COVID-19 Update: We are currently shipping orders daily. However, due to transit disruptions in some geographies, deliveries may be delayed. To provide all customers with timely access to content, we are offering 50% off Science and Technology Print & eBook bundle options. Terms & conditions.
Protecting Patient Information - 1st Edition - ISBN: 9780128043929, 9780128044117

Protecting Patient Information

1st Edition

A Decision-Maker's Guide to Risk, Prevention, and Damage Control

Author: Paul Cerrato
eBook ISBN: 9780128044117
Paperback ISBN: 9780128043929
Imprint: Syngress
Published Date: 7th April 2016
Page Count: 162
Sales tax will be calculated at check-out Price includes VAT/GST
Price includes VAT/GST

Institutional Subscription

Secure Checkout

Personal information is secured with SSL technology.

Free Shipping

Free global shipping
No minimum order.


Protecting Patient Information: A Decision-Maker's Guide to Risk, Prevention, and Damage Control provides the concrete steps needed to tighten the information security of any healthcare IT system and reduce the risk of exposing patient health information (PHI) to the public. The book offers a systematic, 3-pronged approach for addressing the IT security deficits present in healthcare organizations of all sizes.

Healthcare decision-makers are shown how to conduct an in-depth analysis of their organization’s information risk level. After this assessment is complete, the book offers specific measures for lowering the risk of a data breach, taking into account federal and state regulations governing the use of patient data. Finally, the book outlines the steps necessary when an organization experiences a data breach, even when it has taken all the right precautions.

Key Features

  • Written for physicians, nurses, healthcare executives, and business associates who need to safeguard patient health information
  • Shows how to put in place the information security measures needed to reduce the threat of data breach
  • Teaches physicians that run small practices how to protect their patient’s data
  • Demonstrates to decision-makers of large and small healthcare organizations the urgency of investing in cybersecurity


People responsible for patient information security in hospitals, medical practices of all sizes, pharmacies, third party vendors, and any other health organizations. InfoSec practitioners working in the healthcare industry

Table of Contents

1. Introduction: Dissecting a book title
2. Healthcare IT Security: Perception Versus Reality
3. Regulations Governing Protected Health Information
4. Risk Assessment
5. Reducing the Risk of a Data Breach
6. Mobile device security
7. Securing Medical Devices
8. Educating Medical and Administrative Staff for Information Security
9. Managing Business Associates
10. Coping with a Data Breach


No. of pages:
© Syngress 2016
7th April 2016
eBook ISBN:
Paperback ISBN:

About the Author

Paul Cerrato

Paul Cerrato, MA, has had over 30 years of experience working in healthcare, as a clinician, researcher, author, editor, and college lecturer. The last 7 years have been spent researching and writing about healthcare technology. He has served as Editor of Information Week Healthcare, Executive Editor of Contemporary OB/GYN, and Senior Editor of RN Magazine. Cerrato is the author of Protecting Patient Information and the co-author with John Halamka of Realizing the Promise of Precision Medicine. He has been named one of the most influential bloggers in healthcare IT by the Healthcare Information and Management Systems Society (HIMSS).

Affiliations and Expertise

Clinician, Researcher, Author, Editor, and College Lecturer


"This is an unusual, yet interesting and important small volume… physician leaders, business executives of health care organizations, and those with smaller or bigger offices would find it useful. Considering the topic, it is highly readable." --Annals of Clinical Psychiatry

"’s a good primer that condenses the main points of the regulations protecting patients’ data, and you will get some helpful tips. It’s a good way to get a sense of what you’ll be in for if you start the journey." --Help Net Security

Ratings and Reviews