Click here for NICC Library Webpage
Login
My List - 0
Help
Search
My Account
ID Information
Calmar New Materials
Peosta New Materials
Advanced
Alphabetical
Basic
History
Search:
General Keyword
Title Keyword
Author Keyword
Subject Keyword
ISBN/ISSN Exact Match
ISBN/ISSN Browse
Serial Title Browse
Title Alphabetical
Subject Alphabetical
Author Alphabetical
Alphabetical Series
Barcode
Bib No.
Journal/Newspaper Title Browse
Series Keyword
Refine Search
> You're searching:
Northeast Iowa Community College
Item Information
Holdings
More by this author
Trinckes, John J., Jr., author.
Subjects
Health Information Management -- methods
Computer security
Electronic Health Records -- standards.
Medical Errors -- prevention & control.
Privacy
Medical records -- Access control.
Medical records -- Data processing
Krankenunterlagen
Datenschutz.
Privatsphäre.
Medical records -- Access control.
Medical records -- Data processing
United States
United States
Browse Catalog
by author:
Trinckes, John J., Jr., author.
by title:
How healthcare data ...
MARC Display
How healthcare data privacy is almost dead and what can be done to revive it! / John Trinckes, Jr.
by
Trinckes, John J., Jr., author.
Boca Raton : Taylor & Francis, 2017.
Description:
xxi, 306 pages : illustrations ; 24 cm.
Contents:
Code blue -- Privacy concerns -- Healthcare armageddon -- Victims -- Healthcare security -- Enforcement actions -- Privacy -- Clear.
Cover; Half Title; Title Page; Copyright Page; Table of Contents; FOREWORD; PREFACE; ACKNOWLEDGMENTS; AUTHOR; CONTRIBUTING AUTHOR; CHAPTER 1: CODE BLUE; Erroneous Information; Medical Identity Theft; Credit Troubles; Internet of Things; Medical Devices; FDA Draft Guidance; Hippocratic Oath for Connected Medical Devices; Cyber Independent Testing Laboratory; Privacy by Design; Ethical Design Manifesto; Open Web Application Security; Legal/Constitutional Issues; Fingerprints Are Not Protected by the Fifth Amendment; CHAPTER 2: PRIVACY CONCERNS; Information...information...everywhere
New Social Disorder Medical Records; De-Identification; Meaningful Use; 21st Century Cures Bill; Cybersecurity Information Sharing Act 2015 (CISA); Health Information Technologies Standards Committee; Improving Health Information Technology Act; Governmental Issues; Healthcare.gov; OPM Data Breach; Einstein Program; IRS; Telemedicine; NASA; Medical Information Is Highly Coveted; Ease of Obtaining Information; Security versus Privacy; Consumer Scores; CHAPTER 3: HEALTHCARE ARMAGEDDON; 2015 Year of the Hack: Medical Breaches; Another Search Engine to the Rescue; Hackers Are the Problem.
Patients Trust Healthcare The Standard Response; EU Doesn't Trust U.S. Privacy: Agreement Made; CHAPTER 4: VICTIMS; Costs; Identity Theft/Fraud; Tax Fraud; Healthcare Resources; Untold Victims; CHAPTER 5: HEALTHCARE SECURITY; Ignorance Is Bliss: State of Healthcare Security; Constructive Ambiguity and the HIPAA Regulations; State Requirements; California; Florida; Massachusetts; Nevada; Oregon; Texas; Privacy Culture; Not a Security Culture; All Stick and No Carrot; Resource Availability; Excuses; A Funny Thing Happened on the Way to Security...nothing; CHAPTER 6: ENFORCEMENT; OCR; Omnibus Rule.
Business Associate AgreementsONC; Office of Inspector General (OIG); State Attorney General; FTC; CMS; FCC; Class Action Lawsuits; Violation of Privacy; CHAPTER 7: PRIVACY & LEAR & Individual Rights; Withholding Medical Information; Privacy Platform; Put a Tourniquet On: Stop the Bleeding; Shock to the Industry; National Patient Identifier; Revive Security Posture; Preventive Medicine; Social Engineering; Monitoring; Anti-Malware; Multi-Factor Authentication; Data Loss Protection; Data Collection/Retention; Data Encryption; Incident Response Plan; Vendor Management.
Health Application Use Standards/Certification/Accreditation; CIS Critical Security Controls; NIST CsF; HITRUST; EHNAC; FHIR; Recovery; Cybersecurity Insurance; CHAPTER 8: SUMMARY; Message to the Board Room; Steely-Eyed Missile Man; Asking the Right Questions; Message to Chief Executive Officers; Message to the Legislators; Message to Private Citizens; Final Thoughts; REFERENCES; INDEX.
Summary:
The healthcare industry is under privacy attack. The book discusses the issues from the healthcare organization and individual perspectives. Someone hacking into a medical device and changing it is life-threatening. Personal information is available on the black market. And there are increased medical costs, erroneous medical record data that could lead to wrong diagnoses, insurance companies or the government data-mining healthcare information to formulate a medical 'FICO' score that could lead to increased insurance costs or restrictions of insurance. Experts discuss these issues and provide solutions and recommendations so that we can change course before a Healthcare Armageddon occurs.
Copy/Holding information
Location
Collection
Call No.
Copy
Status
Calmar Campus Library
Circulation Stacks (Calmar)
651.5 Tri
2017
Checked In
Add Copy to MyList
Format:
HTML
Plain text
Delimited
Subject:
Email to:
Horizon Information Portal 3.25_9807
© 2001-2013
SirsiDynix
All rights reserved.