Stedman's Guide to the HIPAA Privacy & Security Rules

Stedmans Guide to the HIPAA Privacy 9781608310531
Rights Link

Publication Date: Jan 31, 2011
Availability: IN STOCK
Format: Book
Edition: Second
ISBN/ISSN: 9781608310531
Quantity
Promotion Code
Apply
 

Description

Addressing the needs of all health information management  professionals, from medical transcriptionists, coders, and billers to medical office administrators and managers, Stedman's Guide to the HIPAA Privacy & Security Rules has been completely revised to include not only the Security Rule, but also the new HITECH Act passed in 2009. Writing in a lively, engaging style, Kathy Nicholls cuts through the daunting legalese and gets right to the core of each relevant piece of legislation, clearly and concisely explaining the meaning and purpose of the law, while also providing clean, easy-to-follow checklists for compliance. Helpful hints and key items are pulled out and highlighted for ease of studying and retention, and real-world stories anchor the legal information in the real world of healthcare information, demonstrating both the necessity and the application of the law, and enlivening the material. An FAQ section at the end is a handy reference as students move into the professional world, and as professionals need a refresher on key questions. The online resources include dozens of sample forms that can be modified to suit the user's needs. This concise, clear guide explains even the most complicated of the HIPAA legislation in terms that are easy to understand and relevant to students and professionals responsible for safeguarding the privacy and integrity of healthcare information.

Features

--More than 50 sample templates and policies provide a base for developing your own policies to incorporate into your practice to ensure that you are in compliance.
--Chapter Objectives identify the most important concepts covered in the chapter.
--Case Studies provide vignettes of real-world applications to emphasize the practical application of the law.
--Summary Boxes highlight key issues for more focused study.
--Illustrations help make complicated topics more accessible and easier to understand.
--Critical thinking questions at the end of each chapter challenge you to contemplate and apply the information you've learned; answers are provided so you can check your understanding.
--Glossary of key terms, including acronyms and abbreviations, serves as a valuable learning tool and ready reference.
--A list of industry resources serves as a valuable tool for staying current on these vital issues.

          

About the Author(s)

Specs

  • Edition: Second
  • Product Format: Softbound
  • ISBN: 9781608310531
  • Trim Size: 6 x 9
  • Pages: 256
  • Pub Date: Jan 31, 2011
  • Weight: 1.0

Table of contents

Chapter 1: Introduction to HIPAA and the Privacy and Security Rules Introduction What Is HIPAA? The Privacy and Security Rules Terminology General Terminology in Healthcare Significant Points Compliance Deadlines The Bottom Line Apply It Answers to Apply It Chapter 2: The Privacy and Security Rules and Healthcare Documentation Introduction What Does the Privacy Rule Really Do? What Does the Security Rule Really Do? Privacy for Protected Health Information Is the Goal! What Constitutes Protected Health Information? Who Must Comply and How Does Compliance Impact the Work Setting? State Laws Application of the Privacy Rule in Healthcare Documentation Policies and Procedures Training Use and Disclosure Minimally Necessary Information Access Control De-identified Information Confidentiality Agreements Computer Security Work Areas Transfer of Data Destruction of Hard Copy Protected Health Information Use of the Fax Use of E-Mail Disaster Recovery Offsite Workers Storage and Retention Audit Trails Termination Procedures Recycling of Computers Access to PHI for Educational Purposes Vendors Breaches Complaints Penalties Enforcement HIPAA for the Independent Contractor Are You a Business Associate? General Requirements The Bottom Line Apply It Answers to Apply It Chapter 3: A Blueprint for Compliance with the Privacy Rule Introduction Where Do I Start? Gap Analysis Checklist Vendor Compliance Checklist Training Checklist What Policies Do I Need? Privacy Officer Policy Policy for the Use of Protected Health Information Policy for the Use of Protected Health Information in Quality Assurance and Educational Programs Training Policy Computer Security Policy Policy for Confidentiality Agreements Policy for Work Area Arrangements Access Policy for Digital Dictation Systems Policy for the Use of Hard Copy Protected Health Information Policy for the Use of the Fax Machine Disaster Recovery Policy Policy for Offsite Medical Transcriptionists Termination Policy Breaches and Sanctions Policies Complaint Policy Vendor Policy Policies for Business Associates Sample Contracts and Agreements Policy for Subcontractors Policy for Offshore Contractors A Word About Disclosures What About Indemnification? The Bottom Line Apply It Answers to Apply It Chapter 4: The Security Rule and Healthcare Documentation Introduction What Does the Security Rule Really do? What Constitutes Protected Health Information? Who Must Comply and How Does Compliance Impact the Work Settings? State Laws Application of the Security Rule Administrative Safeguards Physical Safeguards Technical Safeguards Organizational Requirements Policies and Procedures and Documentation Penalties Enforcement HIPAA For the Independent Contractor Are You a Business Associate? Chapter 5: A Blueprint for Compliance with the Security Rule Introduction Administrative Safeguards Security Management Process Assigned Security Responsibility Workforce Security Information Access Management Security Awareness and Training Security Incidents Contingency Plans Evaluation Business Associate Contracts and Other Arrangements Physical Safeguards Facility Access Control Workstation Use Workstation Security Device and Media Controls Technical Safeguards Access Control Audit Controls Integrity Person or Entity Authentication Transmission Security Organizational Requirements Business Associate Contracts and Other Arrangements Requirements for Group Health Plans Policies and Procedures and Documentation Requirements Policies and Procedures Documentation A Final Note on Security Chapter 6: Frequently Asked Questions Appendix A: Industry Resources Appendix B: AAMT Paper on Special Considerations for Offsite Medical Transcriptionists Appendix C: Abbreviations and Acronyms Glossary Index