Healthcare Clearinghouse

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 3 Experts worldwide ranked by ideXlab platform

Kevin Beaver - One of the best experts on this subject based on the ideXlab platform.

  • The practical guide to HIPAA privacy and security compliance
    2003
    Co-Authors: Rebecca Herold, Kevin Beaver
    Abstract:

    HIPAA ESSENTIALS Introduction to HIPAA How HIPAA Came to Be What HIPAA Covers Organizations that Must Comply with HIPAA Compliance Deadlines HIPAA Penalties and Enforcement Insight into the Electronic Transactions and Code Sets Rule Summary Chapter 1: Practical Checklist Preparing for the HIPAA Changes Background Managing Change Creating the Mindset It's Up to You Chapter 2: Practical Checklist HIPAA Cost Considerations Background Privacy Implementation Costs Privacy Ongoing Maintenance Costs Costs Related to Providing Access to PHI Privacy Officer Costs Security Implementation Costs Security Ongoing Maintenance Costs Security Officer Costs Chapter 3: Practical Checklist The Relationship Between Security and Privacy Background Privacy Rule and Security Rule Overlaps Conclusion Chapter 4: Practical Checklist Section 1 Quiz HIPAA PRIVACY RULE HIPAA Privacy Rule Requirements Overview Background Uses and Disclosures Incidental Uses and Disclosures Minimum Necessary De-Identification Business Associates Marketing Notice of Privacy Practices for PHI Individual Rights to Request Privacy Protection for PHI Individual Access to PHI Amendment of PHI Accounting Disclosures of PHI PHI Restrictions Requests Administrative Requirements Personal Representatives Minors Transition Provisions Compliance Dates and Penalties Looking Forward Performing a Privacy Rule Gap Analysis and Risk Analysis Gap Analysis and Risk Analysis Chapter 6: Practical Checklist Writing Effective Privacy Policies Notice of Privacy Practices Example NPP Organizational Privacy Policies Chapter 7: Practical Checklist State Preemption What is Contrary? Preemption Criteria Exceptions to Preemption Preemption Analysis Conclusion Chapter 8: Practical Checklist Crafting a Privacy Implementation Plan Some Points to Keep in Mind Conclusion Chapter 9: Practical Checklist Privacy Rule Compliance Checklist HIPAA SECURITY RULE Security Rule Requirements Overview Introduction to the Security Rule What's New in the Final Security Rule General Rules for Security Rule Compliance Required versus Addressable Insight Into the Security Rule Other Organizational Requirements Reasons to Get Started on Security Rule Initiatives Chapter 11: Practical Checklist Performing a Security Rule Risk Analysis Background Risk Analysis Requirements According to HIPAA Risk Analysis Essentials Stepping Through the Process Calculating Risk Managing Risks Going Forward Chapter 12: Practical Checklist Writing Effective Information Security Policies Introduction to Security Policies Critical Elements of Security Policies Sample Security Policy Framework Security Policies You May Need for HIPAA Security Rule Compliance Managing Your Security Policies Chapter 13: Practical Checklist Crafting a Security Implementation Plan Background Some Points to Keep In Mind Conclusion Chapter 14: Practical Checklist Security Rule Compliance Checklist COVERED ENTITY ISSUES Healthcare Provider Issues Background Privacy Notices Fees for Record Review Mitigation Measures Fax Use Sign-In Sheets Patient Charts Business Associates Authorizations Chapter 16: Practical Checklist Healthcare Clearinghouse Issues Background Requirements Transactions Financial Institutions Conclusion Chapter 17: Practical Checklist Health Plan Issues What is a Health Plan? What is a Small Health Plan? Health Plan Requirements Marketing Issues Notice of Privacy Practices Types of Insurance Plans Excluded from HIPAA Communications Government and Law Enforcement Chapter 18: Practical Checklist Employer Issues Background "Small" and "Large" Employers Health Benefits Enforcement and Penalties Organizational Requirements Health Information Medical Surveillance Workers' Compensation Training Resources Conclusion Chapter 19: Practical Checklist Business Associate Issues Is Your Organization a Business Associate? Business Associate Requirements What You Can Expect to See or Hear from Covered Entities Issues to Consider Moving Forward Chapter 20: Practical Checklist HIPAA TECHNOLOGY CONSIDERATIONS Building a HIPAA Compliant Technology Infrastructure Overview Areas of Technology to Focus On Looking Deeper into Specific Technologies Mobile Computing Concerns Summary Chapter 21: Practical Checklist Crafting Security Incident Procedures and Contingency Plans Background Handling Security Incidents Security Incident Procedure Essentials Basics of Contingency Planning Moving Forward Chapter 22: Practical Checklist Outsourcing Information Technology Services Background Reasons to Consider Outsourcing What Functions to Outsource What to Look for in Outsourcing Firms Common Outsourcing Mistakes Chapter 23: Practical Checklist MANAGING ONGOING HIPAA COMPLIANCE HIPAA Training, Education, and Awareness Creating an Effective Awareness Program Identify Awareness and Training Groups Training Training Design and Development Awareness Options Document Training and Awareness Activities Get Support Measure Effectiveness Conclusion Chapter 24: Practical Checklist Performing Ongoing HIPAA Compliance Reviews and Audits Background Privacy Issues Security Issues Making Audits Work Chapter 25: Practical Checklist APPENDIXES HIPAA Case Studies: Experiences Shared Sample Documents HIPAA Resources Answers to Chapter Quizzes HIPAA Glossary

Rebecca Herold - One of the best experts on this subject based on the ideXlab platform.

  • The practical guide to HIPAA privacy and security compliance
    2003
    Co-Authors: Rebecca Herold, Kevin Beaver
    Abstract:

    HIPAA ESSENTIALS Introduction to HIPAA How HIPAA Came to Be What HIPAA Covers Organizations that Must Comply with HIPAA Compliance Deadlines HIPAA Penalties and Enforcement Insight into the Electronic Transactions and Code Sets Rule Summary Chapter 1: Practical Checklist Preparing for the HIPAA Changes Background Managing Change Creating the Mindset It's Up to You Chapter 2: Practical Checklist HIPAA Cost Considerations Background Privacy Implementation Costs Privacy Ongoing Maintenance Costs Costs Related to Providing Access to PHI Privacy Officer Costs Security Implementation Costs Security Ongoing Maintenance Costs Security Officer Costs Chapter 3: Practical Checklist The Relationship Between Security and Privacy Background Privacy Rule and Security Rule Overlaps Conclusion Chapter 4: Practical Checklist Section 1 Quiz HIPAA PRIVACY RULE HIPAA Privacy Rule Requirements Overview Background Uses and Disclosures Incidental Uses and Disclosures Minimum Necessary De-Identification Business Associates Marketing Notice of Privacy Practices for PHI Individual Rights to Request Privacy Protection for PHI Individual Access to PHI Amendment of PHI Accounting Disclosures of PHI PHI Restrictions Requests Administrative Requirements Personal Representatives Minors Transition Provisions Compliance Dates and Penalties Looking Forward Performing a Privacy Rule Gap Analysis and Risk Analysis Gap Analysis and Risk Analysis Chapter 6: Practical Checklist Writing Effective Privacy Policies Notice of Privacy Practices Example NPP Organizational Privacy Policies Chapter 7: Practical Checklist State Preemption What is Contrary? Preemption Criteria Exceptions to Preemption Preemption Analysis Conclusion Chapter 8: Practical Checklist Crafting a Privacy Implementation Plan Some Points to Keep in Mind Conclusion Chapter 9: Practical Checklist Privacy Rule Compliance Checklist HIPAA SECURITY RULE Security Rule Requirements Overview Introduction to the Security Rule What's New in the Final Security Rule General Rules for Security Rule Compliance Required versus Addressable Insight Into the Security Rule Other Organizational Requirements Reasons to Get Started on Security Rule Initiatives Chapter 11: Practical Checklist Performing a Security Rule Risk Analysis Background Risk Analysis Requirements According to HIPAA Risk Analysis Essentials Stepping Through the Process Calculating Risk Managing Risks Going Forward Chapter 12: Practical Checklist Writing Effective Information Security Policies Introduction to Security Policies Critical Elements of Security Policies Sample Security Policy Framework Security Policies You May Need for HIPAA Security Rule Compliance Managing Your Security Policies Chapter 13: Practical Checklist Crafting a Security Implementation Plan Background Some Points to Keep In Mind Conclusion Chapter 14: Practical Checklist Security Rule Compliance Checklist COVERED ENTITY ISSUES Healthcare Provider Issues Background Privacy Notices Fees for Record Review Mitigation Measures Fax Use Sign-In Sheets Patient Charts Business Associates Authorizations Chapter 16: Practical Checklist Healthcare Clearinghouse Issues Background Requirements Transactions Financial Institutions Conclusion Chapter 17: Practical Checklist Health Plan Issues What is a Health Plan? What is a Small Health Plan? Health Plan Requirements Marketing Issues Notice of Privacy Practices Types of Insurance Plans Excluded from HIPAA Communications Government and Law Enforcement Chapter 18: Practical Checklist Employer Issues Background "Small" and "Large" Employers Health Benefits Enforcement and Penalties Organizational Requirements Health Information Medical Surveillance Workers' Compensation Training Resources Conclusion Chapter 19: Practical Checklist Business Associate Issues Is Your Organization a Business Associate? Business Associate Requirements What You Can Expect to See or Hear from Covered Entities Issues to Consider Moving Forward Chapter 20: Practical Checklist HIPAA TECHNOLOGY CONSIDERATIONS Building a HIPAA Compliant Technology Infrastructure Overview Areas of Technology to Focus On Looking Deeper into Specific Technologies Mobile Computing Concerns Summary Chapter 21: Practical Checklist Crafting Security Incident Procedures and Contingency Plans Background Handling Security Incidents Security Incident Procedure Essentials Basics of Contingency Planning Moving Forward Chapter 22: Practical Checklist Outsourcing Information Technology Services Background Reasons to Consider Outsourcing What Functions to Outsource What to Look for in Outsourcing Firms Common Outsourcing Mistakes Chapter 23: Practical Checklist MANAGING ONGOING HIPAA COMPLIANCE HIPAA Training, Education, and Awareness Creating an Effective Awareness Program Identify Awareness and Training Groups Training Training Design and Development Awareness Options Document Training and Awareness Activities Get Support Measure Effectiveness Conclusion Chapter 24: Practical Checklist Performing Ongoing HIPAA Compliance Reviews and Audits Background Privacy Issues Security Issues Making Audits Work Chapter 25: Practical Checklist APPENDIXES HIPAA Case Studies: Experiences Shared Sample Documents HIPAA Resources Answers to Chapter Quizzes HIPAA Glossary