000 03111nam a22003617a 4500
999 _c29810
_d29810
001 64805
010 _a 2014395656
020 _a9781938904349
020 _a1938904346
040 _aTXI
082 0 4 _a005.8
245 0 0 _aImplementing information security in healthcare :
_bbuilding a security program
_cedited by Terrell W. Herzig, Tom Walsh, Lisa A. Gallagher
260 _aChicago, IL :
_bHIMSS,
_cc2013.
300 _axviii, 294 p. :
_bill. ;
_c26 cm.
504 _aIncludes bibliographical references and index.
505 0 _aThe importance of information security in healthcare -- Information security frameworks -- Information security planning -- Risk analysis -- Senior management oversight and involvement -- Information security regulations -- Security policy development -- The concept of security controls -- Access control -- Network security -- Use of encryption -- Managing mobile devices -- Application security -- Information security operations -- Security considerations in technology contracting -- Business continuity and disaster recovery -- Change control and change management -- Testing your technical controls -- Auditing your program -- Incident handling -- Information systems implementation.
520 _aImplementing Information Security in Healthcare: Building a Security Program offers a critical and comprehensive look at healthcare security concerns in an era of powerful computer technology, increased mobility, and complex regulations designed to protect personal information. Featuring perspectives from more than two dozen security experts, the book explores the tools and policies healthcare organizations need to build an effective and compliant security program. Topics include information security frameworks, risk analysis, senior management oversight and involvement, regulations, security policy development, access control, network security, encryption, mobile device management, disaster recovery, and more. Information security is a concept that has never been more important to healthcare as it is today. Special features include appendices outlining potential impacts of security objectives, technical security features by regulatory bodies (FISMA, HIPAA, PCI DSS and ISO 27000), common technical security features, and a sample risk rating chart.
650 0 _aMedical care
_xSecurity measures
_938662
650 0 _aMedical informatics
_xManagement
_915568
650 0 _aInformation storage and retrieval systems
_xMedicine
_xManagement
_938663
650 0 _aMedical records
_xElectronic information resources
_938664
650 0 _aComputer security
_9641
650 0 _aInformation networks
_xSecurity measures
_938665
650 1 2 _aHospital Administration
_938666
650 2 2 _aSafety Management
_912702
650 2 2 _aSecurity Measures
_938641
650 2 2 _aMedical Informatics
_95504
700 1 _aHerzig, Terrell W.,
_eEdited by
_938667
700 1 _aWalsh, Tom,
_eEdited by
_938668
700 1 _aGallagher, Lisa A.,
_eEdited by
_938669
856 _uhttps://uowd.box.com/s/txqrjlyxzuknfqfmikirkc6zqx0e9ip8
_zLocation Map
942 _cREGULAR
_2ddc