HIPAA Security Made Simple


Book Description

HIPAA Security Made Simple: Practical Compliance Advice for Covered Entities and Business Associates, Second Edition Kate Borten, CISSP, CISM Synopsis Written by highly respected author Kate Borten, CISSP, CISM, this updated edition explains how the Omnibus Rule affects organizations that are subject to HIPAA. It will help facilities and business associates understand how they and their information security programs can remain in compliance with new and continuing regulatory requirements. This second edition emphasizes that security is not a one-time project and reminds readers that they should already be performing risk assessments to comply with the HIPAA Security Rule. A new Introduction explains the significance of the HITECH Act and the Omnibus Rule to covered entities and their business associates (BA). HITECH made BAs directly liable for Security Rule compliance, and the Omnibus Rule went further, revising the definition to include all downstream subcontractors with access to PHI. This closed a major loophole in privacy protection, significantly expanding the number of organizations deemed BAs and directly subject to HIPAA compliance and enforcement. This book explains how HIPAA and the Omnibus Rule do the following: Clarify the definition of BA, which now includes all downstream subcontractors with access to PHI Clarify that covered entities and BAs must have ongoing programs to protect electronic PHI, including regular updates to security documentation Revise and modernize the definition of electronic media to align it with the terminology used by the National Institute of Standards and Technology Ensure that access termination procedures apply to all workforce members, not only to employees Encourage encryption but not require it across the board Table of Contents: Introduction HITECH Act and Omnibus Rule Impact on Security Chapter One: HIPAA Security Introduction and Overview What is HIPAA? How Security Fits In How to Use This Book Layered Approach Some Pitfalls to Avoid Documentation Tips Chapter Two: HIPAA Security Rule: General Rules General Requirements Flexibility of Approach Standards Implementation Specifications Maintenance Chapter Three: HIPAA Security Rule: Administrative Safeguards Security Management Process Risk Analysis Traditional Risk Assessment Methodology Risk Management Sanction Policy Information System Activity Review Assigned Security Responsibility Workforce Security Authorization and/or Supervision Workforce Clearance Procedure Termination Procedures Information Access Management Isolating Healthcare Clearinghouse Function Access Authorization Access Establishment and Modification Security Awareness and Training Security Reminders Protection From Malicious Software Login Monitoring Password Management Security Incident Procedures Response and Reporting Contingency Plan Data Backup Plan Disaster Recovery Plan Emergency Mode Operation Plan Testing and Revision Procedures Applications and Data Criticality Analysis Evaluation Business Associate Contracts and Other Arrangements Written Contracts or Other Arrangements Chapter Four: HIPAA Security Rule: Physical Safeguards Facility Access Controls Contingency Operations Facility Security Plan Access Control and Validation Procedures Maintenance Records Workstation Use Workstation Security Device and Media Controls Disposal Media Reuse Accountability Data Backup and Storage Chapter Five: HIPAA Security Rule: Technical Safeguards Access Control Unique User Identification Emergency Access Procedures Automatic Logoff Encryption and Decryption Audit Controls Integrity Mechanism to Authenticate Electronic Protected Health Information Transmission Security Integrity Controls Encryption Chapter Six: HIPAA Security Rule: Additional Organizational Requirements Business Associate Contracts or Other Arrangements Business Associate Contracts With Subcontractors Requirements for Group Health Plans Policies and Procedures Documentation Time Limit Availability Updates Chapter Seven: HIPAA and the Security of Nonelectronic PHI Oral Disclosure of PHI Faxed Disclosure of PHI Protecting Other Paper PHI A Clean Desk Policy Disposing of Paper and Other Nonelectronic Media Safely Administrative Controls Appendix HIPAA Security Rule Appendix A Glossary of Common Security Terms Security Resources




HIPAA Security Made Simple


Book Description

Written by Kate Borten, CISSP, the former chief information security officer at one of America's leading health care networks, HIPAA Security Made Simple: Practical Advice for Compliance takes the mystery out of the final security rule with practical, money-saving advice on how to comply with each of the rule's 18 administrative, physical, and technical standards, as well as with each of the 36 underlying implementation specifications. HIPAA Security Made Simple points out the common pitfalls and mistakes that health care organizations make in overreacting to the security rule. This resource will save you the frustration and wasted money and time of trying to comply with some of the many misinterpretations of the HIPAA security rule that are widely repeated by other so-called security experts. All information security programs should protect the confidentiality, integrity, and availability of data. HIPAA Security Made Simple will show you how the HIPAA security rule addresses these principles. Regardless of your level of information security experience, HIPAA Security Made Simple offers do's and don'ts for you to follow as you build or refine your information security program. More specifically, this resource provides: A plain-English guide to the final HIPAA security rule Useful tips on HIPAA security rule compliance Background on the HIPAA security rule's intent Common health care information security pitfalls Cost-effective HIPAA security compliance guidance Valuable HIPAA security compliance assistance tools: Policy templates and forms which are included on the customizable CD-ROM Clear guidance about how security and privacy go hand-in-hand under HIPAA This Resource is a "Must-Have" Tool for: Information Security Officers Compliance Officers Privacy Officers Risk Managers Chief Information Officers Information Technology Managers HIPAA Security Made Simple: Practical Advice for Compliance will help you build a reaso




Hipaa Security Made Simple For Physician Practices


Book Description

Focused advice to help your physician practice comply with the HIPAA security rule We understand your practice has limited resources to put toward HIPAA security rule compliance. HIPAA Security Made Simple for Physician Practices clearly explains the difference between what you should have already accomplished to comply with the HIPAA privacy rule, and what you need to do now to prepare for the HIPAA security rule, officially enforceable April 21, 2005. This book and companion CD-ROM give you the inside scoop on how the HIPAA security rule specifically affects physician practices. Your compliance efforts need to be customized based on your risk, and you are unlikely to have the same level of risk and complexity as hospitals and other large organizations.




HIPAA Made Simple


Book Description




Guide to HIPAA Security and the Law


Book Description

This publication discusses the HIPAA Security Rule's role in the broader context of HIPAA and its other regulations, and provides useful guidance for implementing HIPAA security. At the heart of this publication is a detailed section-by-section analysis of each security topic covered in the Security Rule. This publication also covers the risks of non-compliance by describing the applicable enforcement mechanisms that apply and the prospects for litigation relating to HIPAA security.




Information Security Policies Made Easy


Book Description

Information Security Policies Made Easy is the definitive resource tool for information security policies. Version 9 now includes an updated collection of 1250 + security policies and templates covering virtually every aspect of corporate security.




Beyond the HIPAA Privacy Rule


Book Description

In the realm of health care, privacy protections are needed to preserve patients' dignity and prevent possible harms. Ten years ago, to address these concerns as well as set guidelines for ethical health research, Congress called for a set of federal standards now known as the HIPAA Privacy Rule. In its 2009 report, Beyond the HIPAA Privacy Rule: Enhancing Privacy, Improving Health Through Research, the Institute of Medicine's Committee on Health Research and the Privacy of Health Information concludes that the HIPAA Privacy Rule does not protect privacy as well as it should, and that it impedes important health research.




HIPPA Security Made Simple


Book Description




HIPAA Made Simple


Book Description

The goal of this book is to provide you with a practical guide to implementing the administrative simplifications regulations under the Health Insurance Portability and Accountability Act (HIPAA) of 1996. It's geared toward helping to ease your workload in these demanding days of preparing for HIPAA compliance on top of all of your other responsibilities.




Easy Guide to HIPAA Risk Assessments


Book Description

Risk assessments are required under the Health Insurance and Accountability Act of 1996, better known as HIPAA. HIPAA is the federal statute that requires healthcare providers to safeguard patient identities, medical records and protected health information (“PHI”). It further requires organizations that handle PHI to regularly review the administrative, physical and technical safeguards they have in place. Basically, HIPAA took established confidentiality healthcare practices of physicians and healthcare providers to protect patients’ information and made it law. Risk assessments are a key requirement of complying with HIPAA. Covered entities must complete a HIPAA risk assessment to determine their risks, and protect their PHI from breaches and unauthorized access to protected information. There are many components of risk assessments, which can often seem burdensome on healthcare providers. Let Lori-Ann Rickard and Lauren Sullivan guide you and your company as you tackle the risk assessments required by HIPAA.