Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
About this product
Product Identifiers
PublisherAuerbach Publishers, Incorporated
ISBN-101466507675
ISBN-139781466507678
eBay Product ID (ePID)112577836
Product Key Features
Number of Pages472 Pages
LanguageEnglish
Publication NameDefinitive Guide to Complying with the Hipaa/Hitech Privacy and Security Rules
Publication Year2012
SubjectPrivacy, Medical History & Records, Security / General, Information Technology
TypeTextbook
AuthorJr. Trinckes John J.
Subject AreaLaw, Computers, Medical
FormatHardcover
Dimensions
Item Height1.2 in
Item Weight30.5 Oz
Item Length9.3 in
Item Width6.4 in
Additional Product Features
Intended AudienceCollege Audience
LCCN2012-035126
TitleLeadingThe
IllustratedYes
SynopsisThe Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules is a comprehensive manual to ensuring compliance with the implementation standards of the Privacy and Security Rules of HIPAA and provides recommendations based on other related regulations and industry best practices. The book is designed to assist you in reviewing the accessibility of electronic protected health information (EPHI) to make certain that it is not altered or destroyed in an unauthorized manner, and that it is available as needed only by authorized individuals for authorized use. It can also help those entities that may not be covered by HIPAA regulations but want to assure their customers they are doing their due diligence to protect their personal and private information. Since HIPAA/HITECH rules generally apply to covered entities, business associates, and their subcontractors, these rules may soon become de facto standards for all companies to follow. Even if you aren't required to comply at this time, you may soon fall within the HIPAA/HITECH purview. So, it is best to move your procedures in the right direction now. The book covers administrative, physical, and technical safeguards; organizational requirements; and policies, procedures, and documentation requirements. It provides sample documents and directions on using the policies and procedures to establish proof of compliance. This is critical to help prepare entities for a HIPAA assessment or in the event of an HHS audit. Chief information officers and security officers who master the principles in this book can be confident they have taken the proper steps to protect their clients' information and strengthen their security posture. This can provide a strategic advantage to their organization, demonstrating to clients that they not only care about their health and well-being, but are also vigilant about protecting their clients' privacy.