HIPAA Security Implementation, Version 1.0
| | | ||||||||||
| HIPAA Security Implementation, Version 1.0 | |
| by SAS Institute | ISBN:0974372722 |
| SANS Institute © 2003 (323 pages) | |
| Written for the IT staff in hospitals, this guide provides step-by-step direction on how to apply the required and addressable HIPAA Security implementation specifications into a comprehensive solution. | |
| Table of Contents | |||
| | HIPAA Security Implementation, Version 1.0 | ||
| | Preface | ||
| | Introduction | ||
| | Chapter 1 | - | HIPPA Past, Present, and Future |
| | Chapter 2 | - | HIPAA In Plain English |
| | Chapter 3 | - | Security Standards |
| | Chapter 4 | - | Overlaps Between Privacy and Security Rules |
| | Chapter 5 | - | Compliance and Enforcement |
| | Chapter 6 | - | Gap Analysis |
| | Chapter 7 | - | Justification |
| | Chapter 8 | - | Developing the Project Plan |
| | Chapter 9 | - | Budgeting the Plan |
| | Chapter 10 | - | Risk Analysis and Risk Management |
| | Chapter 11 | - | Administrative and Documentation Safeguards |
| | Chapter 12 | - | Physical Safeguards |
| | Chapter 13 | - | Technical Safeguards |
| | Chapter 14 | - | HIPAA Audit |
| | Chapter 15 | - | Continuing Compliance”Maintaining Security Best Practices for the Future |
| Appendices | |||
| | Glossary | ||
| | Appendix A | - | HIPAA Timelines |
| | Appendix B | - | HIPAA U.S. Code & CFR |
| | Appendix C | - | Recommended Hardware Configurations |
| | List of Figures | ||
| | List of Tables | ||