|
|
|
|
LEADER |
04029cam a22005537i 4500 |
001 |
MUB03000004860 |
003 |
CZ BrMU |
005 |
20230725115850.0 |
008 |
180803t20152015xxu|||||o|||||||||||eng d |
STA |
|
|
|a EIZ
|b 333
|c EBSCO trvale nakupy
|d 2018-07-31
|
020 |
|
|
|a 978-1-4398-5559-1
|q (eBook - PDF)
|
035 |
|
|
|a (OCoLC)ocn892491827
|
035 |
|
|
|a (OCoLC)892491827
|z (OCoLC)897069474
|z (OCoLC)897886020
|
040 |
|
|
|a VLB
|b cze
|e rda
|c VLB
|d VLB
|d YDXCP
|d N$T
|d OCLCQ
|d OCLCF
|d UKMGB
|d S4S
|d EBLCP
|d DEBSZ
|d MERUC
|d BOD034
|
072 |
|
7 |
|a 364.3
|x Sociální pojištění. Zdravotní pojištění. Důchody
|2 Konspekt
|9 18
|
080 |
|
|
|a 364.32
|2 MRF
|
080 |
|
|
|a (73)
|2 MRF
|
100 |
1 |
|
|a Herold, Rebecca
|4 aut
|
245 |
1 |
4 |
|a The practical guide to HIPAA privacy and security compliance /
|c Rebecca Herold and Kevin Beaver
|
246 |
3 |
0 |
|a HIPAA privacy and security compliance
|
250 |
|
|
|a Second edition
|
264 |
|
1 |
|a Boca Raton :
|b CRC Press,
|c [2015]
|
264 |
|
4 |
|c ©2015
|
300 |
|
|
|a 1 online zdroj (xxx, 498 stran)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a počítač
|b c
|2 rdamedia
|
338 |
|
|
|a online zdroj
|b cr
|2 rdacarrier
|
505 |
0 |
|
|a Front Cover; Contents; Foreword; Preface; Authors ; Chapter 1: Introduction to HIPAA; Chapter 2: Related Regulations, Laws, Standards, and Guidance; Chapter 3: Preparing for HIPAA, HITECH, and Other Compliance Changes; Chapter 4: HIPAA Cost Considerations; Chapter 5: Relationship between Security and Privacy; Chapter 6: HIPAA Privacy Rule Requirements Overview; Chapter 7: Performing a Privacy Rule Gap Analysis and Risk Analysis; Chapter 8: Writing Effective Privacy Policies; Chapter 9: State Preemption; Chapter 10: Crafting a Privacy Implementation Plan.
|
505 |
8 |
|
|a Chapter 11: Privacy Rule Compliance ChecklistChapter 12: Security Rule Requirements Overview; Chapter 13: Performing a Security Rule Risk Analysis; Chapter 14: Writing Effective Information Security Policies; Chapter 15: Crafting a Security Implementation Plan; Chapter 16: Security Rule Compliance Checklist; Chapter 17: Health Care Provider Issues; Chapter 18: Health Care Clearinghouse Issues; Chapter 19: Health Plan Issues; Chapter 20: Employer Issues; Chapter 21: Business Associate Issues; Chapter 22: Building a HIPAA-Compliant Technology Infrastructure.
|
505 |
8 |
|
|a Chapter 23: Crafting Security Incident Procedures and Contingency PlansChapter 24: Outsourcing Information Technology Services; Chapter 25: HIPAA Training, Education, and Awareness; Chapter 26: Performing Ongoing HIPAA Compliance Reviews and Audits; Appendix A: Enforcement and Sanctions; Appendix B: HIPAA Glossary; Appendix C: Model Incident and Privacy Response Procedures; Appendix D: HIPAA Resources; References; Further Reading; Back Cover.
|
533 |
|
|
|a Elektronická reprodukce.
|n Přístup pouze pro oprávněné uživatele
|
650 |
0 |
7 |
|a zákon o převoditelnosti a povinném vyúčtování zdravotního pojištění (USA)
|2 czmesh
|
650 |
0 |
2 |
|a Health Insurance Portability and Accountability Act
|
655 |
|
7 |
|a e-knihy online
|2 CZ-BrMU
|
655 |
|
9 |
|a e-books online
|2 eCZ-BrMU
|
700 |
1 |
|
|a Beaver, Kevin
|7 utb2009515926
|4 aut
|
776 |
0 |
8 |
|i Tištěná verze:
|t Practical guide to HIPAA privacy and security compliance
|z 978-1-4398-5558-4
|
856 |
4 |
1 |
|z Elektronická verze přístupná pouze pro studenty a pracovníky MU
|u https://ezproxy.muni.cz/login?url=https://search.ebscohost.com/login.aspx?authtype=ip&custid=s8431878&lang=cs&profile=eds&direct=true&db=nlebk&AN=861993
|
CAT |
|
|
|c 20180803
|l MUB03
|h 1520
|
CAT |
|
|
|c 20190222
|l MUB03
|h 1623
|
CAT |
|
|
|c 20190222
|l MUB03
|h 1659
|
CAT |
|
|
|c 20210421
|l MUB03
|h 2124
|
CAT |
|
|
|c 20210421
|l MUB03
|h 2208
|
CAT |
|
|
|a VASICEK
|b 02
|c 20230725
|l MUB03
|h 1123
|
CAT |
|
|
|a VASICEK
|b 02
|c 20230725
|l MUB03
|h 1158
|
995 |
|
|
|a eBook
|
994 |
- |
1 |
|l MUB03
|l MUB03
|m EBOOK
|1 KUK
|a Knihovna univ. kampusu
|2 VV
|b KUK - volný výběr
|5 3284L00138
|8 20180801
|f 83
|f Dálkově přístupná
|s kup
|
AVA |
|
|
|a MED50
|b KUK
|c KUK - volný výběr
|e available
|t K dispozici
|f 1
|g 0
|h N
|i 0
|j VV
|