Healthcare Information Privacy and Security Regulatory Compliance and Data Security in the Age of Electronic Health Records /

Healthcare IT is the growth industry right now, and the need for guidance in regard to privacy and security is huge. Why? With new federal incentives and penalties tied to the HITECH Act, HIPAA, and the implementation of Electronic Health Record (EHR) systems, medical practices and healthcare system...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: Robichau, Bernard Peter (Συγγραφέας)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berkeley, CA : Apress : Imprint: Apress, 2014.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 03854nam a22003975i 4500
001 978-1-4302-6677-8
003 DE-He213
005 20141121031251.0
007 cr nn 008mamaa
008 140623s2014 xxu| s |||| 0|eng d
020 |a 9781430266778  |9 978-1-4302-6677-8 
024 7 |a 10.1007/978-1-4302-6677-8  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.A25 
072 7 |a URY  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.82  |2 23 
100 1 |a Robichau, Bernard Peter.  |e author. 
245 1 0 |a Healthcare Information Privacy and Security  |h [electronic resource] :  |b Regulatory Compliance and Data Security in the Age of Electronic Health Records /  |c by Bernard Peter Robichau. 
264 1 |a Berkeley, CA :  |b Apress :  |b Imprint: Apress,  |c 2014. 
300 |a XI, 194 p. 25 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
520 |a Healthcare IT is the growth industry right now, and the need for guidance in regard to privacy and security is huge. Why? With new federal incentives and penalties tied to the HITECH Act, HIPAA, and the implementation of Electronic Health Record (EHR) systems, medical practices and healthcare systems are implementing new software at breakneck speed. Yet privacy and security considerations are often an afterthought, putting healthcare organizations at risk of fines and damage to their reputations.   Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records outlines the new regulatory regime, and it also provides IT professionals with the processes and protocols, standards, and governance tools they need to maintain a secure and legal environment for data and records. It’s a concrete resource that will help you understand the issues affecting the law and regulatory compliance, privacy, and security in the enterprise.   As healthcare IT security expert Bernard Peter Robichau II shows, the success of a privacy and security initiative lies not just in proper planning but also in identifying who will own the implementation and maintain technologies and processes. From executive sponsors to system analysts and administrators, a properly designed security program requires that that the right people are assigned to the right tasks and have the tools they need. Robichau explains how to design and implement that program with an eye toward long-term success. Putting processes and systems in place is, of course, only the start. Robichau also shows how to manage your security program and maintain operational support including ongoing maintenance and policy updates. (Because regulations never sleep!)  This book will help you devise solutions that include: Identity and access management systems Proper application design Physical and environmental safeguards Systemwide and client-based security configurations Safeguards for patient data Training and auditing procedures Governance and policy administration  Healthcare Information Privacy and Security is the definitive guide to help you through the process of maintaining privacy and security in the healthcare industry. It will help you keep health information safe, and it will help keep your organization—whether local clinic or major hospital system—on the right side of the law. 
650 0 |a Computer science. 
650 0 |a Data encryption (Computer science). 
650 1 4 |a Computer Science. 
650 2 4 |a Data Encryption. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9781430266761 
856 4 0 |u http://dx.doi.org/10.1007/978-1-4302-6677-8  |z Full Text via HEAL-Link 
912 |a ZDB-2-CWD 
950 |a Professional and Applied Computing (Springer-12059)