The Locator -- [(subject = "United States--Health Insurance Portability and Accountability Act of 1996")]

68 records matched your query       


Record 3 | Previous Record | Long Display | Next Record
03022aam a2200397 i 4500
001 01D4C212F5D511E7B33F7C0497128E48
003 SILO
005 20180110010212
008 160624s2016    ilu      b    001 0 eng  
010    $a 2016029675
020    $a 1627228357
020    $a 9781627228350
035    $a (OCoLC)952277307
040    $a DLC $b eng $e rda $c DLC $d OCLCO $d UCX $d CLU $d OCLCQ $d RCJ $d UtOrBLW $d SILO
042    $a pcc
043    $a n-us--- $0 http://id.loc.gov/vocabulary/geographicAreas/n-us
050 00 $a KF3827.R4 $b G85 2016 $0 http://id.loc.gov/authorities/classification/K
082 00 $a 344.7304/1 $2 23
100 1  $a Wu, Stephen S., $e author. $0 http://id.loc.gov/authorities/names/n2003104758
245 12 $a A guide to HIPAA security and the law / $c Stephen S. Wu.
246 3  $a Guide to Health Insurance Portability and Accountability Act security and the law
250    $a Second edition.
264  1 $a Chicago, Illinois : $b American Bar Association, Section of Science & Technology Law, $c [2016]
300    $a xix, 528 pages ; $c 23 cm
504    $a Includes bibliographical references and index.
505 0  $a Background and history of HIPAA, HITECH, and beyond -- HIPAA/HITECH privacy and security -- Scope and applicability of the HIPAA security rule -- The security rule -- The breach notification rule and handling breaches -- Compliance and enforcement -- Litigation and risk management -- Emerging technologies.
520    $a "HIPAA and the Security Rule are sources of law, but the Security Rule also acts as a source of information security practices. [This book] bridges the gap between the law and information security practices. Unlike other books on HIPAA, the focus of this book is the HIPAA Security Rule, as modified by the HITECH Act and the HIPAA Final Omnibus Rule. This publication discusses the Security Rule's role in the broader context of HIPAA, the HITECH Act, and their regulations. At the heart of this publication is a detailed section-by-section analysis of each provision in the Security Rule covering a security safeguard. This analysis explains the security topic and what organizations can do to comply."-- $c Back cover.
610 10 $a United States. $t Health Insurance Portability and Accountability Act of 1996. $0 http://id.loc.gov/authorities/names/no96063239
650  0 $a Medical records $x Law and legislation $z United States. $0 http://id.loc.gov/authorities/subjects/sh2008107621
650  0 $a Medical records $x Access control $z United States. $0 http://id.loc.gov/authorities/subjects/sh2007008835
650  0 $a Medical records $x Security measures $z United States.
650  0 $a Data protection $x Law and legislation $z United States. $0 http://id.loc.gov/authorities/subjects/sh2008102020
710 2  $a American Bar Association. $b Section of Science & Technology Law, $e sponsoring body. $0 http://id.loc.gov/authorities/names/no2001078106
941    $a 1
952    $l OVUX522 $d 20180110041433.0
956    $a http://locator.silo.lib.ia.us/search.cgi?index_0=id&term_0=01D4C212F5D511E7B33F7C0497128E48

Initiate Another SILO Locator Search

This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.