Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information

Buy

Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The requirement is a focus area for the Department of Health and Human Services (HHS) Office for Civil Rights (OCR) during breach investigations and compliance audits. This book lays out a plan for healthcare organizations of all types to successfully comply with these requirements and use the output to build upon the cybersecurity program.  

With the proliferation of cybersecurity breaches, the number of healthcare providers, payers, and business associates investigated by the OCR has risen significantly. It is not unusual for additional penalties to be levied when victims of breaches cannot demonstrate that an enterprise-wide risk assessment exists, comprehensive enough to document all of the risks to ePHI.

Why is it that so many covered entities and business associates fail to comply with this fundamental safeguard? Building a HIPAA Compliant Cybersecurity Program cuts through the confusion and ambiguity of regulatory requirements and provides detailed guidance to help readers:

  • Understand and document all known instances where patient data exist
  • Know what regulators want and expect from the risk analysis process
  • Assess and analyze the level of severity that each risk poses to ePHI
  • Focus on the beneficial outcomes of the process: understanding real risks, and optimizing deployment of resources and alignment with business objectives

What You’ll Learn

  • Use NIST 800-30 to execute a risk analysis and assessment, which meets the expectations of regulators such as the Office for Civil Rights (OCR)
  • Understand why this is not just a compliance exercise, but a way to take back control of protecting ePHI
  • Leverage the risk analysis process to improve your cybersecurity program
  • Know the value of integrating technical assessments to further define risk management activities
  • Employ an iterative process that continuously assesses the environment to identify improvement opportunities

Who This Book Is For

Cybersecurity, privacy, and compliance professionals working for organizations responsible for creating, maintaining, storing, and protecting patient information

(HTML tags aren't allowed.)

Statistical Graphics in SAS: An Introduction to the Graph Template Language and the Statistical Graphics Procedures
Statistical Graphics in SAS: An Introduction to the Graph Template Language and the Statistical Graphics Procedures

Effective graphics are indispensable for modern statistical analysis. They reveal patterns, differences, and uncertainty that are not readily apparent in tabular output. Graphics provoke questions that stimulate deeper investigation, and they add visual clarity and rich content to reports and presentations.

The Graph Template...

Adsorption Engineering
Adsorption Engineering
...a well-written addition to the adsorption literature...should be useful for the expert or students who have some prior knowledge of adsorption. -- Reactive Polymers

Hardbound. The design of adsorption systems has essentially been based on accumulated experience gained over a long period. However, recent
...
Anatomy of a Robot (TAB Robotics)
Anatomy of a Robot (TAB Robotics)
This work looks under the hood of all robotic projects, stimulating teachers, students, and hobbyists to learn more about the gamut of areas associated with control systems and robotics. It offers a unique presentation in providing both theory and philosophy in a technical yet entertaining way.

UNDER THE HOOD OF A
...

Leadership for the Common Good: Tackling Public Problems in a Shared-Power World
Leadership for the Common Good: Tackling Public Problems in a Shared-Power World
Intuition and experience teach us that no one is really 'in charge' of anything complex or important. Barbara Crosby and John Bryson have developed this idea into a vividly positive image of the leader's role. 'Shared-power,' as they describe, dissect, and show how to work with it, transforms the very definition of leadership for the twenty-first...
C# 2005 For Dummies (Computer/Tech)
C# 2005 For Dummies (Computer/Tech)
Programming can be fun using the power of C#

See how you can use C# to write Windows applications and much more!

Interested in the exciting possibilities of programming with C#? Well, look sharp! Even if you've never programmed before, you'll see how C# allows you to write code using the Visual Studio® 2005 interface. From...

7 Secrets to Beauty, Health, and Longevity
7 Secrets to Beauty, Health, and Longevity

He has shown us how to smooth our wrinkles, and helped us slim down without feeling deprived. Now #1 New York Times bestselling author Dr. Nicholas Perricone gives us an anti-aging program that unveils the miracle of cellular rejuvenation. These seven powerful strategies are not only easy to follow but present a plan for total health designed...

©2020 LearnIT (support@pdfchm.net) - Privacy Policy