Handbook for HIPAA-HITECH Security 2nd Edition by AMA

Guide details the final regulations brought about by HITECH changes to the HIPAA security rule and to the privacy rule as it applies to security. This essential guide will help you learn practical and pragmatic ways to interpret the new regulations and ensure compliance.
Read Full Description

  • Your Price: $49.95

Order by purchase order

  • Item#: OP320612
  • Edition: Edition
  • Format: 7" x 10" Softbound w/ CD-ROM
  • ISBN#: 978-1-60359-801-9
  • Availability: In Stock
  • Product Notes:
  • Usually ships in 48 hours.

Helps enhance your understanding of HIPAA-HITECH security rule requirements.

Handbook for HIPAA-HITECH Security, second edition details the final regulations brought about by HITECH changes to the HIPAA security rule and to the privacy rule as it applies to security. This essential guide will help you learn practical and pragmatic ways to interpret the new regulations and ensure compliance.

The handbook and accompanying CD-ROM enable health care professionals to successfully implement the systems necessary to establish and maintain the latest requirements. This new edition of a favorite AMA publication offers even more support, including:

  • Case Studies - Enhance your understanding of health information technology and the electronic health record
  • Question and Answer Sections - Test the comprehension of you and your staff on all of the important security concepts
  • Policy Templates and Other Tools (CD-ROM) - Quick accessibility to helpful documents
  • Customizable Tables and Checklists (CD-ROM) - Effectively document the evidence of your compliance activities

Ten chapters, four appendixes, and a glossary cover such topics as:

  • The importance of information security
  • An overview of the HIPAA security rule
  • A plan of action to achieve and maintain security
  • Organizational relationships
  • Documentation requirements and management
  • Risk analysis
  • Administrative, physical, and technical safeguards
  • Business associate relationships, contracts, and agreements
  • Web site security, remote access, passwords, and encryption
  • Application of security controls

There are no product reviews at this time. Be the first to review this product.