Stedman's Guide to the HIPAA Privacy & Security Rules

Stedman's Guide to the HIPAA Privacy & Security Rules

Author(s):
Quantity:
Publication Date: 2011
Availability: In Stock
Format:
ISBN/ISSN: 9781608310531

Description

Addressing the needs of all health information management  professionals, from medical transcriptionists, coders, and billers to medical office administrators and managers, Stedman's Guide to the HIPAA Privacy & Security Rules has been completely revised to include not only the Security Rule, but also the new HITECH Act passed in 2009. Writing in a lively, engaging style, Kathy Nicholls cuts through the daunting legalese and gets right to the core of each relevant piece of legislation, clearly and concisely explaining the meaning and purpose of the law, while also providing clean, easy-to-follow checklists for compliance. Helpful hints and key items are pulled out and highlighted for ease of studying and retention, and real-world stories anchor the legal information in the real world of healthcare information, demonstrating both the necessity and the application of the law, and enlivening the material. An FAQ section at the end is a handy reference as students move into the professional world, and as professionals need a refresher on key questions. The online resources include dozens of sample forms that can be modified to suit the user's needs. This concise, clear guide explains even the most complicated of the HIPAA legislation in terms that are easy to understand and relevant to students and professionals responsible for safeguarding the privacy and integrity of healthcare information.
Rights Link

--More than 50 sample templates and policies provide a base for developing your own policies to incorporate into your practice to ensure that you are in compliance.
--Chapter Objectives identify the most important concepts covered in the chapter.
--Case Studies provide vignettes of real-world applications to emphasize the practical application of the law.
--Summary Boxes highlight key issues for more focused study.
--Illustrations help make complicated topics more accessible and easier to understand.
--Critical thinking questions at the end of each chapter challenge you to contemplate and apply the information you've learned; answers are provided so you can check your understanding.
--Glossary of key terms, including acronyms and abbreviations, serves as a valuable learning tool and ready reference.
--A list of industry resources serves as a valuable tool for staying current on these vital issues.

          


Edition: 2
ISBN/ISSN: 9781608310531
Product Format: Softbound
Trim Size: 6 x 9
Pages: 256
Pub Date: 2011
Weight: 0.8
Chapter 1: Introduction to HIPAA and the Privacy and Security Rules
Introduction
What Is HIPAA?
The Privacy and Security Rules
Terminology
General Terminology in Healthcare
Significant Points
Compliance Deadlines
The Bottom Line
Apply It
Answers to Apply It

Chapter 2: The Privacy and Security Rules and Healthcare Documentation
Introduction
What Does the Privacy Rule Really Do?
What Does the Security Rule Really Do?
Privacy for Protected Health Information Is the Goal!
What Constitutes Protected Health Information?
Who Must Comply and How Does Compliance Impact the Work Setting?
State Laws
Application of the Privacy Rule in Healthcare Documentation
Policies and Procedures
Training
Use and Disclosure
Minimally Necessary Information
Access Control
De-identified Information
Confidentiality Agreements
Computer Security
Work Areas
Transfer of Data
Destruction of Hard Copy
Protected Health Information
Use of the Fax
Use of E-Mail
Disaster Recovery
Offsite Workers
Storage and Retention
Audit Trails
Termination Procedures
Recycling of Computers
Access to PHI for Educational Purposes
Vendors
Breaches
Complaints
Penalties
Enforcement
HIPAA for the Independent Contractor
Are You a Business Associate?
General Requirements
The Bottom Line
Apply It
Answers to Apply It

Chapter 3: A Blueprint for Compliance with the Privacy Rule
Introduction
Where Do I Start?
Gap Analysis Checklist
Vendor Compliance Checklist
Training Checklist
What Policies Do I Need?
Privacy Officer Policy
Policy for the Use of Protected Health Information
Policy for the Use of Protected Health Information in Quality
Assurance and Educational Programs
Training Policy
Computer Security Policy
Policy for Confidentiality Agreements
Policy for Work Area Arrangements
Access Policy for Digital Dictation Systems
Policy for the Use of Hard Copy Protected Health Information
Policy for the Use of the Fax Machine
Disaster Recovery Policy
Policy for Offsite Medical Transcriptionists
Termination Policy
Breaches and Sanctions Policies
Complaint Policy
Vendor Policy
Policies for Business Associates
Sample Contracts and Agreements
Policy for Subcontractors
Policy for Offshore Contractors
A Word About Disclosures
What About Indemnification?
The Bottom Line
Apply It
Answers to Apply It

Chapter 4: The Security Rule and Healthcare Documentation
Introduction
What Does the Security Rule Really do?
What Constitutes Protected Health Information?
Who Must Comply and How Does Compliance Impact the Work Settings?
State Laws
Application of the Security Rule
Administrative Safeguards
Physical Safeguards
Technical Safeguards
Organizational Requirements
Policies and Procedures and Documentation
Penalties
Enforcement
HIPAA For the Independent Contractor
Are You a Business Associate?

Chapter 5: A Blueprint for Compliance with the Security Rule
Introduction
Administrative Safeguards
Security Management Process
Assigned Security Responsibility
Workforce Security
Information Access Management
Security Awareness and Training
Security Incidents
Contingency Plans
Evaluation
Business Associate Contracts and Other Arrangements
Physical Safeguards
Facility Access Control
Workstation Use
Workstation Security
Device and Media Controls
Technical Safeguards
Access Control
Audit Controls
Integrity
Person or Entity Authentication
Transmission Security
Organizational Requirements
Business Associate Contracts and Other Arrangements
Requirements for Group Health Plans
Policies and Procedures and Documentation Requirements
Policies and Procedures Documentation
A Final Note on Security

Chapter 6: Frequently Asked Questions
 
Appendix A: Industry Resources
Appendix B: AAMT Paper on Special Considerations for Offsite Medical Transcriptionists
Appendix C: Abbreviations and Acronyms
 
Glossary
Index

 

Server : PROD-ECOMM1 | Session : nl5fndwoa34zusdv1zymq40f | Client IP : 174.129.76.87 | Build : 1.4.0.473