Limit search to available items
Book Cover
E-book
Author Trinckes, John J., Jr., author.

Title How healthcare data privacy is almost dead ... and what can be done to revive it! / John Trinckes, Jr
Published Boca Raton, FL : CRC Press, Taylor & Francis Group, [2017]
Online access available from:
ProQuest Ebook Central Subscription    View Resource Record  

Copies

Description 1 online resource
Contents Code blue -- Privacy concerns -- Healthcare armageddon -- Victims -- Healthcare security -- Enforcement actions -- Privacy -- Clear
Cover; Half Title; Title Page; Copyright Page; Table of Contents; FOREWORD; PREFACE; ACKNOWLEDGMENTS; AUTHOR; CONTRIBUTING AUTHOR; CHAPTER 1: CODE BLUE; Erroneous Information; Medical Identity Theft; Credit Troubles; Internet of Things; Medical Devices; FDA Draft Guidance; Hippocratic Oath for Connected Medical Devices; Cyber Independent Testing Laboratory; Privacy by Design; Ethical Design Manifesto; Open Web Application Security; Legal/Constitutional Issues; Fingerprints Are Not Protected by the Fifth Amendment; CHAPTER 2: PRIVACY CONCERNS; Information & nformation & verywhere
Business Associate AgreementsONC; Office of Inspector General (OIG); State Attorney General; FTC; CMS; FCC; Class Action Lawsuits; Violation of Privacy; CHAPTER 7: PRIVACY & LEAR & Individual Rights; Withholding Medical Information; Privacy Platform; Put a Tourniquet On: Stop the Bleeding; Shock to the Industry; National Patient Identifier; Revive Security Posture; Preventive Medicine; Social Engineering; Monitoring; Anti-Malware; Multi-Factor Authentication; Data Loss Protection; Data Collection/Retention; Data Encryption; Incident Response Plan; Vendor Management
Health Application UseStandards/Certification/Accreditation; CIS Critical Security Controls; NIST CsF; HITRUST; EHNAC; FHIR; Recovery; Cybersecurity Insurance; CHAPTER 8: SUMMARY; Message to the Board Room; Steely-Eyed Missile Man; Asking the Right Questions; Message to Chief Executive Officers; Message to the Legislators; Message to Private Citizens; Final Thoughts; REFERENCES; INDEX
New Social DisorderMedical Records; De-Identification; Meaningful Use; 21st Century Cures Bill; Cybersecurity Information Sharing Act 2015 (CISA); Health Information Technologies Standards Committee; Improving Health Information Technology Act; Governmental Issues; Healthcare.gov; OPM Data Breach; Einstein Program; IRS; Telemedicine; NASA; Medical Information Is Highly Coveted; Ease of Obtaining Information; Security versus Privacy; Consumer Scores; CHAPTER 3: HEALTHCARE ARMAGEDDON; 2015 Year of the Hack: Medical Breaches; Another Search Engine to the Rescue; Hackers Are the Problem
Patients Trust HealthcareThe Standard Response; EU Doesn't Trust U.S. Privacy: Agreement Made; CHAPTER 4: VICTIMS; Costs; Identity Theft/Fraud; Tax Fraud; Healthcare Resources; Untold Victims; CHAPTER 5: HEALTHCARE SECURITY; Ignorance Is Bliss: State of Healthcare Security; Constructive Ambiguity and the HIPAA Regulations; State Requirements; California; Florida; Massachusetts; Nevada; Oregon; Texas; Privacy Culture; Not a Security Culture; All Stick and No Carrot; Resource Availability; Excuses; A Funny Thing Happened on the Way to Security & othing; CHAPTER 6: ENFORCEMENT; OCR; Omnibus Rule
Bibliography Includes bibliographical references and index
Subject Computer Security.
Electronic Health Records -- standards.
Health Information Management -- methods.
Medical Errors -- prevention & control.
Privacy.
Computer security.
Medical errors.
Medical informatics -- Methods
Medical records -- Data processing -- Standards
Privacy.
BUSINESS & ECONOMICS -- General.
Computer security.
Medical errors.
Medical informatics.
Privacy.
United States.
Genre/Form Methods (Music)
Form Electronic book
ISBN 1315270692
1351982753
1351982761
1498783961
9781315270692
9781351982757
9781351982764
9781498783965