語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Protecting patient informationa deci...
~
Andress, Jason,
Protecting patient informationa decision-maker's guide to risk, prevention, and damage control /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Protecting patient informationPaul Cerrato ; Jason Andress, technical editor.
其他題名:
a decision-maker's guide to risk, prevention, and damage control /
作者:
Cerrato, Paul,
其他作者:
Andress, Jason,
出版者:
Amsterdam :Syngress is an imprint of Elsevier,2016.
面頁冊數:
1 online resource.
附註:
Includes index.
標題:
Medical recordsAccess control.
標題:
Great Britain.
電子資源:
https://www.sciencedirect.com/science/book/9780128043929
ISBN:
9780128044117 (electronic bk.)
Protecting patient informationa decision-maker's guide to risk, prevention, and damage control /
Cerrato, Paul,
Protecting patient information
a decision-maker's guide to risk, prevention, and damage control /[electronic resource] :Paul Cerrato ; Jason Andress, technical editor. - Amsterdam :Syngress is an imprint of Elsevier,2016. - 1 online resource.
Includes index.
Includes bibliographical references and index.
Cover ; Title Page; Copyright Page; Disclaimer; Dedication; Contents; About the Author; Preface; Chapter 1 -- Dissecting a Book Title; Chapter 2 -- How Well Protected is Your Protected Health Information? Perception Versus Reality; The Cost of Insecurity is Steep; A Closer Look at Data Breach Fines; Do not ignore individual states in breach investigations; Fines are Only Part of the Problem; Factoring in the Meaningful Use Program; Calculating the Cost of Security; References; Chapter 3 -- Regulations Governing Protected Health Information; Defining the Crown Jewels.
ISBN: 9780128044117 (electronic bk.)
LCCN: 2016930217Subjects--Topical Terms:
208607
Medical records
--Access control.Subjects--Geographical Terms:
287994
Great Britain.
Index Terms--Genre/Form:
533184
Electronic book.
LC Class. No.: RA976
Dewey Class. No.: 651.504261
National Library of Medicine Call No.: 2016 F-929
Protecting patient informationa decision-maker's guide to risk, prevention, and damage control /
LDR
:04178cmm a2200373 a 4500
001
601461
006
m o d
007
cr cnu---unuuu
008
211110s2016 ne a gob 001 0 eng d
010
$a
2016930217
020
$a
9780128044117 (electronic bk.)
020
$a
012804411X (electronic bk.)
020
$a
9780128043929
020
$a
012804392X
035
$a
(OCoLC)946997515
035
$a
ocn946997515
040
$a
N
$b
eng
$c
N
$d
IDEBK
$d
YDXCP
$d
N
$d
OCLCF
$d
EBLCP
$d
OPELS
$d
UPM
$d
IDB
$d
OTZ
$d
MERUC
$d
OCLCQ
$d
U3W
$d
D6H
$d
WRM
$d
AU@
$d
GGVRL
$d
EZC
$d
OCLCQ
$d
WYU
$d
OCLCA
$d
MERER
$d
OCLCO
$d
OCLCA
$d
OCLCQ
$d
OCLCA
$d
UKMGB
$d
OCLCQ
$d
SDF
$d
LVT
$d
VT2
041
0
$a
eng
043
$a
e-uk---
050
4
$a
RA976
060
4
$a
2016 F-929
060
4
$a
WX 175
082
0 4
$a
651.504261
$2
23
100
1
$a
Cerrato, Paul,
$e
author.
$3
845437
245
1 0
$a
Protecting patient information
$h
[electronic resource] :
$b
a decision-maker's guide to risk, prevention, and damage control /
$c
Paul Cerrato ; Jason Andress, technical editor.
260
$a
Amsterdam :
$b
Syngress is an imprint of Elsevier,
$c
2016.
300
$a
1 online resource.
500
$a
Includes index.
504
$a
Includes bibliographical references and index.
505
0
$a
Cover ; Title Page; Copyright Page; Disclaimer; Dedication; Contents; About the Author; Preface; Chapter 1 -- Dissecting a Book Title; Chapter 2 -- How Well Protected is Your Protected Health Information? Perception Versus Reality; The Cost of Insecurity is Steep; A Closer Look at Data Breach Fines; Do not ignore individual states in breach investigations; Fines are Only Part of the Problem; Factoring in the Meaningful Use Program; Calculating the Cost of Security; References; Chapter 3 -- Regulations Governing Protected Health Information; Defining the Crown Jewels.
505
8
$a
HIPAA Privacy Versus Security Rules: Related But DifferentTechnology is only part of the equation; Enforcing HIPAA Regulations; A closer look at the HIPAA Security Rule; The HIPAA Breach Notification Rule; The Role of the Federal Trade Commission; Do not forget State Laws; References; Chapter 4 -- Risk Analysis; Learning the jargon; Vulnerability; Threat Versus Risk; Compliance Versus Management; The ONC Approach to Risk Analysis and Security Management; Step 1; Step 2; Step 3; Step 4; Finding the Right Analysis Tools; Tapping the HHS Resources.
505
8
$a
Beware the "Required" Versus "Addressable" ConfusionMoving Beyond a Checklist of Security Questions; References; Chapter 5 -- Reducing the Risk of a Data Breach; Seeing the larger picture; The best mindset: guilty until proven innocent; Passwords, Policies, and Procedures; Establishing Effective Governance; Technological Solutions; Encryption; Firewalls; Antimalware/Antiviral Software; Access Control; Intrusion Detection and Intrusion Prevention Systems; Faxing Solutions; Auditing Your Computer Systems; Making Email More Secure; Establishing Physical Safeguards; Protecting Big Data.
505
8
$a
Testing Your Network SecurityCybersecurity Insurance; References; Chapter 6 -- Mobile Device Security; Thinking strategically; Covering the Basics; BYOD: Bring Your Own Disaster?; Mobile Device Management Software; The Virtues of Virtual Private Networks; Appreciating the Difference Between Http and Https; References; Chapter 7 -- Medical Device Security; How real is the threat?; Taking a closer look at the "pathology" behind medjacking; What is the FDA Doing?; Dealing with Existing Medical Device Vulnerabilities; How are medical device companies coping?; Firming up the Firmware.
505
8
$a
Are medical device manufacturers HIPAA accountable?Weighing Your Security Options; References; Chapter 8 -- Educating Medical and Administrative Staff; Culture before education; Seeing the Bigger Picture; Understanding the Psychology of Change; Managing the Training Process; What Should the Training Consist of?; References; Chapter 9 -- HIPAA, HITECH, and the Business Associate; Evaluating the Threat; Are you a Business Associate?; Formal Agreements are a Must; More Exceptions to the Rule; What Should a Business Associate Agreement Look Like?; References.
505
8
$a
Chapter 10 -- Preparing for and Coping With a Data Breach.
650
0
$a
Medical records
$x
Access control.
$3
208607
650
0
$a
Data protection
$z
Great Britain.
$3
174437
650
0
$a
Confidential communications
$x
Physicians.
$3
208606
650
1 2
$a
Electronic Health Records.
$3
529992
650
1 2
$a
Computer Security.
$3
756697
650
2 2
$a
Confidentiality.
$3
896546
650
2 2
$a
Decision Making.
$3
396970
650
2 2
$a
Risk.
$3
183511
650
2 2
$a
Health Information Management
$x
standards.
$3
896547
650
7
$a
BUSINESS & ECONOMICS
$x
General.
$2
bisacsh
$3
536897
650
7
$a
Data protection.
$3
202312
651
7
$a
Great Britain.
$3
287994
655
0
$a
Electronic book.
$2
local
$3
533184
655
4
$a
Electronic books.
$2
local.
$3
214472
700
1
$a
Andress, Jason,
$e
author.
$3
783997
856
4 0
$u
https://www.sciencedirect.com/science/book/9780128043929
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000200717
電子館藏
1圖書
電子書
EB RA976 2016
一般使用(Normal)
編目處理中
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://www.sciencedirect.com/science/book/9780128043929
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入