113 results.
1 2 3 [4] 5
Uncovering the Enemy Within: Utilizing Incident Response, Forensics
Author: Derhak, Mike
Source: In Confidence (newsletter)
Publication Date: September 02, 2003
Managing Applications, Systems Development Security Under HIPAA
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: September 02, 2003
Security and HIPAA: Protecting Your Operations
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: August 02, 2003
Establishing Security Safeguards to Meet the Privacy Rule: What You Need to Know
Author: Gallagher, Lisa; Yale, Ken
Source: In Confidence (newsletter)
Publication Date: August 02, 2003
Building Privacy: Security Architecture, Models Under HIPAA
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: July 02, 2003
Remote Coding Solution Offers Ultimate in Privacy, Security Measures
Author: Brucker, Mary Ann
Source: In Confidence (newsletter)
Publication Date: June 02, 2003
Using Network Audits to Monitor Privacy and Security
Author: Shanley, Suzanne
Source: In Confidence (newsletter)
Publication Date: May 02, 2003
Understanding Telecommunications, Network Security, and HIPAA
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: May 02, 2003
Exploring HIPAA's Security Domains: Access Control Systems
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: April 02, 2003
CPRI-HOST Toolkit: Developing New Guidance on Sound Security Practices
Author: Cooper, Ted
Source: In Confidence (newsletter)
Publication Date: April 02, 2003
Exploring HIPAA's Security Domains: Security Management Practices
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: March 02, 2003
For Your Eyes Only--Putting Iris Scan Technology to Work
Author: Rhodes, Harry B.
Source: In Confidence (newsletter)
Publication Date: January 02, 2003
Biometric Devices and Record Security: What are Your Options?
Author: Stanley, Kendall R. Sr.
Source: In Confidence (newsletter)
Publication Date: October 02, 2002
Is Fingerprint Technology the Right Choice for Access Control?
Author: Katz, Neil A.
Source: In Confidence (newsletter)
Publication Date: October 02, 2002
Making Your Data Warehouse HIPAA Compliant
Author: Reinke, Brian
Source: In Confidence (newsletter)
Publication Date: July 02, 2002
As Strong As the Weakest Link: Developing Chain of Trust Agreements
Author: Levinson, Curtis K.S.
Source: In Confidence (newsletter)
Publication Date: May 02, 2002
Power of PKI in Healthcare
Author: Lovorn, Jan
Source: In Confidence (newsletter)
Publication Date: April 02, 2002
Value of Digital Signatures
Author: Barnett, David H.
Source: In Confidence (newsletter)
Publication Date: March 02, 2002
Document Management Systems in the Healthcare Environment
Author: Odette, Rose
Source: In Confidence (newsletter)
Publication Date: February 02, 2002
Legal Issues of Healthcare E-commerce and Electronic Signatures
Author: Roach, Michael C.
Source: AHIMA Convention
Publication Date: October 10, 2001
Securing Your IT Environment from the Inside Out
Author: Bakman, Alex
Source: In Confidence (newsletter)
Publication Date: September 02, 2001
Developing a Framework for a Security Assessment
Author: Parisien, Darryl
Source: In Confidence (newsletter)
Publication Date: September 02, 2001
What Is the Future of Electronic Patient Communication?
Author: Levitt, Randy
Source: In Confidence (newsletter)
Publication Date: July 02, 2001
Putting Your Finger on Biometrics: What Are the Issues?
Author: Mills, Chris
Source: In Confidence (newsletter)
Publication Date: May 02, 2001
Educating the Workforce: Unreasonable Burden or a Reasonable Step?
Author: Sobel, David A.
Source: In Confidence (newsletter)
Publication Date: May 02, 2001
1 2 3 [4] 5