did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781608310531

Stedman's Guide to the HIPAA Privacy & Security Rules

by
  • ISBN13:

    9781608310531

  • ISBN10:

    1608310531

  • Edition: 2nd
  • Format: Paperback
  • Copyright: 2011-01-31
  • Publisher: Stedman's
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $58.99

Summary

Addressing the needs of all health information management professionals, from medical transcriptionists, coders, and billers to medical office administrators and managers,Stedman's Guide to the HIPAA Privacy & Security Ruleshas been completely revised to include not only the Security Rule, but also the new HITECH Act passed in 2009. Writing in a lively, engaging style, Kathy Nicholls cuts through the daunting legalese and gets right to the core of each relevant piece of legislation, clearly and concisely explaining the meaning and purpose of the law, while also providing clean, easy-to-follow checklists for compliance. Helpful hints and key items are pulled out and highlighted for ease of studying and retention, and real-world stories anchor the legal information in the real world of healthcare information, demonstrating both the necessity and the application of the law, and enlivening the material. An FAQ section at the end is a handy reference as students move into the professional world, and as professionals need a refresher on key questions. The online resources include dozens of sample forms that can be modified to suit the user's needs. This concise, clear guide explains even the most complicated of the HIPAA legislation in terms that are easy to understand and relevant to students and professionals responsible for safeguarding the privacy and integrity of healthcare information.

Table of Contents

Introduction to HIPAA and the Privacy and Security Rulesp. 1
Introductionp. 2
What Is HIPAA?p. 3
The Privacy and Security Rulesp. 7
Terminologyp. 8
General Terminology in Healthcarep. 13
Significant Pointsp. 14
Compliance Deadlinesp. 16
The Privacy and Security Rules and Healthcare Documentationp. 21
Introductionp. 22
What Does the Privacy Rule Really Do?p. 23
What Does the Security Rule Really Do?p. 23
Privacy for Protected Health Information Is the Goal!p. 24
What Constitutes Protected Health Information?p. 25
Who Must Comply and How Does Compliance Impact the Work Setting?p. 25
State Lawsp. 26
Application of the Privacy Rule in Healthcare Documentationp. 26
Policies and Proceduresp. 27
Trainingp. 27
Use and Disclosurep. 28
Minimally Necessary Informationp. 29
Access Controlp. 29
De-identified Informationp. 30
Confidentiality Agreementsp. 32
Computer Securityp. 32
Work Areasp. 33
Transfer of Datap. 33
Destruction of Hard Copy protected Health Informationp. 34
Use of the Faxp. 34
Use of E-Mailp. 36
Disaster Recoveryp. 37
Offsite Workersp. 37
Storage and Retentionp. 38
Audit Trailsp. 39
Termination Proceduresp. 39
Recycling of Computersp. 40
Access to PHI for Educational Purposesp. 40
Vendorsp. 41
Breachesp. 42
Complaintsp. 43
Penaltiesp. 44
Enforcementp. 46
HIPAA for the Independent Contractorp. 46
Are You a Business Associate?p. 47
General Requirementsp. 47
A Blueprint for Compliance with the Privacy Rulep. 57
Introductionp. 58
Where Do I Start?p. 58
Gap Analysis Checklistp. 59
Vendor Compliance Checklistp. 63
Training Checklistp. 63
What Policies Do I Need?p. 65
Privacy Officer Policyp. 66
Policy for the Use of Protected Health Informationp. 67
Policy for the Use of Protected Health Information in Quality Assurance and Educational Programsp. 67
Training Policyp. 69
Computer Security Policyp. 69
Policy for Confidentiality Agreementsp. 73
Policy for Work Area Arrangementsp. 74
Access Policy for Digital Dictation Systemsp. 75
Policy for the Use of Hard Copy Protected Health Informationp. 76
Policy for Use of the Fax Machinep. 77
E-Mail Policyp. 78
Disaster Recovery Policyp. 80
Policy for Offsite Workersp. 81
Termination Policyp. 84
Breaches and Sanctions Policiesp. 86
Complaint Policyp. 87
Vendor Policyp. 88
Policies for Business Associatesp. 88
Sample Contracts and Agreementsp. 90
Policy for Subcontractorsp. 99
Policy for Offshore Contractorsp. 99
A Word About Disclosuresp. 100
What About Indemnification?p. 100
The Security Rule and Healthcare Documentationp. 109
Introductionp. 110
What Does the Security Rule Really Do?p. 110
What Constitutes Protected Health Information?p. 111
Who Must Comply and How Does Compliance Impact the Work Setting?p. 112
State Lawsp. 112
Application of the Security Rulep. 113
Administrative Safeguardsp. 113
Physical Safeguardsp. 121
Technical Safeguardsp. 125
Organizational Requirementsp. 127
Policies and Procedures and Documentation Requirementsp. 127
Penaltiesp. 128
Enforcementp. 129
HIPAA for the Independent Contractorp. 130
Are You a Business Associate?p. 130
A Blueprint for Compliance with the Security Rulep. 137
Introductionp. 138
Administrative Safeguardsp. 139
Security Management Processp. 139
Assigned Security Responsibilityp. 145
Workforce Securityp. 146
Information Access Managementp. 148
Security Awareness and Trainingp. 150
Security Incidentsp. 152
Contingency Plansp. 155
Evaluationp. 157
Business Associate Contracts and Other Arrangementsp. 158
Physical Safeguardsp. 162
Facility Access Controlp. 162
Workstation Usep. 165
Workstation Securityp. 166
Device and Media Controlsp. 167
Technical Safeguardsp. 169
Access Controlp. 170
Audit Controlsp. 172
Integrityp. 172
Person or Entity Authenticationp. 173
Transmission Securityp. 174
Organizational Requirementsp. 175
Business Associate Contracts and Other Arrangementsp. 175
Requirements for Group Health Plansp. 176
Policies and Procedures and Documentation Requirementsp. 177
Policies and Proceduresp. 177
Documentationp. 178
A Final Note on Securityp. 179
Frequently Asked Questionsp. 185
Industry Resourcesp. 199
AAMT Paper on Special Considerations for Offsite Medical Transcriptionistsp. 205
Abbreviations and Acronymsp. 211
Glossaryp. 213
Indexp. 219
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program