95 results.
[1] 2
Information Security--A Database View
Author: Zender, Anne
Source: Journal of AHIMA
Publication Date: March 1998
Swipe and Say 'Aaah': Managing Patient Health Data on Secure Smart Cards
Author: Zach, Henry
Source: Journal of AHIMA
Publication Date: June 2004
Security Risk Analysis and Management: An Overview (2013 update)
Author: Walsh, Tom
Source: AHIMA practice brief
Publication Date: November 2013
Security Risk Analysis and Management: an Overview (2011 update)
Author: Walsh, Tom
Source: AHIMA practice brief
Publication Date: January 2011
Uniting Security Forces Against Risk
Author: Wagner, Lew
Source: Journal of AHIMA
Publication Date: June 2002
Documentation Goes Wireless: a Look at Mobile Healthcare Computing Devices
Author: Waegemann, C. Peter; Tessier, Claudia
Source: Journal of AHIMA
Publication Date: September 2002
Audit Of Information Technology Security Included in Health Information Technology Standards
Author: U.S. Department of Health and Human Services. Office of the Inspector General
Source: Government (U.S.)
Publication Date: May 16, 2011
Health Insurance Reform: Security Standards; Final Rule
Author: U.S. Centers for Medicare & Medicaid Services
Source: Government (U.S.)
Publication Date: February 20, 2003
EMR ... CMR ... CPR ... G-CPR??
Author: Tadwalt, Bobbi
Source: Brief Encounter
Publication Date: October 02, 1999
Encryption Basics
Author: Stine, Kevin; Dang, Quynh
Source: Journal of AHIMA
Publication Date: May 2011
Systematic Approach Shortest Route to Security Incident...
Author: Sobel, David A.
Source: Journal of AHIMA
Publication Date: June 2001
Data Transmission: A World of Possibilities
Author: Smith, Deborah A.
Source: Journal of AHIMA
Publication Date: May 2001
Intrusion Detection FAQ
Author: SANS (SysAdmin Audit Network Security) Institute
Source: External web site
Publication Date: June 12, 2003
Information Governance for Offsite Data Security
Author: Saharia, Devendra
Source: Journal of AHIMA
Publication Date: April 2016
Moving Toward a Unified Information Security Program
Author: Ruano, Michael
Source: Journal of AHIMA
Publication Date: January 2003
Information Governance’s Privacy and Security Component
Author: Rose, Angela Dinh
Source: Journal of AHIMA
Publication Date: November 2013
Privacy Versus Protection: Weighing Confidentiality Against Public Safety
Author: Rhodes, Harry B.
Source: In Confidence (newsletter)
Publication Date: January 02, 2000
E-Mail Security (1997)
Author: Rhodes, Harry B.
Source: AHIMA practice brief
Publication Date: June 1997
Establishing the Information Security Manager's Job Description
Author: Rhodes, Harry B.
Source: In Confidence (newsletter)
Publication Date: January 02, 2000
Securing Wireless Technology for Healthcare
Author: Retterer, John; Casto, Brian
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: May 2004
Portable Computer Security (2003 update)
Author: Quinsey, Carol Ann; Hughes, Gwen
Source: AHIMA practice brief
Publication Date: June 2003
Information Security: an Overview (2003 update)
Author: Quinsey, Carol Ann
Source: AHIMA practice brief
Publication Date: November 2003
New Face of Security: Remember When All We Had to Worry About Were Modems?
Author: Pierson, Ed; Martin, Dan
Source: Journal of AHIMA
Publication Date: January 2005
Guarding the Electronic Gates: a Plan for Access Management
Author: Okamoto, Carole; Zak, Cynthia; Lawson, Jayne W.
Source: In Confidence (newsletter)
Publication Date: May 02, 2000
Document Management Systems in the Healthcare Environment
Author: Odette, Rose
Source: In Confidence (newsletter)
Publication Date: February 02, 2002
IT Contingency Plan to Meet HIPAA Security Standards
Author: Nutten, Sandra; Mansueti, Chris
Source: Journal of AHIMA
Publication Date: February 2004
For the Record: Protecting Electronic Health Information [link]
Author: National Research Council. Computer Science and Telecommunications Board
Source: External web site
Publication Date: January 02, 1997
Internet Security: What Health Information Managers Should Know
Author: Miller, Dale W.
Source: Journal of AHIMA
Publication Date: September 1996
Internal Audit Model for Information Security
Author: Mead, Kevin
Source: In Confidence (newsletter)
Publication Date: July 02, 2000
Protection of Personal Data -- The European View
Author: Mathews, Steve
Source: Journal of AHIMA
Publication Date: March 1998
Information Infrastructure Promises Better Healthcare, Lower Costs
Author: Marchibroda, Janet; Gerber, Ticia
Source: Journal of AHIMA
Publication Date: January 2003
What Is the Future of Electronic Patient Communication?
Author: Levitt, Randy
Source: In Confidence (newsletter)
Publication Date: July 02, 2001
Safe at Home: Remote Coding Meets HIPAA
Author: Keough, Tim
Source: Journal of AHIMA
Publication Date: February 2004
Is Fingerprint Technology the Right Choice for Access Control?
Author: Katz, Neil A.
Source: In Confidence (newsletter)
Publication Date: October 02, 2002
Portable Computer Security (2000)
Author: Hughes, Gwen
Source: AHIMA practice brief
Publication Date: October 2000
E-Mail Security
Author: Hughes, Gwen
Source: AHIMA practice brief
Publication Date: February 2000
Security Audits (2000)
Author: Hjort, Beth M.
Source: AHIMA practice brief
Publication Date: September 2000
Security Audits (2003 update)
Author: Hjort, Beth M.
Source: AHIMA practice brief
Publication Date: November 2003
Information Security: It Takes a Community
Author: Hjort, Beth M.
Source: Journal of AHIMA
Publication Date: January 2001
On the Line: Professional Practice Solutions (3/03)
Author: Hjort, Beth M.
Source: AHIMA Q and A | Journal of AHIMA
Publication Date: March 2003
HIMSS Privacy & Security Toolkit
Author: HIMSS Privacy and Security Toolkit Work Group
Source: External web site
Publication Date: January 02, 2007
Managing Information Security in Heathcare
Author: HIMSS CPRI Toolkit Work Group
Source: External web site
Publication Date: January 01, 2004
2009 HIMSS Security Survey
Author: HIMSS
Source: External web site
Publication Date: November 03, 2009
IT Standards for PHRs: Are PHRs Ready for Standards? Are Standards Ready for PHRs?
Author: Heubusch, Kevin
Source: Journal of AHIMA
Publication Date: June 2008
Access Audit Trails: En Route to Security
Author: Halpert, Aviva M.
Source: Journal of AHIMA
Publication Date: September 2000
Electronic Record, Electronic Security
Author: Hagland, Mark
Source: Journal of AHIMA
Publication Date: February 2004
Comments on Medicare Program: Expanding Uses of Medicare Data by Qualified Entities
Author: Gordon, Lynne Thomas
Source: AHIMA testimony and comments
Publication Date: March 2016
HHS Releases White Paper on Unique Health Identifier
Author: Frawley, Kathleen A.; Asmonga, Donald D.
Source: Journal of AHIMA
Publication Date: September 1998
Online Records Serve Patients, Clinicians, and HIM
Author: Foster, Erica; Martin, Holly; Partin, Mary; Lockshaw, Jim; Fogelman, Adam; Folz-Murphy, Nancy; Harris, C Martin
Source: Journal of AHIMA
Publication Date: September 2003
HIPAA and the EHR: Making Technical Safeguard Changes
Author: Fodor, Joseph
Source: Journal of AHIMA
Publication Date: January 2004
Securing Wireless Technology for Healthcare (2013 update) - Retired
Author: Evans, Brian
Source: AHIMA practice brief
Publication Date: November 2013
10 Security Domains (2004)
Author: Dougherty, Michelle
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: February 2004
Handling a Security Breach: Lessons Learned
Author: Dougherty, Michelle
Source: Journal of AHIMA
Publication Date: February 2002
Changing Face of Public Health Reporting
Author: Dougherty, Michelle
Source: Journal of AHIMA
Publication Date: April 2002
Cloud Computing 101
Author: Dinh, Angela K.
Source: Journal of AHIMA
Publication Date: April 2011
Great PHRontier: Private Business Stakes a Claim in Personal Health Records
Author: Dimick, Chris
Source: Journal of AHIMA
Publication Date: June 2008
The New Privacy Officer
Author: Dimick, Chris
Source: Journal of AHIMA
Publication Date: April 2012
Evaluating the Information Governance Principles for Healthcare: Integrity and Protection
Author: Datskovsky, Galina; Hedges, Ron; Empel, Sofia; Washington, Lydia
Source: Journal of AHIMA
Publication Date: April 2015
Three Steps to Increasing Employee Information Security Awareness
Author: Czirr, Karen
Source: Journal of AHIMA
Publication Date: July 2000
Updated Toolkit for Security Strategies
Author: Cooper, Ted
Source: Journal of AHIMA
Publication Date: July 2004
Update on Business Partner/Associate Agreements (HIPAA on the Job)
Author: Cassidy, Bonnie S.
Source: Journal of AHIMA
Publication Date: November 2000
Securely Implementing Remote Access within Health Information Management
Author: Carroll, Eugene T.; Wright, Susan; Zakoworotny, Cindy
Source: Journal of AHIMA
Publication Date: March 1998
Information Security: a Checklist for Healthcare Professionals (2000)
Author: Carpenter, Jennifer E.
Source: AHIMA practice brief
Publication Date: January 2000
OASIS Cracks Down on Home Care
Author: Carpenter, Jennifer E.
Source: Journal of AHIMA
Publication Date: May 1999
Privacy, Security, and the Regional Health Information Organization
Author: California HealthCare Foundation
Source: External web site
Publication Date: June 02, 2007
Tips for Preventing and Responding to a Ransomware Attack
Author: Butler, Mary
Source: Journal of AHIMA - website
Publication Date: April 01, 2016
Exploring Encryption and Standards in Release of Information
Author: Butler, Mary
Source: Journal of AHIMA - website
Publication Date: January 2016
Provider-Patient E-Mail Security (2003 update)
Author: Burrington-Brown, Jill; Hughes, Gwen
Source: AHIMA practice brief
Publication Date: June 2003
At Close Range: Protecting Privacy Through Proximity Access Control
Author: Brostoff, George
Source: In Confidence (newsletter)
Publication Date: May 02, 2000
Information Security: an Overview
Author: Brandt, Mary D.
Source: AHIMA practice brief
Publication Date: June 1996
"Need to Know" Access: Meeting HIPAA's Minimum Necessary Requirements
Author: Brandt, Mary D.
Source: In Confidence (newsletter)
Publication Date: February 02, 2002
Sample Information Security Program
Author: Ballam, Holly
Source: Journal of AHIMA
Publication Date: March 1999
Selecting Strong Passwords (HIPAA on the Job)
Author: Amatayakul, Margret; Walsh, Tom
Source: Journal of AHIMA
Publication Date: October 2001
Security Risk Analysis and Management: an Overview
Author: Amatayakul, Margret
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: October 2003
HIPAA Reins in Shadow Charts, Independent Databases (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: October 2003
[1] 2