The Smart Dentist's Guide to HIPAA and Computer Network Support


Book Description

Whenever I talk to dentists about HIPAA, their eyes become glassed over and I could tell there are 1 million other places they'd rather be at that point. If you own a dental practice, you're probably paying for someone to maintain your computer network and you may have hired a consultant to deal with your HIPAA compliance. What if there was a way for you to have a trouble free compliant computer network at a fraction of the cost that it would typically cost for each to be done individually? John started San Diego HIT to bring enterprise level IT support with HIPAA compliance to dental practices. San Diego HIT uses processes, procedures and tools developed just for dental networks to stop the "dental tax". IT support that also is HIPAA complaint does not have to be more expensive.




Network Administrators Survival Guide


Book Description

The all-in-one practical guide to supporting Cisco networks using freeware tools.




Nursing Informatics and the Foundation of Knowledge


Book Description

Nursing Informatics and the Foundation of Knowledge covers the history of healthcare informatics, current issues, basic informatics concepts, and health information management applications. The text includes key terms, case studies, best practice examples, critical thinking exercises, and web resources.




Business Survival


Book Description

“Business Survival – a Guide to Business Continuity Planning and Disaster Recovery” is for experienced and inexperienced, technical, and non-technical personnel who are interested in the need for Business Continuity Planning within their organizations. These personnel include: Senior and Executive management, the decision-makers who make budgetary decisions Business Continuity Managers and their teams Chief Information Officers, who ensure the implementation of the Disaster Recovery elements of the Business Continuity Plan and play a large role in (and perhaps even manage or oversee) the Business Continuity Process The IT security program manager, who implements the security program IT managers and system owners of system software and/or hardware used to support IT functions. Information owners of data stored, processed, and transmitted by the IT systems Business Unit owners and managers who are responsible for the way in which their own unit fits into the overall Business Continuity Plan, but especially Facilities Managers, who are responsible for the way the buildings are evacuated and secured, providing floor plans and information to Emergency Services, etc. Human Resources Managers who are responsible for the “people” elements of the Business Continuity Plan Communications and PR Managers who are responsible for the communications policies that form part of the Business Continuity Plan Technical support personnel (e.g. network, system, application, and database administrators; computer specialists; data security analysts), who manage and administer security for the IT systems Information system auditors, who audit IT systems IT consultants, who support clients in developing, implementing and testing their Business Continuity Plans




Beyond the HIPAA Privacy Rule


Book Description

In the realm of health care, privacy protections are needed to preserve patients' dignity and prevent possible harms. Ten years ago, to address these concerns as well as set guidelines for ethical health research, Congress called for a set of federal standards now known as the HIPAA Privacy Rule. In its 2009 report, Beyond the HIPAA Privacy Rule: Enhancing Privacy, Improving Health Through Research, the Institute of Medicine's Committee on Health Research and the Privacy of Health Information concludes that the HIPAA Privacy Rule does not protect privacy as well as it should, and that it impedes important health research.




Bring Your Own Devices (BYOD) Survival Guide


Book Description

Where end-users once queued up to ask the IT department for permission to buy a new computer or a new version of software, they are now bypassing IT altogether and buying it on their own. From laptops and smartphones to iPads and virtually unlimited software apps, end-users have tasted their freedom and love it. IT will simply never be the same.Bri




The Medicare Recovery Audit Contractor Program


Book Description

Medicare fraud is big business, but while only a few profit from intentional malfeasance, the Centers for Medicare and Medicaid Services is now taking a closer look at everyone. The Medicare Recovery Audit Contractor Program, already infamously known as the RAC, swings into full operation in 2010 and every healthcare provider that receives payment







IT Security Risk Control Management


Book Description

Follow step-by-step guidance to craft a successful security program. You will identify with the paradoxes of information security and discover handy tools that hook security controls into business processes. Information security is more than configuring firewalls, removing viruses, hacking machines, or setting passwords. Creating and promoting a successful security program requires skills in organizational consulting, diplomacy, change management, risk analysis, and out-of-the-box thinking. What You Will Learn: Build a security program that will fit neatly into an organization and change dynamically to suit both the needs of the organization and survive constantly changing threats Prepare for and pass such common audits as PCI-DSS, SSAE-16, and ISO 27001 Calibrate the scope, and customize security controls to fit into an organization’s culture Implement the most challenging processes, pointing out common pitfalls and distractions Frame security and risk issues to be clear and actionable so that decision makers, technical personnel, and users will listen and value your advice Who This Book Is For: IT professionals moving into the security field; new security managers, directors, project heads, and would-be CISOs; and security specialists from other disciplines moving into information security (e.g., former military security professionals, law enforcement professionals, and physical security professionals)




The Practical Guide to HIPAA Privacy and Security Compliance


Book Description

HIPAA is very complex. So are the privacy and security initiatives that must occur to reach and maintain HIPAA compliance. Organizations need a quick, concise reference in order to meet HIPAA requirements and maintain ongoing compliance. The Practical Guide to HIPAA Privacy and Security Compliance is a one-stop resource for real-world HIPAA