Protecting Patient Information

A Decision-Maker's Guide to Risk, Prevention, and Damage Control
 
 
Syngress (Verlag)
  • 1. Auflage
  • |
  • erschienen am 14. April 2016
  • |
  • 162 Seiten
 
E-Book | ePUB mit Adobe DRM | Systemvoraussetzungen
E-Book | PDF mit Adobe DRM | Systemvoraussetzungen
978-0-12-804411-7 (ISBN)
 

Over 1,000 healthcare organizations have been plagued by data breaches in recent years, causing massive exposure of protected health data at Anthem, Premara Blue Cross and many other major organizations. These incidents make it abundantly clear that healthcare has become a lucrative target for attackers. Ignoring this threat by putting cybersecurity near the bottom on the priority list is costing hospitals, medical practices, and insurers millions of dollars in fines, lawsuits, and bad press.

Protecting Patient Information provides the concrete steps needed for tightening the information security of any healthcare IT system and reducing the risk exposing patient health information (PHI) to the public. This book offers a systematic, 3-pronged approach for addressing the IT security deficits present in healthcare organizations of all sizes. Healthcare decision makers are shown how to do an in-depth analysis of their organization's information risk level. After this assessment is complete, the book offers specific measures for lowering the risk of a data breach, taking into account federal and state regulations governing the use of patient data. Finally, Protecting Patient Information outlines the steps to take if an organization experiences a data breach, even if it takes all the right precautions.


  • Accessibly written for physicians, nurses, healthcare executives, and business associates who need to safeguard patient health information

  • Shows how to put in place the information security measures needed to reduce the threat of data breach

  • Teaches physicians that run small practices how to protect their patient's data

  • Demonstrates to decision-makers of large and small healthcare organizations the urgency of investing in cybersecurity



Paul Cerrato has more than 30 years of experience working in healthcare and has written extensively on patient care, electronic health records, protected health information (PHI) security, practice management, and clinical decision support. He has served as Editor of InformationWeek Healthcare, Executive Editor of Contemporary OB/GYN, Senior Editor RN Journal, and as contributing writer/editor for the Yale University School of Medicine, the American Academy of Pediatrics, Information Week, Medscape, Healthcare Finance News, IMedicalapps.com, and Medpage Today. The Healthcare Information and Management Systems Society (HIMSS) has listed Paul as one of the most influential columnists in healthcare IT.
  • Englisch
  • San Diego
  • |
  • USA
Elsevier Science
  • 7,21 MB
978-0-12-804411-7 (9780128044117)
012804411X (012804411X)
weitere Ausgaben werden ermittelt
  • Cover
  • Title Page
  • Copyright Page
  • Disclaimer
  • Dedication
  • Contents
  • About the Author
  • Preface
  • Chapter 1 - Dissecting a Book Title
  • Chapter 2 - How Well Protected is Your Protected Health Information? Perception Versus Reality
  • The Cost of Insecurity is Steep
  • A Closer Look at Data Breach Fines
  • Do not ignore individual states in breach investigations
  • Fines are Only Part of the Problem
  • Factoring in the Meaningful Use Program
  • Calculating the Cost of Security
  • References
  • Chapter 3 - Regulations Governing Protected Health Information
  • Defining the Crown Jewels
  • HIPAA Privacy Versus Security Rules: Related But Different
  • Technology is only part of the equation
  • Enforcing HIPAA Regulations
  • A closer look at the HIPAA Security Rule
  • The HIPAA Breach Notification Rule
  • The Role of the Federal Trade Commission
  • Do not forget State Laws
  • References
  • Chapter 4 - Risk Analysis
  • Learning the jargon
  • Vulnerability
  • Threat Versus Risk
  • Compliance Versus Management
  • The ONC Approach to Risk Analysis and Security Management
  • Step 1
  • Step 2
  • Step 3
  • Step 4
  • Finding the Right Analysis Tools
  • Tapping the HHS Resources
  • Beware the "Required" Versus "Addressable" Confusion
  • Moving Beyond a Checklist of Security Questions
  • References
  • Chapter 5 - Reducing the Risk of a Data Breach
  • Seeing the larger picture
  • The best mindset: guilty until proven innocent
  • Passwords, Policies, and Procedures
  • Establishing Effective Governance
  • Technological Solutions
  • Encryption
  • Firewalls
  • Antimalware/Antiviral Software
  • Access Control
  • Intrusion Detection and Intrusion Prevention Systems
  • Faxing Solutions
  • Auditing Your Computer Systems
  • Making Email More Secure
  • Establishing Physical Safeguards
  • Protecting Big Data
  • Testing Your Network Security
  • Cybersecurity Insurance
  • References
  • Chapter 6 - Mobile Device Security
  • Thinking strategically
  • Covering the Basics
  • BYOD: Bring Your Own Disaster?
  • Mobile Device Management Software
  • The Virtues of Virtual Private Networks
  • Appreciating the Difference Between Http and Https
  • References
  • Chapter 7 - Medical Device Security
  • How real is the threat?
  • Taking a closer look at the "pathology" behind medjacking
  • What is the FDA Doing?
  • Dealing with Existing Medical Device Vulnerabilities
  • How are medical device companies coping?
  • Firming up the Firmware
  • Are medical device manufacturers HIPAA accountable?
  • Weighing Your Security Options
  • References
  • Chapter 8 - Educating Medical and Administrative Staff
  • Culture before education
  • Seeing the Bigger Picture
  • Understanding the Psychology of Change
  • Managing the Training Process
  • What Should the Training Consist of?
  • References
  • Chapter 9 - HIPAA, HITECH, and the Business Associate
  • Evaluating the Threat
  • Are you a Business Associate?
  • Formal Agreements are a Must
  • More Exceptions to the Rule
  • What Should a Business Associate Agreement Look Like?
  • References
  • Chapter 10 - Preparing for and Coping With a Data Breach
  • How bad is the situation?
  • Preparing for the Worst
  • Managing Security Incidents and Data Breaches
  • Creating a Comprehensive Response Plan
  • Decision Making, Accountability, and Trust
  • References
  • Appendix
  • Sample business associate agreement provisions
  • Definitions
  • Obligations and Activities of Business Associate
  • Permitted Uses and Disclosures by Business Associate
  • Provisions for Covered Entity to Inform Business Associate of Privacy Practices and Restrictions
  • Permissible Requests by Covered Entity
  • Term and Termination
  • Miscellaneous [Optional]
  • References
  • Subject Index
  • Back cover

Dateiformat: EPUB
Kopierschutz: Adobe-DRM (Digital Rights Management)

Systemvoraussetzungen:

Computer (Windows; MacOS X; Linux): Installieren Sie bereits vor dem Download die kostenlose Software Adobe Digital Editions (siehe E-Book Hilfe).

Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions (siehe E-Book Hilfe).

E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nicht Kindle)

Das Dateiformat EPUB ist sehr gut für Romane und Sachbücher geeignet - also für "fließenden" Text ohne komplexes Layout. Bei E-Readern oder Smartphones passt sich der Zeilen- und Seitenumbruch automatisch den kleinen Displays an. Mit Adobe-DRM wird hier ein "harter" Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.

Weitere Informationen finden Sie in unserer E-Book Hilfe.


Dateiformat: PDF
Kopierschutz: Adobe-DRM (Digital Rights Management)

Systemvoraussetzungen:

Computer (Windows; MacOS X; Linux): Installieren Sie bereits vor dem Download die kostenlose Software Adobe Digital Editions (siehe E-Book Hilfe).

Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions (siehe E-Book Hilfe).

E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nicht Kindle)

Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Adobe-DRM wird hier ein "harter" Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.

Weitere Informationen finden Sie in unserer E-Book Hilfe.


Download (sofort verfügbar)

42,78 €
inkl. 19% MwSt.
Download / Einzel-Lizenz
ePUB mit Adobe DRM
siehe Systemvoraussetzungen
PDF mit Adobe DRM
siehe Systemvoraussetzungen
Hinweis: Die Auswahl des von Ihnen gewünschten Dateiformats und des Kopierschutzes erfolgt erst im System des E-Book Anbieters
E-Book bestellen

Unsere Web-Seiten verwenden Cookies. Mit der Nutzung dieser Web-Seiten erklären Sie sich damit einverstanden. Mehr Informationen finden Sie in unserem Datenschutzhinweis. Ok