The Privacy Officer's Breach Response Toolkit
Book Details
Description
Will you be prepared when your organization experiences a breach of patient information?
An efficient, effective, and compliant response to any breach of patient information requires careful planning and preparedness. Author Nancy Davis shares her simple yet effective red folder approach in The Privacy Officer s Breach Response Toolkit. This book offers guidance and customizable tools that you can use to create your own red folder for responding to a breach of patient information in real time. Learn how a carefully crafted red folder can help you effectively manage a breach, meet the needs of affected patients and your organization, and comply with HIPAA, including new Omnibus Rule requirements.
The Privacy Officer s Breach Response Toolkit:
- Explains the federal laws that govern breach management and notification in the healthcare environment
- Explains the breach investigation and management process
- Discusses breach notification requirements within the context of specific scenarios
- Offers strategies for communicating information about a breach of patient information with internal stakeholders and the news media
- Includes resources that facilitate successful breach management
Take a look at the Table of Contents:
Chapter 1
Breach Notification: An Overview
Covered Entity
Business Associate
Breach
Breach Notification
State Breach Notification Requirements
Individually Identifiable Data Elements
Penalties for Noncompliance
Consequences of a Privacy Breach
Resources
Chapter 2
Investigation of a Suspected Breach
Initial Response to a Suspected Breach
The Breach Investigation Process
Identify and Notify Key Leaders and Stakeholders
Business Associates
Contact Law Enforcement Officials
Law Enforcement Request to Delay Notification
Sealed Court Documents
Privacy Breach as a Security Incident
Workforce Member Breaches
Incidence Response Toolkit
Resources
Chapter 3
Breach Notification: Who, What, When, and Why?
Patients
Office for Civil Rights
Breaches Affecting Fewer Than 500 Individuals
Breaches Affecting 500 or More Individuals
State Law
News Media
Stakeholders
Resources
Chapter 4
Communication Strategies
News Media
Internal Stakeholders
Public Relations Consultants
Resources
Chapter 5
Breach Management Resources
Create Your Own Red Folder
Supplementary Tools and Resources
Cyber Insurance
