Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information

Buy

Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The requirement is a focus area for the Department of Health and Human Services (HHS) Office for Civil Rights (OCR) during breach investigations and compliance audits. This book lays out a plan for healthcare organizations of all types to successfully comply with these requirements and use the output to build upon the cybersecurity program.  

With the proliferation of cybersecurity breaches, the number of healthcare providers, payers, and business associates investigated by the OCR has risen significantly. It is not unusual for additional penalties to be levied when victims of breaches cannot demonstrate that an enterprise-wide risk assessment exists, comprehensive enough to document all of the risks to ePHI.

Why is it that so many covered entities and business associates fail to comply with this fundamental safeguard? Building a HIPAA Compliant Cybersecurity Program cuts through the confusion and ambiguity of regulatory requirements and provides detailed guidance to help readers:

  • Understand and document all known instances where patient data exist
  • Know what regulators want and expect from the risk analysis process
  • Assess and analyze the level of severity that each risk poses to ePHI
  • Focus on the beneficial outcomes of the process: understanding real risks, and optimizing deployment of resources and alignment with business objectives

What You’ll Learn

  • Use NIST 800-30 to execute a risk analysis and assessment, which meets the expectations of regulators such as the Office for Civil Rights (OCR)
  • Understand why this is not just a compliance exercise, but a way to take back control of protecting ePHI
  • Leverage the risk analysis process to improve your cybersecurity program
  • Know the value of integrating technical assessments to further define risk management activities
  • Employ an iterative process that continuously assesses the environment to identify improvement opportunities

Who This Book Is For

Cybersecurity, privacy, and compliance professionals working for organizations responsible for creating, maintaining, storing, and protecting patient information

(HTML tags aren't allowed.)

Structure and Improvisation in Creative Teaching
Structure and Improvisation in Creative Teaching

With an increasing emphasis on creativity and innovation in the twenty-first century, teachers need to be creative professionals just as students must learn to be creative. And yet, schools are institutions with many important structures and guidelines that teachers must follow. Effective creative teaching strikes a delicate balance between...

Recent Findings in Intelligent Computing Techniques: Proceedings of the 5th ICACNI 2017, Volume 1 (Advances in Intelligent Systems and Computing, 707)
Recent Findings in Intelligent Computing Techniques: Proceedings of the 5th ICACNI 2017, Volume 1 (Advances in Intelligent Systems and Computing, 707)

This three volume book contains the Proceedings of 5th International Conference on Advanced Computing, Networking and Informatics (ICACNI 2017). The book focuses on the recent advancement of the broad areas of advanced computing, networking and informatics. It also includes novel approaches devised by researchers from across the...

Executive's Guide to Cloud Computing
Executive's Guide to Cloud Computing

Your organization can save and thrive in the cloud with this first non-technical guide to cloud computing for business leaders

In less than a decade Google, Amazon, and Salesforce.com went from unknown ideas to powerhouse fixtures in the economic landscape; in even less time offerings such as Linkedin, Youtube, Facebook,...


Encyclopedia Of Human Computer Interaction
Encyclopedia Of Human Computer Interaction
Human computer interaction (HCI) evolved as a recognized discipline that attracts innovation and creativity. For the last 25 years, it inspired new solutions, especially for the benefit of the user as a human being, making the user the focal point that technology should serve rather than the other way around. The advent of the Internet, combined...
Windows 7 100 Most Asked Questions - Tips, Tricks, Hints and Practical Guide
Windows 7 100 Most Asked Questions - Tips, Tricks, Hints and Practical Guide

Is Windows 7 the answer to all the questions that Windows Vista poses? Windows 7 is fast, stable and far more reliable than you'd expect.

Windows 7 is full of great new features and enhancements and was built around users feedback, so you'll see a lot of things you've asked for.

Microsoft has made its...

CCNA Security Official Exam Certification Guide  (Exam 640-553)
CCNA Security Official Exam Certification Guide (Exam 640-553)

CCNA Security Official Exam Certification Guide is a best of breed Cisco® exam study guide that focuses specifically on the objectives for the CCNA® Security IINS exam. Senior security instructors Michael Watkins and Kevin Wallace share preparation hints and test-taking tips, helping you identify areas of...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy