113 results.
1 2 3 4 5 [6] 7 8 9 10 11 12
How to React to a Security Incident
Author: AHIMA Privacy and Security Practice Council (2007)
Source: Journal of AHIMA
Publication Date: January 2008
Handling Sensitive Information in an NHIN
Author: Dimick, Chris
Source: Journal of AHIMA
Publication Date: February 2008
Teeth for HIPAA in 2008? CMS Announces Plans for Security “Assessments”
Author: Dinh, Angela K.
Source: Journal of AHIMA
Publication Date: March 2008
Online, On Message, On Duty: Privacy Experts Share Their Challenges
Author: AHIMA
Source: AHIMA report
Publication Date: April 15, 2008
Testing and Monitoring Access Policy Controls: The Right Controls Can Boost Compliance and Efficiency
Author: Traverse, Cheryl
Source: Journal of AHIMA
Publication Date: May 2008
HIPAA Security Compliance: What Comes Next?
Author: Dinh, Angela K.
Source: External - used with permission
Publication Date: May 02, 2008
Developing Emergency Access Standards for EHR Systems: The HL7 Standards Development Process Helps (and Empowers) HIM Processes
Author: Gelzer, Reed D.
Source: Journal of AHIMA
Publication Date: May 2008
Security and Systems Requirements
Author: Connecting for Health
Source: External - used with permission | External healthcare industry report
Publication Date: June 25, 2008
Immutable Audit Trails
Author: Markle Foundation; Connecting for Health
Source: External healthcare industry report | External - used with permission
Publication Date: June 25, 2008
Synching up Privacy and Security
Author:
Source: AHIMA Today
Publication Date: October 13, 2008
1 2 3 4 5 [6] 7 8 9 10 11 12