2020 SecurityMetrics Guide to HIPAA Compliance What Healthcare Covered Entities and Business Associates Need to Know |
|
Author:
| SecurityMetrics, Smith, Eric |
Editor:
| Smith, Eric Clark, Jon Elguera, Meagan |
Compiled by:
| Smith, Eric |
Curated by:
| Smith, Eric |
Editor-In-Chief:
| Smith, Eric |
Appendix by:
| Smith, Eric |
Arranged by:
| Smith, Eric |
Executive Producer:
| Smith, Eric Clark, Jon Stone, Jen |
Interviewer:
| Smith, Eric |
Managing editor:
| Smith, Eric |
Illustrator:
| Ungricht, Chelsea Blackwelder, Hiedi |
Designed by:
| Ungricht, Chelsea Blackwelder, Hiedi |
Cover Design by:
| Blackwelder, Hiedi |
Reviewed by:
| Clark, Jon |
Technical editor:
| Elguera, Meagan |
Associate Editor:
| Garrett, Andrew Running, Ryan |
Interviewee:
| Halbleib, Matt |
Contribution by:
| Halbleib, Matt Stone, Jen Mateaki, George Black, Joshua Simpson, Michael McCrory, Thomas Riesen, Mike Budge, Brian Miner, Mark Christensen, Ben Hovorka, Todd Ohran, Mike Page, David Ellis, David |
Consultant Editor:
| Stone, Jen |
ISBN: | 978-1-7346465-0-4 |
Publication Date: | Feb 2020 |
Publisher: | SecurityMetrics
|
Book Format: | Paperback |
List Price: | USD $59.99 |
Book Description:
|
Despite advances in security technology and increased governmental cybersecurity initiatives, attackers will not abandon their pursuit of patient data. Patient data is valuable. It can be used to file false claims, acquire prescription drugs, or receive medical care. Patient data often includes enough information to steal a person's identity entirely, allowing criminals to open credit accounts, file fraudulent tax returns, or receive government-issued ID cards.In light of recent data...
More DescriptionDespite advances in security technology and increased governmental cybersecurity initiatives, attackers will not abandon their pursuit of patient data. Patient data is valuable. It can be used to file false claims, acquire prescription drugs, or receive medical care. Patient data often includes enough information to steal a person's identity entirely, allowing criminals to open credit accounts, file fraudulent tax returns, or receive government-issued ID cards.In light of recent data breaches, it's clear that the healthcare industry is less prepared with HIPAA compliance than patients would expect. HIPAA compliance, especially the Security Rule, has never been more necessary as the value of patient data continues to rise on the dark web.Far too often, it's the simple, easy-to-correct things that go unnoticed and create vulnerabilities that lead to a data breach. Even organizations with layers of sophisticated IT defenses can be tripped up by an employee who opens an errant email or uses a less-than-complex password.This guide is not intended to be a legal brief on all aspects of HIPAA regulations. Rather, it approaches HIPAA from the perspective of a security analyst, focusing on how to protect electronic patient data. This guide will examine the policies, procedures, and security controls recommended to keep electronic patient data private and secure as described under HIPAA's Privacy and Security Rules. It also discusses Breach Notification and Enforcement Rules.Ultimately, our goal is to help you keep patient data safe.