Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules

£135.00

Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules

Non-profitmaking organizations Health systems and services Digital and information technologies: Legal aspects Computer security Network management Computer science

Author: John J. Trinckes Jr.

Dinosaur mascot

Language: English

Published by: Auerbach Publications

Published on: 3rd December 2012

Format: LCP-protected ePub

Size: 2 Mb

ISBN: 9781466589230


The Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules

This comprehensive manual is designed to ensure compliance with the implementation standards of the Privacy and Security Rules of HIPAA. It provides recommendations based on related regulations and industry best practices.

The book assists in reviewing the accessibility of electronic protected health information (EPHI) to ensure it is not altered or destroyed in an unauthorized manner, and that it is available only to authorized individuals for authorized use.

It also helps entities that may not be covered by HIPAA regulations but want to demonstrate their commitment to protecting personal and private information.

Since HIPAA/HITECH rules generally apply to covered entities, business associates, and subcontractors, these rules may soon become de facto standards for all companies. Even if compliance is not currently required, it is advisable to move procedures in the right direction now.

Coverage and Content

The book covers administrative, physical, and technical safeguards; organizational requirements; and policies, procedures, and documentation requirements. It provides sample documents and guidance on establishing proof of compliance.

This is critical for preparing entities for a HIPAA assessment or an HHS audit.

Benefits for Security Officers and CIOs

Chief information officers and security officers who master the principles in this book can be confident they have taken the proper steps to protect their clients' information and enhance their security posture.

This strategic advantage demonstrates to clients that the organization cares about their health and well-being, and is vigilant about protecting their privacy.

Show moreShow less