This is the most comprehensive HIPAA training manual for different HIPAA Certifications on Privacy and Security rule or self-study HIPAA training. This HIPAA book focuses on the Administrative Simplification portion of HIPAA and the Transactions, Privacy, and Security Rules defined within it. This guide contains explanations of the final Security Rule’s standards and implementation specifications in the areas of Administrative, Physical, and Technical Safeguards. Assessment tools, methodologies, and sample security policies that can be utilized to bring a covered entity into compliance are all included in the text. In addition, major networking protocols and technologies are discussed and evaluated in regard to their relevance to information security.
This manual is very helpful in understanding the HIPAA laws, their penalties, how to start compliance, etc. This HIPAA guide is invaluable for members of HIPAA compliance teams, HIPAA Privacy Officers, HIPAA Security Officers, project managers, network administrators, consultants, and anyone else involved in the HIPAA compliance efforts of the organization.
ISBN: 978-1-62274-053-6
Number of Pages: 712 pages spiral bound.
Price: $469
Buy HIPAA Manual Now
Table of Content for HIPAA Manual
- Topic A: About the manual
- Topic B: Setting student expectations
- Topic C: Classroom setup
- Topic D: Support
- Topic A: HIPAA introduction
- Topic B: Administrative Simplification
- Topic C: HIPAA penalties
- Topic D: HIPAA-related organizations
- Topic E: HIPAA terminology
- Unit summary: HIPAA basics
- Topic A: Transactions
- Unit summary: Transactions & code sets overview
- Topic A: ANSI ASC X12 standards
- Unit summary: Transactions – ANSI X12 and NCPDP transaction types
- Topic A: Code sets
- Topic B: National health care identifiers
- Unit summary: Code sets & national identifiers
- Topic A: HIPAA, EHRs, and e-health
- Topic B: Planning for privacy compliance
- Topic C: Planning for security compliance
- Topic D: Scenario: Possible framework for compliance
- Unit summary: HIPAA and e-Health – Security and privacy requirements
- Topic A: Introduction to the Privacy Rule
- Unit summary: HIPAA Privacy Rule
- Topic A: Organizational requirements and relationships
- Topic B: Individual privacy rights
- Unit summary: Privacy Rule – Organizational and individual relationships, rights, and responsibilities
- Topic A: Notice of Privacy Practices and Authorizations
- Unit summary: Privacy Rule – Notice of Privacy Practices
- Topic A: Uses and disclosures: General
- Topic B: Uses and disclosures: treatment, payment, and health care operations
- Topic C: Uses and disclosures: Public purposes
- Unit summary: Privacy Rule – Uses and disclosures of PHI
- Topic A: Safeguards
- Unit summary: Privacy Rule – Safeguards
- Topic A: Scope of the HIPAA Security Rule
- Topic B: Threats to business information
- Topic C: Security terminology and categories
- Topic D: Administrative safeguards
- Topic E: Physical safeguards
- Topic F: Technical safeguards
- Topic G: Organizational requirements
- Topic H: Policies and procedures, and documentation standards
- Unit summary: HIPAA Security Rule – Overview
- Topic A: Security threats
- Topic B: Security technology options
- Unit summary: HIPAA Security Rule – Threats and technology options
- Topic A: Security awareness and training
- Topic B: Security incident procedures
- Topic C: Contingency plans
- Topic D: Evaluation
- Topic E: Business Associate Contracts and other arrangements
- Unit summary: Advanced administrative safeguards
- Topic A: Privacy Rule physical safeguards
- Unit summary: Physical safeguards overview
- Topic A: Requirements
- Topic B: Facility access controls
- Topic C: Workstation use and security
- Topic D: Specific steps – Physical security implementation
- Unit summary: Advanced physical safeguards
- Topic A: Device and Media Controls
- Unit summary: Physical safeguards – Device and Media Management
- Topic A: Requirements
- Topic B: Access Control
- Topic C: Audit Controls
- Topic D: Integrity
- Topic E: Person or Entity Authentication
- Unit summary: General technical safeguards
- Topic A: Transmission Security
- Topic B: TCP/IP network infrastructure
- Topic C: Firewall systems
- Topic D: Virtual Private Networks (VPNs)
- Topic E: Wireless transmission security
- Topic F: Encryption
- Topic G: Kerberos authentication
- Topic H: Case study example: Windows security
- Unit summary: Advanced technical safeguards
- Topic A: Requirements
- Topic B: Digital signatures
- Topic C: Digital certificates
- Topic D: Public Key Infrastructure (PKI)
- Unit summary: Digital signatures and certificates
- Topic A: Threats, risk management, and policy
- Topic B: The ISO/IEC-27002 security standards
- Topic C: Security policy considerations
- Topic D: Sample security policy documents
- Unit summary: Security policy
- Topic A: HITECH Act
- Topic B: Red Flags Rule
- Topic A: The Omnibus Rule
- Topic A: Moving Towards Electronic Health Records
- Topic B: Meaningful Use
- Topic A: HIPAA Compliance Enforcement
- Topic B: HIPAA Compliance Audits
- Topic A: The Digital Universe
- Topic B: Privacy and Security in the Digital Universe
- Topic A: HIPAA Security Rule Standards
- Topic A: HIPAA Privacy Rule standards
- Topic A: Job role matrix
- Topic A: Course summary
- Topic B: Continued learning after class
Glossary
Index