Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Protecting patient informationa deci...
~
Andress, Jason,
Protecting patient informationa decision-maker's guide to risk, prevention, and damage control /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Protecting patient informationPaul Cerrato ; Jason Andress, technical editor.
Reminder of title:
a decision-maker's guide to risk, prevention, and damage control /
Author:
Cerrato, Paul,
other author:
Andress, Jason,
Published:
Amsterdam :Syngress is an imprint of Elsevier,2016.
Description:
1 online resource.
Notes:
Includes index.
Subject:
Medical recordsAccess control.
Subject:
Great Britain.
Online resource:
https://www.sciencedirect.com/science/book/9780128043929
ISBN:
9780128044117 (electronic bk.)
Protecting patient informationa decision-maker's guide to risk, prevention, and damage control /
Cerrato, Paul,
Protecting patient information
a decision-maker's guide to risk, prevention, and damage control /[electronic resource] :Paul Cerrato ; Jason Andress, technical editor. - Amsterdam :Syngress is an imprint of Elsevier,2016. - 1 online resource.
Includes index.
Includes bibliographical references and index.
Cover ; Title Page; Copyright Page; Disclaimer; Dedication; Contents; About the Author; Preface; Chapter 1 -- Dissecting a Book Title; Chapter 2 -- How Well Protected is Your Protected Health Information? Perception Versus Reality; The Cost of Insecurity is Steep; A Closer Look at Data Breach Fines; Do not ignore individual states in breach investigations; Fines are Only Part of the Problem; Factoring in the Meaningful Use Program; Calculating the Cost of Security; References; Chapter 3 -- Regulations Governing Protected Health Information; Defining the Crown Jewels.
ISBN: 9780128044117 (electronic bk.)
LCCN: 2016930217Subjects--Topical Terms:
208607
Medical records
--Access control.Subjects--Geographical Terms:
287994
Great Britain.
Index Terms--Genre/Form:
533184
Electronic book.
LC Class. No.: RA976
Dewey Class. No.: 651.504261
National Library of Medicine Call No.: 2016 F-929
Protecting patient informationa decision-maker's guide to risk, prevention, and damage control /
LDR
:04178cmm a2200373 a 4500
001
601461
006
m o d
007
cr cnu---unuuu
008
211110s2016 ne a gob 001 0 eng d
010
$a
2016930217
020
$a
9780128044117 (electronic bk.)
020
$a
012804411X (electronic bk.)
020
$a
9780128043929
020
$a
012804392X
035
$a
(OCoLC)946997515
035
$a
ocn946997515
040
$a
N
$b
eng
$c
N
$d
IDEBK
$d
YDXCP
$d
N
$d
OCLCF
$d
EBLCP
$d
OPELS
$d
UPM
$d
IDB
$d
OTZ
$d
MERUC
$d
OCLCQ
$d
U3W
$d
D6H
$d
WRM
$d
AU@
$d
GGVRL
$d
EZC
$d
OCLCQ
$d
WYU
$d
OCLCA
$d
MERER
$d
OCLCO
$d
OCLCA
$d
OCLCQ
$d
OCLCA
$d
UKMGB
$d
OCLCQ
$d
SDF
$d
LVT
$d
VT2
041
0
$a
eng
043
$a
e-uk---
050
4
$a
RA976
060
4
$a
2016 F-929
060
4
$a
WX 175
082
0 4
$a
651.504261
$2
23
100
1
$a
Cerrato, Paul,
$e
author.
$3
845437
245
1 0
$a
Protecting patient information
$h
[electronic resource] :
$b
a decision-maker's guide to risk, prevention, and damage control /
$c
Paul Cerrato ; Jason Andress, technical editor.
260
$a
Amsterdam :
$b
Syngress is an imprint of Elsevier,
$c
2016.
300
$a
1 online resource.
500
$a
Includes index.
504
$a
Includes bibliographical references and index.
505
0
$a
Cover ; Title Page; Copyright Page; Disclaimer; Dedication; Contents; About the Author; Preface; Chapter 1 -- Dissecting a Book Title; Chapter 2 -- How Well Protected is Your Protected Health Information? Perception Versus Reality; The Cost of Insecurity is Steep; A Closer Look at Data Breach Fines; Do not ignore individual states in breach investigations; Fines are Only Part of the Problem; Factoring in the Meaningful Use Program; Calculating the Cost of Security; References; Chapter 3 -- Regulations Governing Protected Health Information; Defining the Crown Jewels.
505
8
$a
HIPAA Privacy Versus Security Rules: Related But DifferentTechnology is only part of the equation; Enforcing HIPAA Regulations; A closer look at the HIPAA Security Rule; The HIPAA Breach Notification Rule; The Role of the Federal Trade Commission; Do not forget State Laws; References; Chapter 4 -- Risk Analysis; Learning the jargon; Vulnerability; Threat Versus Risk; Compliance Versus Management; The ONC Approach to Risk Analysis and Security Management; Step 1; Step 2; Step 3; Step 4; Finding the Right Analysis Tools; Tapping the HHS Resources.
505
8
$a
Beware the "Required" Versus "Addressable" ConfusionMoving Beyond a Checklist of Security Questions; References; Chapter 5 -- Reducing the Risk of a Data Breach; Seeing the larger picture; The best mindset: guilty until proven innocent; Passwords, Policies, and Procedures; Establishing Effective Governance; Technological Solutions; Encryption; Firewalls; Antimalware/Antiviral Software; Access Control; Intrusion Detection and Intrusion Prevention Systems; Faxing Solutions; Auditing Your Computer Systems; Making Email More Secure; Establishing Physical Safeguards; Protecting Big Data.
505
8
$a
Testing Your Network SecurityCybersecurity Insurance; References; Chapter 6 -- Mobile Device Security; Thinking strategically; Covering the Basics; BYOD: Bring Your Own Disaster?; Mobile Device Management Software; The Virtues of Virtual Private Networks; Appreciating the Difference Between Http and Https; References; Chapter 7 -- Medical Device Security; How real is the threat?; Taking a closer look at the "pathology" behind medjacking; What is the FDA Doing?; Dealing with Existing Medical Device Vulnerabilities; How are medical device companies coping?; Firming up the Firmware.
505
8
$a
Are medical device manufacturers HIPAA accountable?Weighing Your Security Options; References; Chapter 8 -- Educating Medical and Administrative Staff; Culture before education; Seeing the Bigger Picture; Understanding the Psychology of Change; Managing the Training Process; What Should the Training Consist of?; References; Chapter 9 -- HIPAA, HITECH, and the Business Associate; Evaluating the Threat; Are you a Business Associate?; Formal Agreements are a Must; More Exceptions to the Rule; What Should a Business Associate Agreement Look Like?; References.
505
8
$a
Chapter 10 -- Preparing for and Coping With a Data Breach.
650
0
$a
Medical records
$x
Access control.
$3
208607
650
0
$a
Data protection
$z
Great Britain.
$3
174437
650
0
$a
Confidential communications
$x
Physicians.
$3
208606
650
1 2
$a
Electronic Health Records.
$3
529992
650
1 2
$a
Computer Security.
$3
756697
650
2 2
$a
Confidentiality.
$3
896546
650
2 2
$a
Decision Making.
$3
396970
650
2 2
$a
Risk.
$3
183511
650
2 2
$a
Health Information Management
$x
standards.
$3
896547
650
7
$a
BUSINESS & ECONOMICS
$x
General.
$2
bisacsh
$3
536897
650
7
$a
Data protection.
$3
202312
651
7
$a
Great Britain.
$3
287994
655
0
$a
Electronic book.
$2
local
$3
533184
655
4
$a
Electronic books.
$2
local.
$3
214472
700
1
$a
Andress, Jason,
$e
author.
$3
783997
856
4 0
$u
https://www.sciencedirect.com/science/book/9780128043929
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000200717
電子館藏
1圖書
電子書
EB RA976 2016
一般使用(Normal)
in cat dept.
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://www.sciencedirect.com/science/book/9780128043929
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login