The Practical Guide to HIPAA Privacy and Security ComplianceHIPAA is very complex. So are the privacy and security initiatives that must occur to reach and maintain HIPAA compliance. Organizations need a quick, concise reference in order to meet HIPAA requirements and maintain ongoing compliance. The Practical Guide to HIPAA Privacy and Security Compliance is a one-stop resource for real-world HIPAA |
From inside the book
Results 1-5 of 78
Page vii
... Chapter 1: Practical Checklist. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 2 Preparing for the HIPAA ...
... Chapter 1: Practical Checklist. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 2 Preparing for the HIPAA ...
Page viii
... . . . . . . . . . . . . . . . . . . . 31 Chapter 3: Practical Checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 4 The Relationship between Security and Privacy. . . . . . . . . . . . . . 35 Background ...
... . . . . . . . . . . . . . . . . . . . 31 Chapter 3: Practical Checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 4 The Relationship between Security and Privacy. . . . . . . . . . . . . . 35 Background ...
Page ix
... . . . . . . . . . 86 Chapter 5 Practical Checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 6 Performing a Privacy Rule Gap Analysis and RiskAnalysis. . . . . 87 Gap Analysis and RiskAnalysis ...
... . . . . . . . . . 86 Chapter 5 Practical Checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 6 Performing a Privacy Rule Gap Analysis and RiskAnalysis. . . . . 87 Gap Analysis and RiskAnalysis ...
Page x
... Chapter 7: Practical Checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 8 State Preemption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 What Is Contrary ...
... Chapter 7: Practical Checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 8 State Preemption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 What Is Contrary ...
Page xi
... Initiatives. . . . . . . . . . . . . 165 Chapter 11: Practical Checklist. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176 12 Performing a Security Rule RiskAnalysis . . . . . . . . . . . . . . . . . . 177 Background ...
... Initiatives. . . . . . . . . . . . . 165 Chapter 11: Practical Checklist. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176 12 Performing a Security Rule RiskAnalysis . . . . . . . . . . . . . . . . . . 177 Background ...
Other editions - View all
The Practical Guide to HIPAA Privacy and Security Compliance Rebecca Herold,Kevin Beaver Limited preview - 2003 |
The Practical Guide to HIPAA Privacy and Security Compliance Rebecca Herold,Kevin Beaver Limited preview - 2003 |
The Practical Guide to HIPAA Privacy and Security Compliance Rebecca Herold,Kevin Beaver No preview available - 2003 |
Common terms and phrases
accounting activities administrative agreement allow amendment analysis applicable appropriate audits authorization awareness benefits business associate changes Chapter communication Company XYZ comply considered contract controls cost covered entity create Department determine Develop disclose disclosure disclosure of PHI document effective efforts electronic employers ensure Establish example functions health plan healthcare healthcare provider HIPAA compliance HIPAA Privacy Rule Identify implementation indicated individual information security involved issues keep limited maintain marketing meet ment necessary notice obtain Officer ongoing operations organization patient perform person personnel physical policies and procedures practices privacy and security Privacy Rule protected health information reasonable receive records regulations request requirements responsibilities risk safeguards security policies Security Rule situations specific standards sure tion treatment