Skip to content

Stedman's Guide to the HIPAA Privacy and Security Rules

Best in textbook rentals since 2012!

ISBN-10: 1608310531

ISBN-13: 9781608310531

Edition: 2nd 2011 (Revised)

Authors: Stedman, Kathy Nicholls

List price: $36.95
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

Addressing the needs of all health information management professionals, from medical transcriptionists, coders, and billers to medical office administrators and managers,Stedman's Guide to the HIPAA Privacy & Security Ruleshas been completely revised to include not only the Security Rule, but also the new HITECH Act passed in 2009. Writing in a lively, engaging style, Kathy Nicholls cuts through the daunting legalese and gets right to the core of each relevant piece of legislation, clearly and concisely explaining the meaning and purpose of the law, while also providing clean, easy-to-follow checklists for compliance. Helpful hints and key items are pulled out and highlighted for ease of…    
Customers also bought

Book details

List price: $36.95
Edition: 2nd
Copyright year: 2011
Publisher: Lippincott Williams & Wilkins
Publication date: 2/1/2011
Binding: Paperback
Pages: 256
Size: 5.75" wide x 9.25" long x 0.50" tall
Weight: 0.770
Language: English

Introduction to HIPAA and the Privacy and Security Rules
Introduction
What Is HIPAA?
The Privacy and Security Rules
Terminology
General Terminology in Healthcare
Significant Points
Compliance Deadlines
The Privacy and Security Rules and Healthcare Documentation
Introduction
What Does the Privacy Rule Really Do?
What Does the Security Rule Really Do?
Privacy for Protected Health Information Is the Goal!
What Constitutes Protected Health Information?
Who Must Comply and How Does Compliance Impact the Work Setting?
State Laws
Application of the Privacy Rule in Healthcare Documentation
Policies and Procedures
Training
Use and Disclosure
Minimally Necessary Information
Access Control
De-identified Information
Confidentiality Agreements
Computer Security
Work Areas
Transfer of Data
Destruction of Hard Copy protected Health Information
Use of the Fax
Use of E-Mail
Disaster Recovery
Offsite Workers
Storage and Retention
Audit Trails
Termination Procedures
Recycling of Computers
Access to PHI for Educational Purposes
Vendors
Breaches
Complaints
Penalties
Enforcement
HIPAA for the Independent Contractor
Are You a Business Associate?
General Requirements
A Blueprint for Compliance with the Privacy Rule
Introduction
Where Do I Start?
Gap Analysis Checklist
Vendor Compliance Checklist
Training Checklist
What Policies Do I Need?
Privacy Officer Policy
Policy for the Use of Protected Health Information
Policy for the Use of Protected Health Information in Quality Assurance and Educational Programs
Training Policy
Computer Security Policy
Policy for Confidentiality Agreements
Policy for Work Area Arrangements
Access Policy for Digital Dictation Systems
Policy for the Use of Hard Copy Protected Health Information
Policy for Use of the Fax Machine
E-Mail Policy
Disaster Recovery Policy
Policy for Offsite Workers
Termination Policy
Breaches and Sanctions Policies
Complaint Policy
Vendor Policy
Policies for Business Associates
Sample Contracts and Agreements
Policy for Subcontractors
Policy for Offshore Contractors
A Word About Disclosures
What About Indemnification?
The Security Rule and Healthcare Documentation
Introduction
What Does the Security Rule Really Do?
What Constitutes Protected Health Information?
Who Must Comply and How Does Compliance Impact the Work Setting?
State Laws
Application of the Security Rule
Administrative Safeguards
Physical Safeguards
Technical Safeguards
Organizational Requirements
Policies and Procedures and Documentation Requirements
Penalties
Enforcement
HIPAA for the Independent Contractor
Are You a Business Associate?
A Blueprint for Compliance with the Security Rule
Introduction
Administrative Safeguards
Security Management Process
Assigned Security Responsibility
Workforce Security
Information Access Management
Security Awareness and Training
Security Incidents
Contingency Plans
Evaluation
Business Associate Contracts and Other Arrangements
Physical Safeguards
Facility Access Control
Workstation Use
Workstation Security
Device and Media Controls
Technical Safeguards
Access Control
Audit Controls
Integrity
Person or Entity Authentication
Transmission Security
Organizational Requirements
Business Associate Contracts and Other Arrangements
Requirements for Group Health Plans
Policies and Procedures and Documentation Requirements
Policies and Procedures
Documentation
A Final Note on Security
Frequently Asked Questions
Industry Resources
AAMT Paper on Special Considerations for Offsite Medical Transcriptionists
Abbreviations and Acronyms
Glossary
Index