: Relationship between Security and Privacy (3/3)
  25. Chapter 6: HIPAA Privacy Rule Requirements Overview (1/11)
  26. Chapter 6: HIPAA Privacy Rule Requirements Overview (2/11)
  27. Chapter 6: HIPAA Privacy Rule Requirements Overview (3/11)
  28. Chapter 6: HIPAA Privacy Rule Requirements Overview (4/11)
  29. Chapter 6: HIPAA Privacy Rule Requirements Overview (5/11)
  30. Chapter 6: HIPAA Privacy Rule Requirements Overview (6/11)
  31. Chapter 6: HIPAA Privacy Rule Requirements Overview (7/11)
  32. Chapter 6: HIPAA Privacy Rule Requirements Overview (8/11)
  33. Chapter 6: HIPAA Privacy Rule Requirements Overview (9/11)
  34. Chapter 6: HIPAA Privacy Rule Requirements Overview (10/11)
  35. Chapter 6: HIPAA Privacy Rule Requirements Overview (11/11)
  36. Chapter 7: Performing a Privacy Rule Gap Analysis and Risk Analysis (1/5)
  37. Chapter 7: Performing a Privacy Rule Gap Analysis and Risk Analysis (2/5)
  38. Chapter 7: Performing a Privacy Rule Gap Analysis and Risk Analysis (3/5)
  39. Chapter 7: Performing a Privacy Rule Gap Analysis and Risk Analysis (4/5)
  40. Chapter 7: Performing a Privacy Rule Gap Analysis and Risk Analysis (5/5)
  41. Chapter 8: Writing Effective Privacy Policies (1/4)
  42. Chapter 8: Writing Effective Privacy Policies (2/4)
  43. Chapter 8: Writing Effective Privacy Policies (3/4)
  44. Chapter 8: Writing Effective Privacy Policies (4/4)
  45. Chapter 9: State Preemption (1/3)
  46. Chapter 9: State Preemption (2/3)
  47. Chapter 9: State Preemption (3/3)
  48. Chapter 10: Crafting a Privacy Implementation Plan (1/2)
  49. Chapter 10: Crafting a Privacy Implementation Plan (2/2)
  50. Chapter 11: Privacy Rule Compliance Checklist (1/4)
  51. Chapter 11: Privacy Rule Compliance Checklist (2/4)
  52. Chapter 11: Privacy Rule Compliance Checklist (3/4)
  53. Chapter 11: Privacy Rule Compliance Checklist (4/4)
  54. Chapter 12: Security Rule Requirements Overview (1/5)
  55. Chapter 12: Security Rule Requirements Overview (2/5)
  56. Chapter 12: Security Rule Requirements Overview (3/5)
  57. Chapter 12: Security Rule Requirements Overview (4/5)
  58. Chapter 12: Security Rule Requirements Overview (5/5)
  59. Chapter 13: Performing a Security Rule Risk Analysis (1/2)
  60. Chapter 13: Performing a Security Rule Risk Analysis (2/2)
  61. Chapter 14: Writing Effective Information Security Policies (1/2)
  62. Chapter 14: Writing Effective Information Security Policies (2/2)
  63. Chapter 15: Crafting a Security Implementation Plan (1/2)
  64. Chapter 15: Crafting a Security Implementation Plan (2/2)
  65. Chapter 16: Security Rule Compliance Checklist (1/2)
  66. Chapter 16: Security Rule Compliance Checklist (2/2)
  67. Chapter 17: Health Care Provider Issues (1/4)
  68. Chapter 17: Health Care Provider Issues (2/4)
  69. Chapter 17: Health Care Provider Issues (3/4)
  70. Chapter 17: Health Care Provider Issues (4/4)
  71. Chapter 18: Health Care Clearinghouse Issues (1/2)
  72. Chapter 18: Health Care Clearinghouse Issues (2/2)
  73. Chapter 19: Health Plan Issues (1/3)
  74. Chapter 19: Health Plan Issues (2/3)
  75. Chapter 19: Health Plan Issues (3/3)
  76. Chapter 20: Employer Issues (1/3)
  77. Chapter 20: Employer Issues (2/3)
  78. Chapter 20: Employer Issues (3/3)
  79. Chapter 21: Business Associate Issues (1/4)
  80. Chapter 21: Business Associate Issues (2/4)
  81. Chapter 21: Business Associate Issues (3/4)
  82. Chapter 21: Business Associate Issues (4/4)
  83. Chapter 22: Building a HIPAA-Compliant Technology Infrastructure (1/6)
  84. Chapter 22: Building a HIPAA-Compliant Technology Infrastructure (2/6)
  85. Chapter 22: Building a HIPAA-Compliant Technology Infrastructure (3/6)
  86. Chapter 22: Building a HIPAA-Compliant Technology Infrastructure (4/6)
  87. Chapter 22: Building a HIPAA-Compliant Technology Infrastructure (5/6)
  88. Chapter 22: Building a HIPAA-Compliant Technology Infrastructure (6/6)
  89. Chapter 23: Crafting Security Incident Procedures and Contingency Plans (1/4)
  90. Chapter 23: Crafting Security Incident Procedures and Contingency Plans (2/4)
  91. Chapter 23: Crafting Security Incident Procedures and Contingency Plans (3/4)
  92. Chapter 23: Crafting Security Incident Procedures and Contingency Plans (4/4)
  93. Chapter 24: Outsourcing Information Technology Services (1/3)
  94. Chapter 24: Outsourcing Information Technology Services (2/3)
  95. Chapter 24: Outsourcing Information Technology Services (3/3)
  96. Chapter 25: HIPAA Training, Education, and Awareness (1/4)
  97. Chapter 25: HIPAA Training, Education, and Awareness (2/4)
  98. Chapter 25: HIPAA Training, Education, and Awareness (3/4)
  99. Chapter 25: HIPAA Training, Education, and Awareness (4/4)
  100. Chapter 26: Performing Ongoing HIPAA Compliance Reviews and Audits (1/3)
  101. Chapter 26: Performing Ongoing HIPAA Compliance Reviews and Audits (2/3)
  102. Chapter 26: Performing Ongoing HIPAA Compliance Reviews and Audits (3/3)
  103. Appendix A: Enforcement and Sanctions (1/2)
  104. Appendix A: Enforcement and Sanctions (2/2)
  105. Appendix B: HIPAA Glossary (1/9)
  106. Appendix B: HIPAA Glossary (2/9)
  107. Appendix B: HIPAA Glossary (3/9)
  108. Appendix B: HIPAA Glossary (4/9)
  109. Appendix B: HIPAA Glossary (5/9)
  110. Appendix B: HIPAA Glossary (6/9)
  111. Appendix B: HIPAA Glossary (7/9)
  112. Appendix B: HIPAA Glossary (8/9)
  113. Appendix B: HIPAA Glossary (9/9)
  114. Appendix C: Model Incident and Privacy Response Procedures (1/4)
  115. Appendix C: Model Incident and Privacy Response Procedures (2/4)
  116. Appendix C: Model Incident and Privacy Response Procedures (3/4)
  117. Appendix C: Model Incident and Privacy Response Procedures (4/4)
  118. Appendix D: HIPAA Resources (1/2)
  119. Appendix D: HIPAA Resources (2/2)
  120. References (1/2)
  121. References (2/2)
  122. Further Reading
  123. Back Cover

Product information

  • Title: The Practical Guide to HIPAA Privacy and Security Compliance, 2nd Edition
  • Author(s): Rebecca Herold, Kevin Beaver
  • Release date: October 2014
  • Publisher(s): Auerbach Publications
  • ISBN: 9781439855591