Atjaunināt sīkdatņu piekrišanu

E-grāmata: How Healthcare Data Privacy Is Almost Dead ... and What Can Be Done to Revive It!

(Coalfire Systems, Inc., Westminster, Colorado, USA)
  • Formāts: 328 pages
  • Izdošanas datums: 27-Jan-2017
  • Izdevniecība: Auerbach Publishers Inc.
  • Valoda: eng
  • ISBN-13: 9781351982764
  • Formāts - PDF+DRM
  • Cena: 67,61 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: 328 pages
  • Izdošanas datums: 27-Jan-2017
  • Izdevniecība: Auerbach Publishers Inc.
  • Valoda: eng
  • ISBN-13: 9781351982764

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

The healthcare industry is under privacy attack. The book discusses the issues from the healthcare organization and individual perspectives. Someone hacking into a medical device and changing it is life-threatening. Personal information is available on the black market. And there are increased medical costs, erroneous medical record data that could lead to wrong diagnoses, insurance companies or the government data-mining healthcare information to formulate a medical ‘FICO’ score that could lead to increased insurance costs or restrictions of insurance. Experts discuss these issues and provide solutions and recommendations so that we can change course before a Healthcare Armageddon occurs.

Foreword ix
Preface xi
Acknowledgments xvii
Author xix
Contributing Author xxi
Chapter 1 Code Blue
1(46)
Erroneous Information
1(5)
Medical Identity Theft
6(3)
Credit Troubles
9(3)
Internet of Things
12(24)
Medical Devices
19(4)
FDA Draft Guidance
23(2)
Hippocratic Oath for Connected Medical Devices
25(2)
Cyber Independent Testing Laboratory
27(1)
Privacy by Design
28(2)
Ethical Design Manifesto
30(1)
Open Web Application Security
31(5)
Legal/Constitutional Issues
36(11)
Fingerprints Are Not Protected by the Fifth Amendment
43(4)
Chapter 2 Privacy Concerns
47(40)
Information... Information... Everywhere
47(5)
New Social Disorder
50(2)
Medical Records
52(15)
De-Identification
57(1)
Meaningful Use
58(1)
21st Century Cures Bill
59(2)
Cybersecurity Information Sharing Act 2015 (CISA)
61(5)
Health Information Technologies Standards Committee
66(1)
Improving Health Information Technology Act
66(1)
Governmental Issues
67(8)
Healthcare.gov
68(2)
OPM Data Breach
70(2)
Einstein Program
72(1)
IRS
72(3)
Telemedicine
75(3)
NASA
77(1)
Medical Information Is Highly Coveted
78(9)
Ease of Obtaining Information
81(1)
Security versus Privacy
82(1)
Consumer Scores
83(4)
Chapter 3 Healthcare Armageddon
87(16)
2015 Year of the Hack: Medical Breaches
87(3)
Another Search Engine to the Rescue
90(1)
Hackers Are the Problem
91(4)
Patients Trust Healthcare
95(2)
The Standard Response
97(2)
EU Doesn't Trust U.S. Privacy: Agreement Made
99(4)
Chapter 4 Victims
103(14)
Costs
103(4)
Identity Theft/Fraud
107(4)
Tax Fraud
111(1)
Healthcare Resources
112(1)
Untold Victims
113(4)
Chapter 5 Healthcare Security
117(44)
Ignorance Is Bliss: State of Healthcare Security
117(4)
Constructive Ambiguity and the HIPAA Regulations
121(3)
State Requirements
124(22)
California
124(4)
Florida
128(7)
Massachusetts
135(3)
Nevada
138(2)
Oregon
140(3)
Texas
143(3)
Privacy Culture; Not a Security Culture
146(3)
All Stick and No Carrot
149(1)
Resource Availability
150(4)
Excuses
154(2)
A Funny Thing Happened on the Way to Security... Nothing
156(5)
Chapter 6 Enforcement
161(38)
OCR
161(14)
Omnibus Rule
172(1)
Business Associate Agreements
173(2)
ONC
175(2)
Office of Inspector General (OIG)
177(4)
State Attorney General
181(1)
FTC
182(7)
CMS
189(3)
FCC
192(2)
Class Action Lawsuits
194(3)
Violation of Privacy
197(2)
Chapter 7 Privacy... Clear... <shock>
199(52)
Individual Rights
199(4)
Withholding Medical Information
203(1)
Privacy Platform
204(2)
Put a Tourniquet On: Stop the Bleeding
206(2)
Shock to the Industry
208(2)
National Patient Identifier
210(1)
Revive Security Posture
211(1)
Preventive Medicine
212(23)
Social Engineering
212(1)
Monitoring
213(3)
Anti-Malware
216(2)
Multi-Factor Authentication
218(2)
Data Loss Protection
220(1)
Data Collection/Retention
221(1)
Data Encryption
222(3)
Incident Response Plan
225(4)
Vendor Management
229(5)
Health Application Use
234(1)
Standards/Certification/Accreditation
235(6)
CIS Critical Security Controls
235(1)
NIST CsF
236(1)
HITRUST
237(2)
EHNAC
239(2)
FHIR
241(1)
Recovery
241(6)
Cybersecurity Insurance
247(4)
Chapter 8 Summary
251(14)
Message to the Board Room
251(1)
Steely-Eyed Missile Man
252(3)
Asking the Right Questions
255(2)
Message to Chief Executive Officers
257(2)
Message to the Legislators
259(2)
Message to Private Citizens
261(2)
Final Thoughts
263(2)
References 265(26)
Index 291
John Jay Trinckes, Jr., CISSP, CISM, CRISC, HITRUST CSF Practitioner, is Senior Practice Lead, Healthcare & Life Sciences, Coalfire Systems, Inc. He directs lead compliance efforts for Coalfire's healthcare clients. He heads up the healthcare practice for Coalfire Systems, Inc. Coalfire is the leading IT governance, risk, and compliance organization in the country. He helps its clients manage IT risk to ensure they are not subject to cyber-attack and help them validate their compliance with IT regulations such as HIPAA. Coalfire offers assessments, penetration tests and advisory services that drive our clients to better security and compliance. He is the author of the books, "The Executive MBA in Information Security" (2009) and "The Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules" (2012) published by CRC Press. He has a wide range of experience in computer networks, vulnerability and penetration testing, security, compliance, and risk assessment. He was also a former law enforcement officer in the state of Florida.