Background and history of HIPAA, HITECH, and beyond -- HIPAA/HITECH privacy and security -- Scope and applicability of the HIPAA security rule -- The security rule -- The breach notification rule and handling breaches -- Compliance and enforcement -- Litigation and risk management -- Emerging technologies.
Summary:
"HIPAA and the Security Rule are sources of law, but the Security Rule also acts as a source of information security practices. [This book] bridges the gap between the law and information security practices. Unlike other books on HIPAA, the focus of this book is the HIPAA Security Rule, as modified by the HITECH Act and the HIPAA Final Omnibus Rule. This publication discusses the Security Rule's role in the broader context of HIPAA, the HITECH Act, and their regulations. At the heart of this publication is a detailed section-by-section analysis of each provision in the Security Rule covering a security safeguard. This analysis explains the security topic and what organizations can do to comply."-- Back cover.
This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.