754 results.
<< 6 7 8 9 10 11 12 13 [14] 15 16 17 18 19 20 21 >>
Security Audits (2000)
Author: Hjort, Beth M.
Source: AHIMA practice brief
Publication Date: September 2000
Security and HIPAA: Protecting Your Operations
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: August 02, 2003
Securing Your IT Environment from the Inside Out
Author: Bakman, Alex
Source: In Confidence (newsletter)
Publication Date: September 02, 2001
Securing Portable Devices
Author: Dinh, Angela K.
Source: Journal of AHIMA
Publication Date: January 2009
Securing Executive Support for Security (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: February 2004
Seasoning Your Compliance Plan with PEPPER: How to Read PEPPER Data on Payment Errors
Author: Wiedemann, Lou Ann
Source: Journal of AHIMA
Publication Date: January 2007
Screening Algorithms to Assess the Accuracy of Present-on-Admission Coding
Author: Pine, Michael; Fry, Donald E.; Jones, Barbara; Meimban, Roger
Source: Perspectives in Health Information Management
Publication Date: February 2009
Save the Stamps: Health Information Handlers Offering Electronic Record Submission for CMS Audits
Author: Galterio, Louis
Source: Journal of AHIMA
Publication Date: January 2013
Sanction Guidelines for Privacy and Security Violations. Appendix A: Sample Privacy and Security Violation Severity Determination Document (2011 update)
Author: AHIMA
Source: AHIMA practice brief attachment
Publication Date: October 2011
Sanction Guidelines for Privacy and Security Violations (2013 update) - Retired
Author: AHIMA
Source: AHIMA practice brief
Publication Date: October 2013
<< 6 7 8 9 10 11 12 13 [14] 15 16 17 18 19 20 21 >>