20 results.
[1] 2
Wireless Computing May Be the Ambulatory Answer
Author: Kuehn, Lynn
Source: Brief Encounter
Publication Date: June 02, 1997
Society has accepted the fact that telephones function very well without wires, freeing us from desktop chains. So, why not accept the fact that computing can happen the same way -- wireless, yet fully connected? PC Tablets
The technology exists today to create wireless local area....
Using Network Audits to Monitor Privacy and Security
Author: Shanley, Suzanne
Source: In Confidence (newsletter)
Publication Date: May 02, 2003
Under the security rule, covered entities must ensure that some process is put in place to record and review system access and activity. Audit controls are required to record any alterations to confidential patient information, including changes to content and the addition or deletion of info....
Understanding Telecommunications, Network Security, and HIPAA
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: May 02, 2003
Part three in a 10-part series.
This article is the third of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. The third information security domain of telecommunications and network security is the largest and most compl....
Turning Old Technology into New Systems
Author: Anderson, Ellen Miller
Source: Journal of AHIMA
Publication Date: November 2001
The need for updated technology rarely coincides with enough funds to purchase it. However, disparate technologies can be combined to meet information system needs without a major capital outlay. At Home Care Services, part of Group Health Cooperative (GHC) in Seattle, we created the On Call P....
Testing and Monitoring Access Policy Controls: The Right Controls Can Boost Compliance and Efficiency
Author: Traverse, Cheryl
Source: Journal of AHIMA
Publication Date: May 2008
Testing and monitoring access policy controls are critical best practices for all healthcare organizations. By testing and monitoring IT resources, perimeter security systems, and technical user activities, organizations can ensure service delivery, the protection of the resources that deliver....
Standards for Safety, Security, and Interoperability of Medical Devices in an Integrated Health Information Environment
Author: Williams, Patricia A.H
Source: Journal of AHIMA
Publication Date: April 2017
Information sharing between healthcare organizations increasingly includes the use of electronic health records (EHRs) as well as data from medical devices that have been integrated into existing networks. When exchanging such data, providers should be mindful not only of the interoperabil....
Security @ the Edge
Author: Boroditsky, Marc
Source: In Confidence (newsletter)
Publication Date: November 02, 2000
With the pending impact of the Health Insurance Portability and Accountability Act (HIPAA) requirements and the high hopes for fully automated e-medical informatics, healthcare information professionals must gain an appreciation for the edge of their networks. More than ever before, the edge....
Securing Wireless Technology for Healthcare (2013 update) - Retired
Author: Evans, Brian
Source: AHIMA practice brief
Publication Date: November 2013
Editor's note: This update supplants the May 2004 practice brief "Securing Wireless Technology for Healthcare"
Overview
Wireless local area network (WLAN) environments have evolved from simple, unmanaged stand-alone access points (APs) to organizationally managed system....
Securing Wireless Technology for Healthcare
Author: Retterer, John; Casto, Brian
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: May 2004
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
Primer on Network Security
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: March 2004
The lack of specificity in HIPAA’s transmission security standard for “guarding against unauthorized access to electronic protected health information (EPHI) that is being transmitted over an electronic communications nework” may leave you a bit cold, especially the portion....
[1] 2