語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Protecting patient information = a d...
~
Cerrato, Paul,
FindBook
Google Book
Amazon
博客來
Protecting patient information = a decision-maker's guide to risk, prevention, and damage control /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Protecting patient information/ Paul Cerrato ; Jason Andress, technical editor.
其他題名:
a decision-maker's guide to risk, prevention, and damage control /
作者:
Cerrato, Paul,
其他作者:
Andress, Jason,
出版者:
Amsterdam :Syngress is an imprint of Elsevier, : 2016.,
面頁冊數:
1 online resource.
附註:
Includes index.
內容註:
Cover ; Title Page; Copyright Page; Disclaimer; Dedication; Contents; About the Author; Preface; Chapter 1 -- Dissecting a Book Title; Chapter 2 -- How Well Protected is Your Protected Health Information? Perception Versus Reality; The Cost of Insecurity is Steep; A Closer Look at Data Breach Fines; Do not ignore individual states in breach investigations; Fines are Only Part of the Problem; Factoring in the Meaningful Use Program; Calculating the Cost of Security; References; Chapter 3 -- Regulations Governing Protected Health Information; Defining the Crown Jewels.
內容註:
HIPAA Privacy Versus Security Rules: Related But DifferentTechnology is only part of the equation; Enforcing HIPAA Regulations; A closer look at the HIPAA Security Rule; The HIPAA Breach Notification Rule; The Role of the Federal Trade Commission; Do not forget State Laws; References; Chapter 4 -- Risk Analysis; Learning the jargon; Vulnerability; Threat Versus Risk; Compliance Versus Management; The ONC Approach to Risk Analysis and Security Management; Step 1; Step 2; Step 3; Step 4; Finding the Right Analysis Tools; Tapping the HHS Resources.
內容註:
Beware the "Required" Versus "Addressable" ConfusionMoving Beyond a Checklist of Security Questions; References; Chapter 5 -- Reducing the Risk of a Data Breach; Seeing the larger picture; The best mindset: guilty until proven innocent; Passwords, Policies, and Procedures; Establishing Effective Governance; Technological Solutions; Encryption; Firewalls; Antimalware/Antiviral Software; Access Control; Intrusion Detection and Intrusion Prevention Systems; Faxing Solutions; Auditing Your Computer Systems; Making Email More Secure; Establishing Physical Safeguards; Protecting Big Data.
內容註:
Testing Your Network SecurityCybersecurity Insurance; References; Chapter 6 -- Mobile Device Security; Thinking strategically; Covering the Basics; BYOD: Bring Your Own Disaster?; Mobile Device Management Software; The Virtues of Virtual Private Networks; Appreciating the Difference Between Http and Https; References; Chapter 7 -- Medical Device Security; How real is the threat?; Taking a closer look at the "pathology" behind medjacking; What is the FDA Doing?; Dealing with Existing Medical Device Vulnerabilities; How are medical device companies coping?; Firming up the Firmware.
內容註:
Are medical device manufacturers HIPAA accountable?Weighing Your Security Options; References; Chapter 8 -- Educating Medical and Administrative Staff; Culture before education; Seeing the Bigger Picture; Understanding the Psychology of Change; Managing the Training Process; What Should the Training Consist of?; References; Chapter 9 -- HIPAA, HITECH, and the Business Associate; Evaluating the Threat; Are you a Business Associate?; Formal Agreements are a Must; More Exceptions to the Rule; What Should a Business Associate Agreement Look Like?; References.
內容註:
Chapter 10 -- Preparing for and Coping With a Data Breach.
標題:
Medical records - Access control. -
標題:
Great Britain. -
電子資源:
https://www.sciencedirect.com/science/book/9780128043929
ISBN:
9780128044117 (electronic bk.)
Protecting patient information = a decision-maker's guide to risk, prevention, and damage control /
Cerrato, Paul,
Protecting patient information
a decision-maker's guide to risk, prevention, and damage control /[electronic resource] :Paul Cerrato ; Jason Andress, technical editor. - Amsterdam :Syngress is an imprint of Elsevier,2016. - 1 online resource.
Includes index.
Includes bibliographical references and index.
Cover ; Title Page; Copyright Page; Disclaimer; Dedication; Contents; About the Author; Preface; Chapter 1 -- Dissecting a Book Title; Chapter 2 -- How Well Protected is Your Protected Health Information? Perception Versus Reality; The Cost of Insecurity is Steep; A Closer Look at Data Breach Fines; Do not ignore individual states in breach investigations; Fines are Only Part of the Problem; Factoring in the Meaningful Use Program; Calculating the Cost of Security; References; Chapter 3 -- Regulations Governing Protected Health Information; Defining the Crown Jewels.
ISBN: 9780128044117 (electronic bk.)
LCCN: 2016930217Subjects--Topical Terms:
753804
Medical records
--Access control.Subjects--Geographical Terms:
700567
Great Britain.
Index Terms--Genre/Form:
1556715
Electronic book.
LC Class. No.: RA976
Dewey Class. No.: 651.504261
National Library of Medicine Call No.: 2016 F-929
Protecting patient information = a decision-maker's guide to risk, prevention, and damage control /
LDR
:04184cmm a2200373 a 4500
001
2246068
006
m o d
007
cr cnu---unuuu
008
211223s2016 ne a gob 001 0 eng d
010
$a
2016930217
020
$a
9780128044117 (electronic bk.)
020
$a
012804411X (electronic bk.)
020
$a
9780128043929
020
$a
012804392X
035
$a
(OCoLC)946997515
035
$a
ocn946997515
040
$a
N$T
$b
eng
$c
N$T
$d
IDEBK
$d
YDXCP
$d
N$T
$d
OCLCF
$d
EBLCP
$d
OPELS
$d
UPM
$d
IDB
$d
OTZ
$d
MERUC
$d
OCLCQ
$d
U3W
$d
D6H
$d
WRM
$d
AU@
$d
GGVRL
$d
EZC
$d
OCLCQ
$d
WYU
$d
OCLCA
$d
MERER
$d
OCLCO
$d
OCLCA
$d
OCLCQ
$d
OCLCA
$d
UKMGB
$d
OCLCQ
$d
SDF
$d
LVT
$d
VT2
041
0
$a
eng
043
$a
e-uk---
050
4
$a
RA976
060
4
$a
2016 F-929
060
4
$a
WX 175
082
0 4
$a
651.504261
$2
23
100
1
$a
Cerrato, Paul,
$e
author.
$3
3398086
245
1 0
$a
Protecting patient information
$h
[electronic resource] :
$b
a decision-maker's guide to risk, prevention, and damage control /
$c
Paul Cerrato ; Jason Andress, technical editor.
260
$a
Amsterdam :
$b
Syngress is an imprint of Elsevier,
$c
2016.
300
$a
1 online resource.
500
$a
Includes index.
504
$a
Includes bibliographical references and index.
505
0
$a
Cover ; Title Page; Copyright Page; Disclaimer; Dedication; Contents; About the Author; Preface; Chapter 1 -- Dissecting a Book Title; Chapter 2 -- How Well Protected is Your Protected Health Information? Perception Versus Reality; The Cost of Insecurity is Steep; A Closer Look at Data Breach Fines; Do not ignore individual states in breach investigations; Fines are Only Part of the Problem; Factoring in the Meaningful Use Program; Calculating the Cost of Security; References; Chapter 3 -- Regulations Governing Protected Health Information; Defining the Crown Jewels.
505
8
$a
HIPAA Privacy Versus Security Rules: Related But DifferentTechnology is only part of the equation; Enforcing HIPAA Regulations; A closer look at the HIPAA Security Rule; The HIPAA Breach Notification Rule; The Role of the Federal Trade Commission; Do not forget State Laws; References; Chapter 4 -- Risk Analysis; Learning the jargon; Vulnerability; Threat Versus Risk; Compliance Versus Management; The ONC Approach to Risk Analysis and Security Management; Step 1; Step 2; Step 3; Step 4; Finding the Right Analysis Tools; Tapping the HHS Resources.
505
8
$a
Beware the "Required" Versus "Addressable" ConfusionMoving Beyond a Checklist of Security Questions; References; Chapter 5 -- Reducing the Risk of a Data Breach; Seeing the larger picture; The best mindset: guilty until proven innocent; Passwords, Policies, and Procedures; Establishing Effective Governance; Technological Solutions; Encryption; Firewalls; Antimalware/Antiviral Software; Access Control; Intrusion Detection and Intrusion Prevention Systems; Faxing Solutions; Auditing Your Computer Systems; Making Email More Secure; Establishing Physical Safeguards; Protecting Big Data.
505
8
$a
Testing Your Network SecurityCybersecurity Insurance; References; Chapter 6 -- Mobile Device Security; Thinking strategically; Covering the Basics; BYOD: Bring Your Own Disaster?; Mobile Device Management Software; The Virtues of Virtual Private Networks; Appreciating the Difference Between Http and Https; References; Chapter 7 -- Medical Device Security; How real is the threat?; Taking a closer look at the "pathology" behind medjacking; What is the FDA Doing?; Dealing with Existing Medical Device Vulnerabilities; How are medical device companies coping?; Firming up the Firmware.
505
8
$a
Are medical device manufacturers HIPAA accountable?Weighing Your Security Options; References; Chapter 8 -- Educating Medical and Administrative Staff; Culture before education; Seeing the Bigger Picture; Understanding the Psychology of Change; Managing the Training Process; What Should the Training Consist of?; References; Chapter 9 -- HIPAA, HITECH, and the Business Associate; Evaluating the Threat; Are you a Business Associate?; Formal Agreements are a Must; More Exceptions to the Rule; What Should a Business Associate Agreement Look Like?; References.
505
8
$a
Chapter 10 -- Preparing for and Coping With a Data Breach.
650
0
$a
Medical records
$x
Access control.
$3
753804
650
0
$a
Data protection
$z
Great Britain.
$3
3509032
650
0
$a
Confidential communications
$x
Physicians.
$3
753803
650
1 2
$a
Electronic Health Records.
$3
1361621
650
1 2
$a
Computer Security.
$3
761904
650
2 2
$a
Confidentiality.
$3
736289
650
2 2
$a
Decision Making.
$3
617264
650
2 2
$a
Risk.
$3
561386
650
2 2
$a
Health Information Management
$x
standards.
$3
3509033
650
7
$a
BUSINESS & ECONOMICS
$x
General.
$2
bisacsh
$3
1375430
650
7
$a
Data protection.
$3
590548
651
7
$a
Great Britain.
$3
700567
655
0
$a
Electronic book.
$2
local
$3
1556715
655
4
$a
Electronic books.
$2
lcsh
$3
542853
700
1
$a
Andress, Jason,
$e
editor.
$3
3509031
856
4 0
$u
https://www.sciencedirect.com/science/book/9780128043929
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9406563
電子資源
11.線上閱覽_V
電子書
EB RA976
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入