Atnaujinkite slapukų nuostatas

El. knyga: Protecting Patient Information: A Decision-Maker's Guide to Risk, Prevention, and Damage Control

(Clinician, Researcher, Author, Editor, and College Lecturer)
  • Formatas: EPUB+DRM
  • Išleidimo metai: 14-Apr-2016
  • Leidėjas: Syngress Media,U.S.
  • Kalba: eng
  • ISBN-13: 9780128044117
Kitos knygos pagal šią temą:
  • Formatas: EPUB+DRM
  • Išleidimo metai: 14-Apr-2016
  • Leidėjas: Syngress Media,U.S.
  • Kalba: eng
  • ISBN-13: 9780128044117
Kitos knygos pagal šią temą:

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

Protecting Patient Information: A Decision-Maker's Guide to Risk, Prevention, and Damage Control provides the concrete steps needed to tighten the information security of any healthcare IT system and reduce the risk of exposing patient health information (PHI) to the public. The book offers a systematic, 3-pronged approach for addressing the IT security deficits present in healthcare organizations of all sizes.

Healthcare decision-makers are shown how to conduct an in-depth analysis of their organization’s information risk level. After this assessment is complete, the book offers specific measures for lowering the risk of a data breach, taking into account federal and state regulations governing the use of patient data. Finally, the book outlines the steps necessary when an organization experiences a data breach, even when it has taken all the right precautions.

  • Written for physicians, nurses, healthcare executives, and business associates who need to safeguard patient health information
  • Shows how to put in place the information security measures needed to reduce the threat of data breach
  • Teaches physicians that run small practices how to protect their patient’s data
  • Demonstrates to decision-makers of large and small healthcare organizations the urgency of investing in cybersecurity

Recenzijos

"This is an unusual, yet interesting and important small volume physician leaders, business executives of health care organizations, and those with smaller or bigger offices would find it useful. Considering the topic, it is highly readable." --Annals of Clinical Psychiatry

"...its a good primer that condenses the main points of the regulations protecting patients data, and you will get some helpful tips. Its a good way to get a sense of what youll be in for if you start the journey." --Help Net Security

Daugiau informacijos

A systematic approach to healthcare cybersecurity, including how to secure healthcare IT systems and reduce the risk of exposing patient information
About the Author xiii
Preface xv
Chapter 1 Dissecting a book title
1(2)
Chapter 2 How well protected is your protected health information? Perception versus reality
3(16)
The cost of insecurity is steep
5(1)
A closer look at data breach fines
6(4)
Do not ignore individual states in breach investigations
10(1)
Fines are only part of the problem
11(2)
Factoring in the meaningful use program
13(1)
Calculating the cost of security
14(2)
References
16(3)
Chapter 3 Regulations governing protected health information
19(14)
Defining the crown jewels
19(3)
HIPAA privacy versus security rules: related but different
22(2)
Technology is only part of the equation
24(1)
Enforcing HIPAA regulations
25(1)
A closer look at the HIPAA Security Rule
26(1)
The HIPAA Breach Notification Rule
27(1)
The role of the Federal Trade Commission
28(2)
Do not forget State Laws
30(1)
References
31(2)
Chapter 4 Risk analysis
33(18)
Learning the jargon
33(1)
Compliance versus management
34(2)
The ONC approach to risk analysis and security management
36(4)
Finding the right analysis tools
40(3)
Tapping the HHS resources
43(2)
Beware the "required" versus "addressable" confusion
45(2)
Moving beyond a checklist of security questions
47(2)
References
49(2)
Chapter 5 Reducing the risk of a data breach
51(24)
Seeing the larger picture
52(1)
The best mindset: guilty until proven innocent
52(1)
Passwords, policies, and procedures
53(3)
Establishing effective governance
56(1)
Technological solutions
56(11)
Establishing physical safeguards
67(1)
Protecting big data
68(2)
Testing your network security
70(2)
Cybersecurity insurance
72(1)
References
72(3)
Chapter 6 Mobile device security
75(14)
Thinking strategically
75(1)
Covering the basics
76(3)
BYOD: bring your own disaster?
79(1)
Mobile device management software
80(3)
The virtues of virtual private networks
83(2)
Appreciating the difference between http and https
85(2)
References
87(2)
Chapter 7 Medical device security
89(14)
How real is the threat?
90(1)
Taking a closer look at the "pathology" behind medjacking
90(1)
What is the FDA doing?
91(4)
Dealing with existing medical device vulnerabilities
95(1)
How are medical device companies coping?
96(1)
Firming up the firmware
97(1)
Are medical device manufacturers HIPAA accountable?
98(1)
Weighing your security options
99(1)
References
100(3)
Chapter 8 Educating medical and administrative staff
103(10)
Culture before education
103(2)
Seeing the bigger picture
105(2)
Understanding the psychology of change
107(2)
Managing the training process
109(1)
What should the training consist of?
109(2)
References
111(2)
Chapter 9 HIPAA, HITECH, and the business associate
113(12)
Evaluating the threat
114(2)
Are you a business associate?
116(2)
Formal agreements are a must
118(1)
More exceptions to the rule
119(2)
What should a business associate agreement look like?
121(1)
References
122(3)
Chapter 10 Preparing for and coping with a data breach
125(7)
How bad is the situation?
125(1)
Preparing for the worst
126(1)
Managing security incidents and data breaches
127(1)
Creating a comprehensive response plan
128(3)
Decision making, accountability, and trust
131(1)
References 132(1)
Appendix 133(6)
Subject Index 139
Paul Cerrato, MA, has had over 30 years of experience working in healthcare, as a clinician, researcher, author, editor, and college lecturer. The last 7 years have been spent researching and writing about healthcare technology. He has served as Editor of Information Week Healthcare, Executive Editor of Contemporary OB/GYN, and Senior Editor of RN Magazine. Cerrato is the author of Protecting Patient Information and the co-author with John Halamka of Realizing the Promise of Precision Medicine. He has been named one of the most influential bloggers in healthcare IT by the Healthcare Information and Management Systems Society (HIMSS).