Click here for NICC Library Webpage
Click here for NICC Library Webpage
 Search 
 My Account 
 ID Information 
 Calmar New Materials 
 Peosta New Materials 
   
Advanced AlphabeticalBasicHistory
Search:    Refine Search  
> You're searching: Northeast Iowa Community College
 
Item Information
 HoldingsHoldings
 
 
 More by this author
 
  •  
  • Trinckes, John J., Jr., author.
     
     Subjects
     
  •  
  • Health Information Management -- methods
     
  •  
  • Computer security
     
  •  
  • Electronic Health Records -- standards.
     
  •  
  • Medical Errors -- prevention & control.
     
  •  
  • Privacy
     
  •  
  • Medical records -- Access control.
     
  •  
  • Medical records -- Data processing
     
  •  
  • Krankenunterlagen
     
  •  
  • Datenschutz.
     
  •  
  • Privatsphäre.
     
  •  
  • Medical records -- Access control.
     
  •  
  • Medical records -- Data processing
     
  •  
  • United States
     
  •  
  • United States
     
     Browse Catalog
      by author:
     
  •  
  •  Trinckes, John J., Jr., author.
     
      by title:
     
  •  
  •  How healthcare data ...
     
     
     
     MARC Display
    How healthcare data privacy is almost dead and what can be done to revive it! / John Trinckes, Jr.
    by Trinckes, John J., Jr., author.
    Boca Raton : Taylor & Francis, 2017.
    Description: 
    xxi, 306 pages : illustrations ; 24 cm.
    Contents: 
    Code blue -- Privacy concerns -- Healthcare armageddon -- Victims -- Healthcare security -- Enforcement actions -- Privacy -- Clear.
    Cover; Half Title; Title Page; Copyright Page; Table of Contents; FOREWORD; PREFACE; ACKNOWLEDGMENTS; AUTHOR; CONTRIBUTING AUTHOR; CHAPTER 1: CODE BLUE; Erroneous Information; Medical Identity Theft; Credit Troubles; Internet of Things; Medical Devices; FDA Draft Guidance; Hippocratic Oath for Connected Medical Devices; Cyber Independent Testing Laboratory; Privacy by Design; Ethical Design Manifesto; Open Web Application Security; Legal/Constitutional Issues; Fingerprints Are Not Protected by the Fifth Amendment; CHAPTER 2: PRIVACY CONCERNS; Information...information...everywhere
    New Social Disorder Medical Records; De-Identification; Meaningful Use; 21st Century Cures Bill; Cybersecurity Information Sharing Act 2015 (CISA); Health Information Technologies Standards Committee; Improving Health Information Technology Act; Governmental Issues; Healthcare.gov; OPM Data Breach; Einstein Program; IRS; Telemedicine; NASA; Medical Information Is Highly Coveted; Ease of Obtaining Information; Security versus Privacy; Consumer Scores; CHAPTER 3: HEALTHCARE ARMAGEDDON; 2015 Year of the Hack: Medical Breaches; Another Search Engine to the Rescue; Hackers Are the Problem.
    Patients Trust Healthcare The Standard Response; EU Doesn't Trust U.S. Privacy: Agreement Made; CHAPTER 4: VICTIMS; Costs; Identity Theft/Fraud; Tax Fraud; Healthcare Resources; Untold Victims; CHAPTER 5: HEALTHCARE SECURITY; Ignorance Is Bliss: State of Healthcare Security; Constructive Ambiguity and the HIPAA Regulations; State Requirements; California; Florida; Massachusetts; Nevada; Oregon; Texas; Privacy Culture; Not a Security Culture; All Stick and No Carrot; Resource Availability; Excuses; A Funny Thing Happened on the Way to Security...nothing; CHAPTER 6: ENFORCEMENT; OCR; Omnibus Rule.
    Business Associate AgreementsONC; Office of Inspector General (OIG); State Attorney General; FTC; CMS; FCC; Class Action Lawsuits; Violation of Privacy; CHAPTER 7: PRIVACY & LEAR & Individual Rights; Withholding Medical Information; Privacy Platform; Put a Tourniquet On: Stop the Bleeding; Shock to the Industry; National Patient Identifier; Revive Security Posture; Preventive Medicine; Social Engineering; Monitoring; Anti-Malware; Multi-Factor Authentication; Data Loss Protection; Data Collection/Retention; Data Encryption; Incident Response Plan; Vendor Management.
    Health Application Use Standards/Certification/Accreditation; CIS Critical Security Controls; NIST CsF; HITRUST; EHNAC; FHIR; Recovery; Cybersecurity Insurance; CHAPTER 8: SUMMARY; Message to the Board Room; Steely-Eyed Missile Man; Asking the Right Questions; Message to Chief Executive Officers; Message to the Legislators; Message to Private Citizens; Final Thoughts; REFERENCES; INDEX.
    Summary: 
    The healthcare industry is under privacy attack. The book discusses the issues from the healthcare organization and individual perspectives. Someone hacking into a medical device and changing it is life-threatening. Personal information is available on the black market. And there are increased medical costs, erroneous medical record data that could lead to wrong diagnoses, insurance companies or the government data-mining healthcare information to formulate a medical 'FICO' score that could lead to increased insurance costs or restrictions of insurance. Experts discuss these issues and provide solutions and recommendations so that we can change course before a Healthcare Armageddon occurs.
    Add to my list 
    Copy/Holding information
    LocationCollectionCall No.CopyStatus 
    Calmar Campus LibraryCirculation Stacks (Calmar)651.5 Tri2017Checked InAdd Copy to MyList

    Format:HTMLPlain textDelimited
    Subject: 
    Email to:


    Horizon Information Portal 3.25_9807
     Powered by SirsiDynix
    © 2001-2013 SirsiDynix All rights reserved.
    Horizon Information Portal