Healthcare Information Privacy and Security Regulatory Compliance and Data Security in the Age of Electronic Health Records
Healthcare IT is the growth industry right now, and the need for guidance in regard to privacy and security is huge. Why? With new federal incentives and penalties tied to the HITECH Act, HIPAA, and the implementation of Electronic Health Record (EHR) systems, medical practices and healthcare system...
Autor principal: | |
---|---|
Otros Autores: | |
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Berkeley, CA :
Apress
2014.
|
Edición: | 1st ed. 2014. |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009629640306719 |
Tabla de Contenidos:
- Contents; Introduction; Chapter 1: Introduction; The Problem; Professional Ethics; Vendor Guidance; Many Hats; The Audience; The Goal; Part I:The Evolution of a Monster; Chapter 2: Waking the Sleeping Giant; The Problem with Paper; The Downside of Connectivity; Elsewhere in America ...; The End Result; The Problem; The Healthcare Industry Analog; A Movement Afoot; Catching MUMPS; The Intervening Years; A Voice from Above; The Financial Crisis and the EMR Rush; Think about the Possibilities; Pandora's Box; The Stage Is Set; Further Reading; Chapter 3: It's Not Just HIPAA; Minimum Necessary
- More AccountabilitySecurity Rules; Administrative Safeguards; Physical Safeguards; Technical Safeguards; HITECH Security; The Omnibus Rule of 2013; A Method to the Madness; Further Reading; Part II:Divide and Conquer: Defining Ownership to Develop Solutions; Chapter 4: Assembling the Team; Where to Start; From the Top Down; The Stakeholders; Information Technology; Health Information Management; Privacy, Compliance, and Legal; Clinical; Revenue Cycle; The Build/Support Team; The EMR Security Team; The Security Workgroup; The Security Stakeholders; Onward
- Chapter 5: Sifting through the WreckageWhat Are We Waiting For?; The Dreaded "A" Word; What's Your Pitch?; Who Is Who?; Breaking it Down; Brass Tacks; Tools of the Trade; We Get By with a Little Help from Our Friends . . .; Diving In; Four Steps; The Preparation Phase and Inventory; Step 1: The Screening Questions; Step 2a: People and Processes; Step 2b: Technology; Step 3: Findings and Remediations; Putting It All Together; A Final Note on the Meaningful Use Risk Assessment; Armed and Ready?; Further Reading; Chapter 6: Review Your Policies and Develop a Plan; Out of the Archives
- No Man Is an IslandLaying Out the Plan; Beginning the Work; Part III:Sustainable Solutions; Chapter 7: Identity and Access Management; Know Yourself; Identity Mapping Basics; Process, Process, Process; Periodic Access and Inactivity Review; Role-Based Access Control; Enterprise Identity Management Systems; The HL7 Interface; A Note about Credentials; Know Your Enemies; Chapter 8: Application Design; Building Blocks; What's in a Name?; Brass Tacks; The High Cost of a Bad Hire; The Core Skills; Arguments, Arguments, Arguments; The Don't-Touch It-You'll-Break-It Analyst
- The More-Access-Is-Better AnalystThe Middle Way; Minimum Necessary; A Dose of Liberality; A Note about Sensitive Information; A Psychiatric Case in Point; A Holistic Approach; What Does This Look like?; Know Your EMR; Clicking Through; Build, Review, Approve (Repeat); Don't Let Them Drag You Down; Further Reading; Chapter 9: Access Validation Process; Validation Groupings; Organize a Schedule; The Validation Session; The Change Log; Update the Schedule; Approval of Access; Takeaways; Organization of Validation Materials; New Job Codes / Roles; Audit; Periodic Access Review
- Troubleshooting and Support