The definitive guide to complying with the HIPAA/HITECH privacy and security rules:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton, FL
Auerbach Publications
2013
|
Schlagworte: | |
Online-Zugang: | Cover image |
Beschreibung: | "The security standards in HIPAA were developed to implement appropriate security safeguards for the protection of certain Electronic Protected Health Information (EPHI) that may be at risk while permitting authorized individuals to use this information. This book assists the health care provider in reviewing the accessibility of EPHI to verify that it is not altered or destroyed in an unauthorized manner and that it is available as needed by authorized individuals. The text covers implementation standards and provides recommendations on how to comply with these standards. "-- Provided by publisher. -- "Preface The Department of Health and Human Services (HHS) has published four major rules implementing a number of provisions and regulations set out by the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and amended by the Health Information Technology for Economic and Clinical Health (HITECH) Act of 1999 as part of the American Recovery and Reinvestment Act (ARRA). These rules are the Privacy Rule; the Electronic Transactions and Code Sets Rule; the National Identifier requirements for employers, providers, and health plans; and the Security Rule. It also include more regulatory control over enforcement actions and stiffer penalties for noncompliance. There are many healthcare providers, healthcare clearinghouses, and health plans that are required to implement and comply with these rules, especially the Security Rule. Failure to implement or comply with these rules can leave the covered entity or others that need to comply open for large monetary fines, civil lawsuits, and other penalties. With the rise of security breaches and other high-profile incidences regarding successful hacking events, it is very apparent that information has become a valuable commodity. The United States has moved from a nation built on manufacturing and industry to a Includes bibliographical references and index |
Beschreibung: | XXXVII, 434 S. graph. Darst. |
ISBN: | 9781466507678 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV040728827 | ||
003 | DE-604 | ||
005 | 20130207 | ||
007 | t | ||
008 | 130206s2013 xxud||| |||| 00||| eng d | ||
010 | |a 2012035126 | ||
020 | |a 9781466507678 |c hardback |9 978-1-466-50767-8 | ||
035 | |a (OCoLC)914572529 | ||
035 | |a (DE-599)BVBBV040728827 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-11 | ||
050 | 0 | |a KF3827.R4 | |
082 | 0 | |a 346.73/086382 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Trinckes, John J. |e Verfasser |4 aut | |
245 | 1 | 0 | |a The definitive guide to complying with the HIPAA/HITECH privacy and security rules |c John J. Trinckes, Jr |
264 | 1 | |a Boca Raton, FL |b Auerbach Publications |c 2013 | |
300 | |a XXXVII, 434 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a "The security standards in HIPAA were developed to implement appropriate security safeguards for the protection of certain Electronic Protected Health Information (EPHI) that may be at risk while permitting authorized individuals to use this information. This book assists the health care provider in reviewing the accessibility of EPHI to verify that it is not altered or destroyed in an unauthorized manner and that it is available as needed by authorized individuals. The text covers implementation standards and provides recommendations on how to comply with these standards. "-- Provided by publisher. -- "Preface The Department of Health and Human Services (HHS) has published four major rules implementing a number of provisions and regulations set out by the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and amended by the Health Information Technology for Economic and Clinical Health (HITECH) Act of 1999 as part of the American Recovery and Reinvestment Act (ARRA). These rules are the Privacy Rule; the Electronic Transactions and Code Sets Rule; the National Identifier requirements for employers, providers, and health plans; and the Security Rule. It also include more regulatory control over enforcement actions and stiffer penalties for noncompliance. There are many healthcare providers, healthcare clearinghouses, and health plans that are required to implement and comply with these rules, especially the Security Rule. Failure to implement or comply with these rules can leave the covered entity or others that need to comply open for large monetary fines, civil lawsuits, and other penalties. With the rise of security breaches and other high-profile incidences regarding successful hacking events, it is very apparent that information has become a valuable commodity. The United States has moved from a nation built on manufacturing and industry to a | ||
500 | |a Includes bibliographical references and index | ||
610 | 2 | 4 | |a United States |t American Recovery and Reinvestment Act of 2009 |
610 | 2 | 4 | |a United States |t Health Insurance Portability and Accountability Act of 1996 |
610 | 2 | 4 | |a United States |t Health Information Technology for Economic and Clinical Health Act |
650 | 4 | |a Recht | |
650 | 4 | |a Medical records |x Law and legislation |z United States | |
650 | 4 | |a Medical records |x Access control |z United States | |
650 | 4 | |a Data protection |x Law and legislation |z United States | |
650 | 4 | |a Health insurance |x Law and legislation |z United States | |
650 | 4 | |a Health insurance claims |z United States | |
650 | 7 | |a COMPUTERS / Information Technology |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
651 | 4 | |a USA | |
856 | 4 | |u http://jacketsearch.tandf.co.uk/common/jackets/covers/websmall/978146650/9781466507678.jpg |3 Cover image | |
999 | |a oai:aleph.bib-bvb.de:BVB01-025708913 |
Datensatz im Suchindex
_version_ | 1804150043227193345 |
---|---|
any_adam_object | |
author | Trinckes, John J. |
author_facet | Trinckes, John J. |
author_role | aut |
author_sort | Trinckes, John J. |
author_variant | j j t jj jjt |
building | Verbundindex |
bvnumber | BV040728827 |
callnumber-first | K - Law |
callnumber-label | KF3827 |
callnumber-raw | KF3827.R4 |
callnumber-search | KF3827.R4 |
callnumber-sort | KF 43827 R4 |
callnumber-subject | KF - United States |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)914572529 (DE-599)BVBBV040728827 |
dewey-full | 346.73/086382 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 346 - Private law |
dewey-raw | 346.73/086382 |
dewey-search | 346.73/086382 |
dewey-sort | 3346.73 586382 |
dewey-tens | 340 - Law |
discipline | Rechtswissenschaft Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03792nam a2200493 c 4500</leader><controlfield tag="001">BV040728827</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20130207 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">130206s2013 xxud||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2012035126</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781466507678</subfield><subfield code="c">hardback</subfield><subfield code="9">978-1-466-50767-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)914572529</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV040728827</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">KF3827.R4</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">346.73/086382</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Trinckes, John J.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The definitive guide to complying with the HIPAA/HITECH privacy and security rules</subfield><subfield code="c">John J. Trinckes, Jr</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton, FL</subfield><subfield code="b">Auerbach Publications</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXXVII, 434 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"The security standards in HIPAA were developed to implement appropriate security safeguards for the protection of certain Electronic Protected Health Information (EPHI) that may be at risk while permitting authorized individuals to use this information. This book assists the health care provider in reviewing the accessibility of EPHI to verify that it is not altered or destroyed in an unauthorized manner and that it is available as needed by authorized individuals. The text covers implementation standards and provides recommendations on how to comply with these standards. "-- Provided by publisher. -- "Preface The Department of Health and Human Services (HHS) has published four major rules implementing a number of provisions and regulations set out by the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and amended by the Health Information Technology for Economic and Clinical Health (HITECH) Act of 1999 as part of the American Recovery and Reinvestment Act (ARRA). These rules are the Privacy Rule; the Electronic Transactions and Code Sets Rule; the National Identifier requirements for employers, providers, and health plans; and the Security Rule. It also include more regulatory control over enforcement actions and stiffer penalties for noncompliance. There are many healthcare providers, healthcare clearinghouses, and health plans that are required to implement and comply with these rules, especially the Security Rule. Failure to implement or comply with these rules can leave the covered entity or others that need to comply open for large monetary fines, civil lawsuits, and other penalties. With the rise of security breaches and other high-profile incidences regarding successful hacking events, it is very apparent that information has become a valuable commodity. The United States has moved from a nation built on manufacturing and industry to a</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="610" ind1="2" ind2="4"><subfield code="a">United States</subfield><subfield code="t">American Recovery and Reinvestment Act of 2009</subfield></datafield><datafield tag="610" ind1="2" ind2="4"><subfield code="a">United States</subfield><subfield code="t">Health Insurance Portability and Accountability Act of 1996</subfield></datafield><datafield tag="610" ind1="2" ind2="4"><subfield code="a">United States</subfield><subfield code="t">Health Information Technology for Economic and Clinical Health Act</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Recht</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Medical records</subfield><subfield code="x">Law and legislation</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Medical records</subfield><subfield code="x">Access control</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield><subfield code="x">Law and legislation</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Health insurance</subfield><subfield code="x">Law and legislation</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Health insurance claims</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Information Technology</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://jacketsearch.tandf.co.uk/common/jackets/covers/websmall/978146650/9781466507678.jpg</subfield><subfield code="3">Cover image</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025708913</subfield></datafield></record></collection> |
geographic | USA |
geographic_facet | USA |
id | DE-604.BV040728827 |
illustrated | Illustrated |
indexdate | 2024-07-10T00:32:39Z |
institution | BVB |
isbn | 9781466507678 |
language | English |
lccn | 2012035126 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025708913 |
oclc_num | 914572529 |
open_access_boolean | |
owner | DE-11 |
owner_facet | DE-11 |
physical | XXXVII, 434 S. graph. Darst. |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Auerbach Publications |
record_format | marc |
spelling | Trinckes, John J. Verfasser aut The definitive guide to complying with the HIPAA/HITECH privacy and security rules John J. Trinckes, Jr Boca Raton, FL Auerbach Publications 2013 XXXVII, 434 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier "The security standards in HIPAA were developed to implement appropriate security safeguards for the protection of certain Electronic Protected Health Information (EPHI) that may be at risk while permitting authorized individuals to use this information. This book assists the health care provider in reviewing the accessibility of EPHI to verify that it is not altered or destroyed in an unauthorized manner and that it is available as needed by authorized individuals. The text covers implementation standards and provides recommendations on how to comply with these standards. "-- Provided by publisher. -- "Preface The Department of Health and Human Services (HHS) has published four major rules implementing a number of provisions and regulations set out by the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and amended by the Health Information Technology for Economic and Clinical Health (HITECH) Act of 1999 as part of the American Recovery and Reinvestment Act (ARRA). These rules are the Privacy Rule; the Electronic Transactions and Code Sets Rule; the National Identifier requirements for employers, providers, and health plans; and the Security Rule. It also include more regulatory control over enforcement actions and stiffer penalties for noncompliance. There are many healthcare providers, healthcare clearinghouses, and health plans that are required to implement and comply with these rules, especially the Security Rule. Failure to implement or comply with these rules can leave the covered entity or others that need to comply open for large monetary fines, civil lawsuits, and other penalties. With the rise of security breaches and other high-profile incidences regarding successful hacking events, it is very apparent that information has become a valuable commodity. The United States has moved from a nation built on manufacturing and industry to a Includes bibliographical references and index United States American Recovery and Reinvestment Act of 2009 United States Health Insurance Portability and Accountability Act of 1996 United States Health Information Technology for Economic and Clinical Health Act Recht Medical records Law and legislation United States Medical records Access control United States Data protection Law and legislation United States Health insurance Law and legislation United States Health insurance claims United States COMPUTERS / Information Technology bisacsh COMPUTERS / Security / General bisacsh USA http://jacketsearch.tandf.co.uk/common/jackets/covers/websmall/978146650/9781466507678.jpg Cover image |
spellingShingle | Trinckes, John J. The definitive guide to complying with the HIPAA/HITECH privacy and security rules United States American Recovery and Reinvestment Act of 2009 United States Health Insurance Portability and Accountability Act of 1996 United States Health Information Technology for Economic and Clinical Health Act Recht Medical records Law and legislation United States Medical records Access control United States Data protection Law and legislation United States Health insurance Law and legislation United States Health insurance claims United States COMPUTERS / Information Technology bisacsh COMPUTERS / Security / General bisacsh |
title | The definitive guide to complying with the HIPAA/HITECH privacy and security rules |
title_auth | The definitive guide to complying with the HIPAA/HITECH privacy and security rules |
title_exact_search | The definitive guide to complying with the HIPAA/HITECH privacy and security rules |
title_full | The definitive guide to complying with the HIPAA/HITECH privacy and security rules John J. Trinckes, Jr |
title_fullStr | The definitive guide to complying with the HIPAA/HITECH privacy and security rules John J. Trinckes, Jr |
title_full_unstemmed | The definitive guide to complying with the HIPAA/HITECH privacy and security rules John J. Trinckes, Jr |
title_short | The definitive guide to complying with the HIPAA/HITECH privacy and security rules |
title_sort | the definitive guide to complying with the hipaa hitech privacy and security rules |
topic | United States American Recovery and Reinvestment Act of 2009 United States Health Insurance Portability and Accountability Act of 1996 United States Health Information Technology for Economic and Clinical Health Act Recht Medical records Law and legislation United States Medical records Access control United States Data protection Law and legislation United States Health insurance Law and legislation United States Health insurance claims United States COMPUTERS / Information Technology bisacsh COMPUTERS / Security / General bisacsh |
topic_facet | United States American Recovery and Reinvestment Act of 2009 United States Health Insurance Portability and Accountability Act of 1996 United States Health Information Technology for Economic and Clinical Health Act Recht Medical records Law and legislation United States Medical records Access control United States Data protection Law and legislation United States Health insurance Law and legislation United States Health insurance claims United States COMPUTERS / Information Technology COMPUTERS / Security / General USA |
url | http://jacketsearch.tandf.co.uk/common/jackets/covers/websmall/978146650/9781466507678.jpg |
work_keys_str_mv | AT trinckesjohnj thedefinitiveguidetocomplyingwiththehipaahitechprivacyandsecurityrules |