Freshly Printed - allow 10 days lead
Protecting Patient Information
A Decision-Maker's Guide to Risk, Prevention, and Damage Control
A systematic approach to healthcare cybersecurity, including how to secure healthcare IT systems and reduce the risk of exposing patient information
Paul Cerrato (Author)
9780128043929, Elsevier Science
Paperback, published 7 April 2016
162 pages
23.5 x 19 x 1.2 cm, 0.36 kg
"This is an unusual, yet interesting and important small volume… physician leaders, business executives of health care organizations, and those with smaller or bigger offices would find it useful. Considering the topic, it is highly readable." --Annals of Clinical Psychiatry "...it’s a good primer that condenses the main points of the regulations protecting patients’ data, and you will get some helpful tips. It’s a good way to get a sense of what you’ll be in for if you start the journey." --Help Net Security
Protecting Patient Information: A Decision-Maker's Guide to Risk, Prevention, and Damage Control provides the concrete steps needed to tighten the information security of any healthcare IT system and reduce the risk of exposing patient health information (PHI) to the public. The book offers a systematic, 3-pronged approach for addressing the IT security deficits present in healthcare organizations of all sizes. Healthcare decision-makers are shown how to conduct an in-depth analysis of their organization’s information risk level. After this assessment is complete, the book offers specific measures for lowering the risk of a data breach, taking into account federal and state regulations governing the use of patient data. Finally, the book outlines the steps necessary when an organization experiences a data breach, even when it has taken all the right precautions.
1. Introduction: Dissecting a book title 2. Healthcare IT Security: Perception Versus Reality 3. Regulations Governing Protected Health Information 4. Risk Assessment 5. Reducing the Risk of a Data Breach 6. Mobile device security 7. Securing Medical Devices 8. Educating Medical and Administrative Staff for Information Security 9. Managing Business Associates 10. Coping with a Data Breach
Subject Areas: Computer security [UR], Enterprise software [UFL], Medical bioinformatics [MBF]