The definitive guide to complying with the HIPAA/HITECH privacy and security rules

"Preface The Department of Health and Human Services (HHS) has published four major rules implementing a number of provisions and regulations set out by the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and amended by the Health Information Technology for Economic and Clin...

Full description

Bibliographic Details
Main Author: Trinckes, John J.
Format: Electronic
Language:English
Published: Boca Raton, Fla. : CRC Press, 2013.
Subjects:
Online Access:Distributed by publisher. Purchase or institutional license may be required for access.
LEADER 04455nam a2200409Ia 4500
001 3824
003 FlBoTFG
005 20121226160756.0
006 m|||||o||d||||||||
007 cr||||
008 121226s2013 flua sb 001 0 eng d
020 # # |a 9781466507685 (e-book : PDF) 
040 # # |a FlBoTFG  |c FlBoTFG 
043 # # |a n-us--- 
090 # # |a KF3827.R4  |b T75 2013 
092 # # |a 346.73086382  |b T833 
100 1 # |a Trinckes, John J. 
245 1 4 |a The definitive guide to complying with the HIPAA/HITECH privacy and security rules  |c John J. Trinckes, Jr.  |h [electronic resource] / 
260 # # |a Boca Raton, Fla. :  |b CRC Press,  |c 2013. 
300 # # |a xxxvii, 434 p. :  |b ill. 
500 # # |a "An Auerbach book." 
504 # # |a Includes bibliographical references (p. 413-417) and index. 
505 0 # |a 1. HIPAA/HITECH overview -- 2. Relevance of HIPAA/HITECH to healthcare organizations -- 3. Compliance overview -- 4. Privacy rule detailed -- 5. Electronic transactions and code set rule detailed -- 6. National provider identifier requirements detailed -- 7. Meaningful use detailed -- 8. Breach notification detailed -- 9. Enforcement rule detailed -- 10. Security rule detailed -- 11. Security rule : administrative safeguards -- 12. Security rule : risk assessments -- 13. Security rule : security awareness training -- 14. Security rule : incident response -- 15. Security rule : business continuity planning and disaster recovery -- 16. Security rule : compliance assessment -- 17. Security rule : physical safeguards -- 18. Security rule : technical safeguards -- 19. Security rule : organizational requirements -- 20. Frequently asked questions -- 21. Checklists. 
520 # # |a "Preface The Department of Health and Human Services (HHS) has published four major rules implementing a number of provisions and regulations set out by the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and amended by the Health Information Technology for Economic and Clinical Health (HITECH) Act of 1999 as part of the American Recovery and Reinvestment Act (ARRA). These rules are the Privacy Rule; the Electronic Transactions and Code Sets Rule; the National Identifier requirements for employers, providers, and health plans; and the Security Rule. It also include more regulatory control over enforcement actions and stiffer penalties for noncompliance. There are many healthcare providers, healthcare clearinghouses, and health plans that are required to implement and comply with these rules, especially the Security Rule. Failure to implement or comply with these rules can leave the covered entity or others that need to comply open for large monetary fines, civil lawsuits, and other penalties. With the rise of security breaches and other high-profile incidences regarding successful hacking events, it is very apparent that information has become a valuable commodity. The United States has moved from a nation built on manufacturing and industry to an information/knowledge powerhouse. With the advancement in technology comes the opportunity for criminals to find another source of income by exploiting vulnerabilities within this technology. Retail, financial, and governmental entities have been the target and have fallen victim to these types of crimes; however, these industries are not the only industries susceptible. Technology has made companies more efficient and even now healthcare providers are required to submit Medicaid and"--  |c Provided by publisher. 
530 # # |a Also available in print edition. 
538 # # |a Mode of access: World Wide Web. 
610 1 0 |a United States.  |t American Recovery and Reinvestment Act of 2009. 
610 1 0 |a United States.  |t Health Insurance Portability and Accountability Act of 1996. 
610 1 0 |a United States.  |t Health Information Technology for Economic and Clinical Health Act. 
650 # 0 |a Medical records  |x Law and legislation  |z United States. 
650 # 0 |a Medical records  |x Access control  |z United States. 
650 # 0 |a Data protection  |x Law and legislation  |z United States. 
650 # 0 |a Health insurance  |x Law and legislation  |z United States. 
650 # 0 |a Health insurance claims  |z United States. 
655 # 7 |a Electronic books.  |2 lcsh 
776 1 # |z 9781466507678 (hardback) 
856 4 0 |q application/PDF  |u https://ezaccess.library.uitm.edu.my/login?url=http://marc.crcnetbase.com/isbn/9781466507685  |z Distributed by publisher. Purchase or institutional license may be required for access.