Muutke küpsiste eelistusi

E-raamat: How Healthcare Data Privacy Is Almost Dead ... and What Can Be Done to Revive It!

(Coalfire Systems, Inc., Westminster, Colorado, USA)
  • Formaat: 328 pages
  • Ilmumisaeg: 27-Jan-2017
  • Kirjastus: Auerbach Publishers Inc.
  • Keel: eng
  • ISBN-13: 9781351982757
  • Formaat - EPUB+DRM
  • Hind: 70,19 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 328 pages
  • Ilmumisaeg: 27-Jan-2017
  • Kirjastus: Auerbach Publishers Inc.
  • Keel: eng
  • ISBN-13: 9781351982757

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

The healthcare industry is under privacy attack. The book discusses the issues from the healthcare organization and individual perspectives. Someone hacking into a medical device and changing it is life-threatening. Personal information is available on the black market. And there are increased medical costs, erroneous medical record data that could lead to wrong diagnoses, insurance companies or the government data-mining healthcare information to formulate a medical ‘FICO’ score that could lead to increased insurance costs or restrictions of insurance. Experts discuss these issues and provide solutions and recommendations so that we can change course before a Healthcare Armageddon occurs.

Foreword ix
Preface xi
Acknowledgments xvii
Author xix
Contributing Author xxi
Chapter 1 Code Blue
1(46)
Erroneous Information
1(5)
Medical Identity Theft
6(3)
Credit Troubles
9(3)
Internet of Things
12(24)
Medical Devices
19(4)
FDA Draft Guidance
23(2)
Hippocratic Oath for Connected Medical Devices
25(2)
Cyber Independent Testing Laboratory
27(1)
Privacy by Design
28(2)
Ethical Design Manifesto
30(1)
Open Web Application Security
31(5)
Legal/Constitutional Issues
36(11)
Fingerprints Are Not Protected by the Fifth Amendment
43(4)
Chapter 2 Privacy Concerns
47(40)
Information... Information... Everywhere
47(5)
New Social Disorder
50(2)
Medical Records
52(15)
De-Identification
57(1)
Meaningful Use
58(1)
21st Century Cures Bill
59(2)
Cybersecurity Information Sharing Act 2015 (CISA)
61(5)
Health Information Technologies Standards Committee
66(1)
Improving Health Information Technology Act
66(1)
Governmental Issues
67(8)
Healthcare.gov
68(2)
OPM Data Breach
70(2)
Einstein Program
72(1)
IRS
72(3)
Telemedicine
75(3)
NASA
77(1)
Medical Information Is Highly Coveted
78(9)
Ease of Obtaining Information
81(1)
Security versus Privacy
82(1)
Consumer Scores
83(4)
Chapter 3 Healthcare Armageddon
87(16)
2015 Year of the Hack: Medical Breaches
87(3)
Another Search Engine to the Rescue
90(1)
Hackers Are the Problem
91(4)
Patients Trust Healthcare
95(2)
The Standard Response
97(2)
EU Doesn't Trust U.S. Privacy: Agreement Made
99(4)
Chapter 4 Victims
103(14)
Costs
103(4)
Identity Theft/Fraud
107(4)
Tax Fraud
111(1)
Healthcare Resources
112(1)
Untold Victims
113(4)
Chapter 5 Healthcare Security
117(44)
Ignorance Is Bliss: State of Healthcare Security
117(4)
Constructive Ambiguity and the HIPAA Regulations
121(3)
State Requirements
124(22)
California
124(4)
Florida
128(7)
Massachusetts
135(3)
Nevada
138(2)
Oregon
140(3)
Texas
143(3)
Privacy Culture; Not a Security Culture
146(3)
All Stick and No Carrot
149(1)
Resource Availability
150(4)
Excuses
154(2)
A Funny Thing Happened on the Way to Security... Nothing
156(5)
Chapter 6 Enforcement
161(38)
OCR
161(14)
Omnibus Rule
172(1)
Business Associate Agreements
173(2)
ONC
175(2)
Office of Inspector General (OIG)
177(4)
State Attorney General
181(1)
FTC
182(7)
CMS
189(3)
FCC
192(2)
Class Action Lawsuits
194(3)
Violation of Privacy
197(2)
Chapter 7 Privacy... Clear... <shock>
199(52)
Individual Rights
199(4)
Withholding Medical Information
203(1)
Privacy Platform
204(2)
Put a Tourniquet On: Stop the Bleeding
206(2)
Shock to the Industry
208(2)
National Patient Identifier
210(1)
Revive Security Posture
211(1)
Preventive Medicine
212(23)
Social Engineering
212(1)
Monitoring
213(3)
Anti-Malware
216(2)
Multi-Factor Authentication
218(2)
Data Loss Protection
220(1)
Data Collection/Retention
221(1)
Data Encryption
222(3)
Incident Response Plan
225(4)
Vendor Management
229(5)
Health Application Use
234(1)
Standards/Certification/Accreditation
235(6)
CIS Critical Security Controls
235(1)
NIST CsF
236(1)
HITRUST
237(2)
EHNAC
239(2)
FHIR
241(1)
Recovery
241(6)
Cybersecurity Insurance
247(4)
Chapter 8 Summary
251(14)
Message to the Board Room
251(1)
Steely-Eyed Missile Man
252(3)
Asking the Right Questions
255(2)
Message to Chief Executive Officers
257(2)
Message to the Legislators
259(2)
Message to Private Citizens
261(2)
Final Thoughts
263(2)
References 265(26)
Index 291
John Jay Trinckes, Jr., CISSP, CISM, CRISC, HITRUST CSF Practitioner, is Senior Practice Lead, Healthcare & Life Sciences, Coalfire Systems, Inc. He directs lead compliance efforts for Coalfire's healthcare clients. He heads up the healthcare practice for Coalfire Systems, Inc. Coalfire is the leading IT governance, risk, and compliance organization in the country. He helps its clients manage IT risk to ensure they are not subject to cyber-attack and help them validate their compliance with IT regulations such as HIPAA. Coalfire offers assessments, penetration tests and advisory services that drive our clients to better security and compliance. He is the author of the books, "The Executive MBA in Information Security" (2009) and "The Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules" (2012) published by CRC Press. He has a wide range of experience in computer networks, vulnerability and penetration testing, security, compliance, and risk assessment. He was also a former law enforcement officer in the state of Florida.