HIPAA Privacy and Security Compliance - Simplified

HIPAA Privacy and Security Compliance - Simplified

Author: Robert Brzezinski

Publisher: CreateSpace

Published: 2012-07-01

Total Pages: 160

ISBN-13: 9781478177968

DOWNLOAD EBOOK

This updated edition re-published in July 2013, includes 2013 HIPAA Omnibus changes and simplifies the overwhelming complexity of the HIPAA Privacy and Security regulations. HIPAA standards and implementation specifications can be understood with the help of this simple guide. Risk management program can be built with step-by-step implementation guide, risk self-assessment, set of comprehensive policies and procedures, privacy, security, office productivity forms and ready to use templates. The book also contains HIPAA awareness quiz to test the basic understanding of rules and provides examples of workable solutions and documents. More about Robert K. Brzezinski MBA, CHPS, CISA, CPHIMS can be found at www.bizwit.us


The Practical Guide to HIPAA Privacy and Security Compliance

The Practical Guide to HIPAA Privacy and Security Compliance

Author: Kevin Beaver

Publisher:

Published: 2004

Total Pages: 490

ISBN-13: 9780429211416

DOWNLOAD EBOOK

HIPAA is very complex. So are the privacy and security initiatives that must occur to reach and maintain HIPAA compliance. Organizations need a quick, concise reference in order to meet HIPAA requirements and maintain ongoing compliance. The Practical Guide to HIPAA Privacy and Security Compliance is a one-stop resource for real-world HIPAA privacy and security advice that you can immediately apply to your organization's unique situation. This how-to reference explains what HIPAA is about, what it requires, and what you can do to achieve and maintain compliance. It describes the HIPAA.


HIPAA

HIPAA

Author: June M. Sullivan

Publisher: American Bar Association

Published: 2004

Total Pages: 274

ISBN-13: 9781590313961

DOWNLOAD EBOOK

This concise, practical guide helps the advocate understand the sometimes dense rules in advising patients, physicians, and hospitals, and in litigating HIPAA-related issues.


Beyond the HIPAA Privacy Rule

Beyond the HIPAA Privacy Rule

Author: Institute of Medicine

Publisher: National Academies Press

Published: 2009-03-24

Total Pages: 334

ISBN-13: 0309124999

DOWNLOAD EBOOK

In the realm of health care, privacy protections are needed to preserve patients' dignity and prevent possible harms. Ten years ago, to address these concerns as well as set guidelines for ethical health research, Congress called for a set of federal standards now known as the HIPAA Privacy Rule. In its 2009 report, Beyond the HIPAA Privacy Rule: Enhancing Privacy, Improving Health Through Research, the Institute of Medicine's Committee on Health Research and the Privacy of Health Information concludes that the HIPAA Privacy Rule does not protect privacy as well as it should, and that it impedes important health research.


Stedman's Guide to the HIPAA Privacy Rule

Stedman's Guide to the HIPAA Privacy Rule

Author: Kathy Rockel

Publisher: Lippincott Williams & Wilkins

Published: 2005-08-18

Total Pages: 148

ISBN-13: 9780781763011

DOWNLOAD EBOOK

Stedman's Guide to the HIPAA Privacy Rule finally makes clear for medical transcription students and professionals the confusing legal issues surrounding the HIPAA Privacy Rule, and how it relates to and affects their practice. This text provides comprehensive information about the rule itself, how it affects service owners and independent contractors, implementation guidelines, sample template contract language, and sample policies. Mnemonics and other quick aids help readers remember important information. Case-based vignettes and real-world applications emphasize the practical application of the law on medical transcriptions. End-of-chapter critical thinking questions—with answers in an appendix—encourage readers to ponder and apply information.


Hipaa Demystified

Hipaa Demystified

Author: Lorna Hecker

Publisher: Loger Press

Published: 2016-06-15

Total Pages: 264

ISBN-13: 9781936961269

DOWNLOAD EBOOK

This vital resource offers mental and behavioral health providers clear, demystified guidance on HIPAA and HITECH regulations pertinent to practice. Many mental health providers erroneously believe that if they uphold their ethical and legal obligation to client confidentiality, they are HIPAA compliant. Others may believe that because their electronic health record provider promises HIPAA compliance, that their practice or organization is HIPAA compliant also not true. The reality is HIPAA has changed how providers conduct business, permanently, and providers need to know how to apply the regulations in daily practice. Providers now have very specific privacy requirements for managing patient information, and in our evolving digital era, HIPAA security regulations also force providers to consider all electronic aspects of their practice. HIPAA Demystified applies to anyone responsible for HIPAA compliance, ranging from sole practitioners, to agencies, to larger mental health organizations, and mental health educators. While this book is written for HIPAA covered entities and business associates, for those who fall outside of the regulations, it is important to know that privacy and security regulations reflect a new standard of care for protection of patient information for all practitioners, regardless of compliance status. Additionally, some HIPAA requirements are now being codified into state laws, including breach notification. This book s concise but comprehensive format describes HIPAA compliance in ways that are understandable and practical. Differences between traditional patient confidentiality and HIPAA privacy and security regulations are explained. Other important regulatory issues covered that are of importance of mental health providers include: Patient rights under HIPAA How HIPAA regulations define psychotherapy notes, with added federal protection Conducting a required security risk assessment and subsequent risk management strategies The interaction with HIPAA regulations and state mental health regulations Details about you may need Business Associate Agreements, and a Covered Entity s responsibility to complete due diligence on their BAs Training and documentation requirements, and the importance of sanction policies for violations of HIPAA Understanding what having a HIPAA breach means, and applicable breach notification requirements Cyber defensive strategies. HIPAA Demystified also addresses common questions mental health providers typically have about application of HIPAA to mobile devices (e.g. cell phones, laptops, flash drives), encryption requirements, social media, and Skype and other video transmissions. The book also demonstrates potential costs of failing to comply with the regulations, including financial loss, reputational damage, ethico-legal issues, and damage to the therapist-patient relationship. Readers will find this book chock full of real-life examples of individuals and organizations who ignored HIPAA, did not understand or properly implement specific requirements, failed to properly analyze the risks to their patient s private information, or intentionally skirted the law. In the quest to lower compliance risks for mental health providers HIPAA Demystified presents a concise, comprehensive guide, paving the path to HIPAA compliance for mental health providers in any setting.


Families Caring for an Aging America

Families Caring for an Aging America

Author: National Academies of Sciences, Engineering, and Medicine

Publisher: National Academies Press

Published: 2016-11-08

Total Pages: 367

ISBN-13: 0309448093

DOWNLOAD EBOOK

Family caregiving affects millions of Americans every day, in all walks of life. At least 17.7 million individuals in the United States are caregivers of an older adult with a health or functional limitation. The nation's family caregivers provide the lion's share of long-term care for our older adult population. They are also central to older adults' access to and receipt of health care and community-based social services. Yet the need to recognize and support caregivers is among the least appreciated challenges facing the aging U.S. population. Families Caring for an Aging America examines the prevalence and nature of family caregiving of older adults and the available evidence on the effectiveness of programs, supports, and other interventions designed to support family caregivers. This report also assesses and recommends policies to address the needs of family caregivers and to minimize the barriers that they encounter in trying to meet the needs of older adults.


Building a HIPAA-Compliant Cybersecurity Program

Building a HIPAA-Compliant Cybersecurity Program

Author: Eric C. Thompson

Publisher: Apress

Published: 2017-11-11

Total Pages: 303

ISBN-13: 1484230604

DOWNLOAD EBOOK

Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The requirement is a focus area for the Department of Health and Human Services (HHS) Office for Civil Rights (OCR) during breach investigations and compliance audits. This book lays out a plan for healthcare organizations of all types to successfully comply with these requirements and use the output to build upon the cybersecurity program. With the proliferation of cybersecurity breaches, the number of healthcare providers, payers, and business associates investigated by the OCR has risen significantly. It is not unusual for additional penalties to be levied when victims of breaches cannot demonstrate that an enterprise-wide risk assessment exists, comprehensive enough to document all of the risks to ePHI. Why is it that so many covered entities and business associates fail to comply with this fundamental safeguard? Building a HIPAA Compliant Cybersecurity Program cuts through the confusion and ambiguity of regulatory requirements and provides detailed guidance to help readers: Understand and document all known instances where patient data exist Know what regulators want and expect from the risk analysis process Assess and analyze the level of severity that each risk poses to ePHI Focus on the beneficial outcomes of the process: understanding real risks, and optimizing deployment of resources and alignment with business objectives What You’ll Learn Use NIST 800-30 to execute a risk analysis and assessment, which meets the expectations of regulators such as the Office for Civil Rights (OCR) Understand why this is not just a compliance exercise, but a way to take back control of protecting ePHI Leverage the risk analysis process to improve your cybersecurity program Know the value of integrating technical assessments to further define risk management activities Employ an iterative process that continuously assesses the environment to identify improvement opportunities Who This Book Is For Cybersecurity, privacy, and compliance professionals working for organizations responsible for creating, maintaining, storing, and protecting patient information


Legal Issues in Information Security

Legal Issues in Information Security

Author: Joanna Lyn Grama

Publisher: Jones & Bartlett Publishers

Published: 2014-06-19

Total Pages: 570

ISBN-13: 1284054756

DOWNLOAD EBOOK

This revised and updated second edition addresses the area where law and information security concerns intersect. Information systems security and legal compliance are now required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion. Organizations must build numerous information security and privacy responses into their daily operations to protect the business itself, fully meet legal requirements, and to meet the expectations of employees and customers. --