LEADER 00000cam a2200961Ii 4500 001 882548921 003 OCoLC 005 20240129213017.0 006 m o d 007 cr ||||||||||| 008 140703t20142014nyua ob 001 0 eng d 019 889305473|a892538501|a892800027|a961332113|a961486714 |a966374256|a1005761149|a1026439390|a1048115640 |a1058507690|a1066413204|a1066573991|a1071822595 |a1086469774|a1103272969|a1110813918|a1112526667 |a1112811250|a1129350902|a1136695454|a1152999787 |a1161314743|a1163715027|a1166562900|a1192330615 |a1204059084|a1206409313|a1227398844|a1237484313 |a1240508120|a1244637149|a1300471896|a1303343742 020 9781430266778|q(electronic bk.) 020 1430266775|q(electronic bk.) 020 |q(print) 020 |q(print) 024 7 10.1007/978-1-4302-6677-8|2doi 024 8 10.1007/978-1-4302-6 029 1 AU@|b000055991469 029 1 AU@|b000061498222 029 1 CHNEW|b000888654 029 1 CHVBK|b374497745 029 1 DEBBG|bBV043970076 029 1 DEBSZ|b431766126 029 1 DEBSZ|b485806096 029 1 GBVCP|b882759795 029 1 NZ1|b15624209 029 1 AU@|b000067094673 035 (OCoLC)882548921|z(OCoLC)889305473|z(OCoLC)892538501 |z(OCoLC)892800027|z(OCoLC)961332113|z(OCoLC)961486714 |z(OCoLC)966374256|z(OCoLC)1005761149|z(OCoLC)1026439390 |z(OCoLC)1048115640|z(OCoLC)1058507690|z(OCoLC)1066413204 |z(OCoLC)1066573991|z(OCoLC)1071822595|z(OCoLC)1086469774 |z(OCoLC)1103272969|z(OCoLC)1110813918|z(OCoLC)1112526667 |z(OCoLC)1112811250|z(OCoLC)1129350902|z(OCoLC)1136695454 |z(OCoLC)1152999787|z(OCoLC)1161314743|z(OCoLC)1163715027 |z(OCoLC)1166562900|z(OCoLC)1192330615|z(OCoLC)1204059084 |z(OCoLC)1206409313|z(OCoLC)1227398844|z(OCoLC)1237484313 |z(OCoLC)1240508120|z(OCoLC)1244637149|z(OCoLC)1300471896 |z(OCoLC)1303343742 037 |bSpringer 040 GW5XE|beng|erda|epn|cGW5XE|dCOO|dYDXCP|dB24X7|dSTF|dIDEBK |dBTCTA|dE7B|dUPM|dOCLCF|dEBLCP|dDEBSZ|dMMU|dOCL|dUMI|dTOH |dDEBBG|dOCLCQ|dOCLCO|dMERER|dOCLCQ|dZ5A|dLIV|dMERUC |dOCLCQ|dESU|dOCLCQ|dVT2|dIOG|dOCLCO|dN$T|dOCLCA|dREB |dOCLCO|dVLB|dOCLCO|dCEF|dDEHBZ|dOCLCQ|dU3W|dOCLCQ|dWYU |dOCLCO|dOCLCA|dYOU|dOCLCO|dOCLCA|dOCLCQ|dUAB|dLEAUB|dAU@ |dUKAHL|dOCLCQ|dOCLCO|dDCT|dERF|dOCLCQ|dOCLCA|dLQU|dADU |dBRF|dSFB|dDST|dOCLCO|dOCL|dOCLCQ|dOCLCO|dOCLCL 049 INap 082 04 651.5/04261 082 04 651.5/04261|223 099 eBook O'Reilly for Public Libraries 100 1 Robichau, Bernard Peter,|eauthor. 245 10 Healthcare information privacy and security :|bregulatory compliance and data security in the age of electronic health records /|cBernard Peter Robichau.|h[O'Reilly electronic resource] 246 14 Healthcare information privacy + security 264 1 [New York, N.Y.] :|bApress,|c[2014] 264 2 New York, NY :|bDistributed to the Book trade worldwide by Springer Science + Business Media New York 264 4 |c©2014 300 1 online resource (xi, 167 pages) :|billustrations (some color) 336 text|btxt|2rdacontent 336 still image|bsti|2rdacontent 337 computer|bc|2rdamedia 338 online resource|bcr|2rdacarrier 347 text file|bPDF|2rda 504 Includes bibliographical references and index. 505 0 Introduction -- Part I: The evolution of a monster. Waking the sleeping giant -- It's not just HIPAA -- Part II: Divide and conquer: defining ownership to develop solutions. Assembling the team -- Sifting through the wreckage -- Review your policies and develop a plan -- Part III: Sustainable solutions. Identity and access management -- Application design -- Access validation process -- Physical and environmental safeguards -- Systemwide and client-based security -- Safeguarding patient data from prying eyes -- Part IV: From project to program: transitioning to a sustainable support model. People, the most crucial element -- Business associates -- Security project versus operational support -- Putting the plan in place -- Part V: Appendices. Appendix A: sample business associate agreement -- Appendix B: sample rules of behavior for privileged user accounts -- Appendix C: breach notification process. 520 This book outlines the new regulatory regime, and provides IT professionals with the processes and protocols, standards, and governance tools they need to maintain a secure and legal environment for data and records. Topics covered include : identity and access management systems; proper application design; physical and environmental safeguards; systemwide and client-based security configurations; safeguards for patient data; training and auditing procedures; governance and policy administration; the basics of HITECH, HIPAA, and other federal laws driving change in healthcare IT; how to identify the core issues of privacy and security in a healthcare environment; the steps required to develop and execute a security project plan; the technologies and tools available to aid in the process of deploying a secure EHR system; the core regulatory issues and practical matters of security in a healthcare environment; the frameworks and methodology that will assist in tackling the issues of privacy and security; and the technologies impacted by matters of privacy and security along with proposals for managing them effectively. This book is for healthcare professionals who work in information technology, information security, health information management, as well as in the more specialized areas of privacy, compliance, and informatics. The book is also useful for consultants working in the field of information security, EMR vendors, and technology professionals seeking to make an entry into the world of healthcare IT. 546 English. 588 0 Online resource; title from electronic title page (ebrary, viewed on August 31, 2015). 590 O'Reilly|bO'Reilly Online Learning: Academic/Public Library Edition 650 0 Medical records|xAccess control. 650 0 Medical records|xData processing. 650 0 Data encryption (Computer science) 650 0 Data protection. 650 2 Medical Records|xstandards 650 6 Protection de l'information (Informatique) 650 6 Chiffrement (Informatique) 650 6 Dossiers médicaux|xAccès|xContrôle. 650 6 Dossiers médicaux|xInformatique. 650 7 BUSINESS & ECONOMICS|xGeneral.|2bisacsh 650 7 Data protection|2fast 650 7 Data encryption (Computer science)|2fast 650 7 Medical records|xAccess control|2fast 650 7 Medical records|xData processing|2fast 773 0 |tSpringer eBooks 776 08 |iPrint version:|aRobichau, Bernard Peter.|tHealthcare information privacy and security.|dCalifornia : Apress, 2014|z1430266767|w(DLC) 2013454344|w(OCoLC)884305173 856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https:// learning.oreilly.com/library/view/~/9781430266778/?ar |zAvailable on O'Reilly for Public Libraries 938 Askews and Holts Library Services|bASKH|nAH28324774 938 Books 24x7|bB247|nbkb00066191 938 Baker and Taylor|bBTCP|nBK0015933697 938 EBL - Ebook Library|bEBLB|nEBL1781940 938 ebrary|bEBRY|nebr10887951 938 EBSCOhost|bEBSC|n1174110 938 ProQuest MyiLibrary Digital eBook Collection|bIDEB |ncis29828096 938 YBP Library Services|bYANK|n11954410 994 92|bJFN