PROGRAMS AND PROCESSES The Roles and Responsibilities, Ross A. Leo, CISSP, CHS-III The Final HIPAA Security Rule Is Here! Now What? Todd Fitzgerald, CISSP, CISA Incorporating HIPAA Security Requirements into an Enterprise Security Program, Brian T. Geffert, CISSP, CISA Steps to an Effective Data Classification Program, Mary Brown, CISSP, CISA STANDARDS AND COMPLIANCE HIPAA Security and the ISO/IEC 17799, Uday O. Ali Pabrai, S+, CHSS, SCNA Execution of a Self-Directed Risk Assessment Methodology to Address HIPAA Data Security Requirements, Johnathan Coleman, CISSP, CISM Ten Steps to Effective Web-Based Security Policy Development and Distribution, Todd Fitzgerald, CISSP, CISA ECONOMICS, LEGALITY, AND LIABILITY HIPAA Privacy Rules Require Security Compliance, Steven B. Markin Legalities and Planning: The Stake Is in the Ground, Ken M. Shaurette, CISSP, CISA, CISM, IAM TRANSACTION AND INTERACTIONS HIPAA from the Patient's Point of View, Oscar Boultinghouse, M.D. Interoperability and Business Continuity Involving HIPAA EDI Transactions, Mark Lott The Role of DHHS, CMS, OCR, and OHS, Todd Fitzgerald, CISSP, CISA SECURITY, PRIVACY, AND CONTINUITY The HIPAA Security Risk Analysis, Caroline Ramsey Hamilton HIPAA Security Compliance: What It Means for Developers, Vendors, and Purchasers, Keith Pasley, CISSP Issues and Considerations for Business Continuity Planning under HIPAA, Kevin C. Miller APPENDICES A Part I: A HIPAA Glossary Part II: Consolidated HIPAA Administrative Simplification Final Rule Definitions Part III: Purpose and Maintenance B HIPAA Security Rule Standards, Implementation Specifications, and NIST Resource Guide for Implementing HIPAA C Policy Examples D Guide to HIPAA Security Assessment Prepared by WorkSmart MD, A Meyer Technologies, Inc. Company