The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition

  • 6h 5m
  • Kevin Beaver, Rebecca Herold
  • CRC Press
  • 2015

Following in the footsteps of its bestselling predecessor, Practical Guide to HIPAA Privacy and Security Compliance, Second Edition is a one-stop, up-to-date resource on Health Insurance Portability and Accountability Act (HIPAA) privacy and security, including details on the HITECH Act, the 2013 Omnibus Rule, and the pending rules. Updated and revised with several new sections, this edition defines what HIPAA is, what it requires, and what you need to do to achieve compliance.

The book provides an easy-to-understand overview of HIPAA privacy and security rules and compliance tasks. Supplying authoritative insights into real-world HIPAA privacy and security issues, it summarizes the analysis, training, and technology needed to properly plan and implement privacy and security policies, training, and an overall program to manage information risks. Instead of focusing on technical jargon, the book spells out what your organization must do to achieve and maintain compliance requirements on an ongoing basis.

About the Authors

Kevin Beaver is an independent information security consultant, writer, professional speaker, and expert witness with Atlanta, Georgia based Principle Logic, LLC. He has worked in IT since 1989 and specializes in performing information security assessments for corporations, security product vendors, independent software developers, universities, government agencies, and nonprofit organizations. Before starting his information security consulting practice in 2001, Kevin served in various information technology and security roles for several health care, e-commerce, financial, and educational institutions.

Kevin has appeared on CNN as an information security expert and has been quoted in The Wall Street Journal, Entrepreneur, Fortune Small Business, Men’s Health, Women’s Health, Woman’s Day, and Inc. Magazine. His work has also been referenced by the PCI Security Standards Council in their PCI DSS Wireless Guidelines. He has given and participated in hundreds of highly rated presentations, panel discussions, seminars, and webcasts on information security and compliance.

Kevin has authored or coauthored 11 information security books, including Hacking For Dummies and Hacking Wireless Networks For Dummies (Wiley) as well as Implementation Strategies for Fulfilling and Maintaining IT Compliance (Realtimepublishers.com). He has written dozens of whitepapers and hundreds of articles and guest blog posts, and he is a regular contributor to SearchSecurity.com, SearchEnterpriseDesktop.com, SearchWindowsServer.com, and Security Technology Executive magazine.

Kevin is the creator and producer of the On audiobooks, which provide security learning for IT professionals on the go (securityonwheels.com) and its associated blog (securityonwheels.com/blog). He also covers information security and related matters on Twitter (@kevinbeaver) and YouTube (PrincipleLogic). He earned his bachelor’s degree in computer engineering technology from Southern College of Technology and his master’s degree in management of technology from Georgia Tech. He obtained his CISSP certification in 2001 and also holds MCSE, Master CNE, and IT Project+ certifications.

Rebecca Herold has over 25 years of information privacy, security, and compliance expertise. She is CEO of Privacy Professor® and is a partner for Compliance Helper®. She has led the NIST SGIP Smart Grid Privacy Subgroup since June 2009. She has been an adjunct professor for the Norwich University Master of Science in Information Security and Assurance (MSISA) program since 2005. She has written 17 books and hundreds of published articles. She has been invited to speak at a wide variety of events throughout the United States, and in other worldwide locations such as Melbourne, Australia; Bogotá, Colombia; and Naas, County Kildare, Ireland.

Rebecca is widely recognized and respected, and has been providing information privacy, security, and compliance services, tools, and products to organizations in an extensive range of industries for over two decades. Just a few of her awards and recognitions include the following:

  • Rebecca was ranked #2 in the "Top 25 Female Infosec Leaders to Follow on Twitter" in 2014 by Information Security Buzz.
  • Rebecca was named to the ISACA International Privacy Task Force in 2013.
  • Rebecca was named on Tripwire’s list of "InfoSec’s Rising Stars and Hidden Gems: The Top 15 Educators" in July 2013.
  • Rebecca was ranked #5 in the "Top 25 Female Infosec Leaders to Follow on Twiter" in 2013 by Information Security Buzz.
  • Rebecca has been named one of the "Best Privacy Advisers in the World" multiple times in recent years by Computerworld magazine, most recently ranking third in the world in the last rankings provided.
  • In 2012, Rebecca was named one of the most influential people and groups in online privacy by Techopedia.com.
  • In 2012, Rebecca was named a Privacy by Design Ambassador by the Ontario, Canada Data Privacy Commissioner.

Rebecca is a partner for the Compliance Helper services for health-care organizations and their business associates to meet their HIPAA, HITECH, and other legal requirements. She is a member of the IAPP Certification Advisory Board, and is an instructor for the IAPP’s CIPM, CIPP/IT, CIPP/US, and CIPP foundations classes.

Rebecca currently serves on multiple advisory boards for security, privacy, and high-tech technology organizations. She is frequently interviewed and quoted in diverse broadcasts and publications such as IAPP Privacy Advisor, BNA Privacy & Security Law Report, Wired, Popular Science, Computerworld, IEEE’s Security and Privacy Journal, NPR, and many others. She regularly appears on the Des Moines, Iowa-based Great Day morning television program on KCWI to discuss and provide advice for information security and privacy topics.

See more about Rebecca, her work, services, and products at:

  • The Privacy Professor (privacyguidance.com and privacyprofessor.org)
  • Co-Owner, CPO, and CISO, SIMBUS (hipaacompliance.org)
  • Partner, Compliance Helper (compliancehelper.com)
  • Adjunct Professor for the Norwich University Master of Science in Information Security and Assurance (MSISA) program (infoassurance.norwich.edu/)
  • Twitter ID: @PrivacyProf

In this Book

  • The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition
  • Foreword
  • Preface
  • Introduction to HIPAA
  • Related Regulations, Laws, Standards, and Guidance
  • Preparing for HIPAA, HITECH and Other Compliance Changes
  • HIPAA Cost Considerations
  • Relationship between Security and Privacy
  • HIPAA Privacy Rule Requirements Overview
  • Performing a Privacy Rule Gap Analysis and Risk Analysis
  • Writing Effective Privacy Policies
  • State Preemption
  • Crafting a Privacy Implementation Plan
  • Privacy Rule Compliance Checklist
  • Security Rule Requirements Overview
  • Performing a Security Rule Risk Analysis
  • Writing Effective Information Security Policies
  • Crafting a Security Implementation Plan
  • Security Rule Compliance Checklist
  • Health care Provider Issues
  • Health care Clearinghouse Issues
  • Health Plan Issues
  • Employer Issues
  • Business Associate Issues
  • Building a HIPAA-Compliant Technology Infrastructure
  • Crafting Security Incident Procedures and Contingency Plans
  • Outsourcing Information Technology Services
  • HIPAA Training, Education, and Awareness
  • Performing Ongoing HIPAA Compliance Reviews and Audits
  • Enforcement and Sanctions
  • HIPAA Glossary
  • Model Incident and Privacy Response Procedures
  • HIPAA Resources
  • References
  • Further Reading
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

Rating 4.6 of 61 users Rating 4.6 of 61 users (61)
Rating 4.7 of 27 users Rating 4.7 of 27 users (27)
Rating 4.3 of 23 users Rating 4.3 of 23 users (23)