113 results.
[1] 2 3 4 5
Standards for Safety, Security, and Interoperability of Medical Devices in an Integrated Health Information Environment
Author: Williams, Patricia A.H
Source: Journal of AHIMA
Publication Date: April 2017
Transitioning to a Principle Based Privacy Compliance
Author: Williams, Jutta; Thomason, Mary
Source: AHIMA Convention
Publication Date: October 02, 2011
Statistically, What’s the Chance of a Breach?
Author: Wiedemann, Lou Ann
Source: Journal of AHIMA
Publication Date: March 2017
Privacy and Security Audits of Electronic Health Information (2014 update)
Author: Walsh, Tom; Miaoulis, William M
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: March 2014
Privacy and Security Audits of Electronic Health Information (2013 update)
Author: Walsh, Tom
Source: AHIMA practice brief
Publication Date: November 2013
Guerrilla HIPAA: Increasing Security, Efficiency, and Convenience with Direct Personal Assurance
Author: Walker, Trevor Hight
Source: In Confidence (newsletter)
Publication Date: July 02, 2000
Testing and Monitoring Access Policy Controls: The Right Controls Can Boost Compliance and Efficiency
Author: Traverse, Cheryl
Source: Journal of AHIMA
Publication Date: May 2008
Keeping It Private: Staying Compliant with the HIPAA Privacy and Security Rules
Author: Tomes, Jonathan P.
Source: Journal of AHIMA
Publication Date: March 2012
Moving Targets: Maximizing the Rewards and Minimizing the Risks of Mobile Devices
Author: Tessier, Claudia
Source: Journal of AHIMA
Publication Date: April 2010
Biometric Devices and Record Security: What are Your Options?
Author: Stanley, Kendall R. Sr.
Source: In Confidence (newsletter)
Publication Date: October 02, 2002
Information Security Manager: Three Key Responsibilities
Author: Sobel, David A.
Source: In Confidence (newsletter)
Publication Date: January 02, 2001
Educating the Workforce: Unreasonable Burden or a Reasonable Step?
Author: Sobel, David A.
Source: In Confidence (newsletter)
Publication Date: May 02, 2001
Managing Compliance in Healthcare An Integrated Approach to Privacy, Security, and Identity Management
Author: Shim, Steven
Source: AHIMA Convention
Publication Date: October 02, 2011
Using Network Audits to Monitor Privacy and Security
Author: Shanley, Suzanne
Source: In Confidence (newsletter)
Publication Date: May 02, 2003
Information Governance for Offsite Data Security
Author: Saharia, Devendra
Source: Journal of AHIMA
Publication Date: April 2016
HITECH Security – A Practical Approach
Author: Rudloff, Rob
Source: AHIMA Convention
Publication Date: September 28, 2010
Exploring HIPAA's Security Domains: Access Control Systems
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: April 02, 2003
Exploring HIPAA's Security Domains: Security Management Practices
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: March 02, 2003
Security and HIPAA: Protecting Your Operations
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: August 02, 2003
Building Privacy: Security Architecture, Models Under HIPAA
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: July 02, 2003
Understanding Telecommunications, Network Security, and HIPAA
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: May 02, 2003
Managing Applications, Systems Development Security Under HIPAA
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: September 02, 2003
Smart Cards for Healthcare: a Follow-up Visit
Author: Ross, Bruce
Source: In Confidence (newsletter)
Publication Date: March 02, 2000
HIPAA Requirements for Secure Record Storage and Data Transfer
Author: Rosenbaum, Arnold S.; Nelson, Gina A.
Source: AHIMA Convention
Publication Date: October 15, 2004
Legal Issues of Healthcare E-commerce and Electronic Signatures
Author: Roach, Michael C.
Source: AHIMA Convention
Publication Date: October 10, 2001
[1] 2 3 4 5