53 results.
1 2 3 [4] 5 6
What is Security Auditing?
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: November 2004
HIPAA Requirements for Secure Record Storage and Data Transfer
Author: Rosenbaum, Arnold S.; Nelson, Gina A.
Source: AHIMA Convention
Publication Date: October 15, 2004
Kick Starting the Security Risk Analysis
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: July 2004
Greater Rigor for Corporate Compliance: Amended Sentencing Guidelines Tighten Program Requirements
Author: Bowman, Sue E
Source: Journal of AHIMA
Publication Date: July 2004
Updated Toolkit for Security Strategies
Author: Cooper, Ted
Source: Journal of AHIMA
Publication Date: July 2004
Forgiveness Means Never Having to Say You're Not Insured
Author: Johnson, Robert J.
Source: Journal of AHIMA
Publication Date: May 2004
Primer on Network Security
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: March 2004
IT Contingency Plan to Meet HIPAA Security Standards
Author: Nutten, Sandra; Mansueti, Chris
Source: Journal of AHIMA
Publication Date: February 2004
10 Security Domains (2004)
Author: Dougherty, Michelle
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: February 2004
Securing Executive Support for Security (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: February 2004
1 2 3 [4] 5 6