eBook: Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information (DRM PDF)
 
電子書格式: DRM PDF
作者: Eric C. Thompson 
分類: Computer security  
書城編號: 21359336


售價: $715.00

購買後立即進貨, 約需 1-4 天

 
 
製造商: Apress
出版日期: 2017/11/11
ISBN: 9781484230602
 
>> 相關實體書

商品簡介
Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The requirement is a focus area for the Department of Health and Human Services (HHS) Office for Civil Rights (OCR) during breach investigations and compliance audits. This book lays out a plan for healthcare organizations of all types to successfully comply with these requirements and use the output to build upon the cybersecurity program. With the proliferation of cybersecurity breaches, the number of healthcare providers, payers, and business associates investigated by the OCR has risen significantly. It is not unusual for additional penalties to be levied when victims of breaches cannot demonstrate that an enterprise-wide risk assessment exists, comprehensive enough to document all of the risks to ePHI.Why is it that so many covered entities and business associates fail to comply with this fundamental safeguard? Building a HIPAA Compliant Cybersecurity Program cuts through the confusion and ambiguity of regulatory requirements and provides detailed guidance to help readers: Understand and document all known instances where patient data existKnow what regulators want and expect from the risk analysis processAssess and analyze the level of severity that each risk poses to ePHIFocus on the beneficial outcomes of the process: understanding real risks, and optimizing deployment of resources and alignment with business objectivesWhat You'll Learn Use NIST 800-30 to execute a risk analysis and assessment, which meets the expectations of regulators such as the Office for Civil Rights (OCR)Understand why this is not just a compliance exercise, but a way to take back control of protecting ePHILeverage the risk analysis process to improve your cybersecurity programKnow the value of integrating technical assessments to further define risk management activitiesEmploy an iterative process that continuously assesses the environment to identify improvement opportunities Who This Book Is For Cybersecurity, privacy, and compliance professionals working for organizations responsible for creating, maintaining, storing, and protecting patient information
Eric C. Thompson 作者作品表

eBook: Designing a HIPAA-Compliant Security Operations Center: A Guide to Detecting and Responding to Healthcare Breaches and Events (DRM PDF)

eBook: Designing a HIPAA-Compliant Security Operations Center: A Guide to Detecting and Responding to Healthcare Breaches and Events (DRM EPUB)

eBook: Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents (DRM PDF)

eBook: Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents (DRM EPUB)

eBook: Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information (DRM PDF)

eBook: Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information (DRM EPUB)

Entrepreneurship in Nebraska (Hardcover)

* 以上資料僅供參考之用, 香港書城並不保證以上資料的準確性及完整性。
* 如送貨地址在香港以外, 當書籍/產品入口時, 顧客須自行繳付入口關稅和其他入口銷售稅項。

 

 

 

  我的賬戶 |  購物車 |  出版社 |  團購優惠
加入供應商 |  廣告刊登 |  公司簡介 |  條款及細則

香港書城 版權所有 私隱政策聲明

顯示模式: 電腦版 (改為: 手機版)