Things Privacy Officers Can Do Today to Defend Against a Cyberattack Author: Arvin, Marti Source: Journal of AHIMA Publication Date: April 2017
Cybersecurity 101 Author: Lucci, Susan; Walsh, Tom Source: Journal of AHIMA Publication Date: November 2015
Industry Awaits Phase 2 of HIPAA Audit Program Author: Asmonga, Donald D. Source: Journal of AHIMA Publication Date: January 2015
Security Starts at Admissions, But Can’t End After Discharge Author: Morper, Mike Source: Journal of AHIMA Publication Date: November 2014
Seven Select Questions to Ask Your Privacy Officer (Or Yourself) Author: Downing, Katherine Source: Journal of AHIMA Publication Date: April 2014
Man Your Battle Stations: Feds Plan Cyber Security Hack Attacks Author: Source: Journal of AHIMA Publication Date: March 2014
Security Risk Analysis and Management: An Overview (2013 update) Author: Walsh, Tom Source: AHIMA practice brief Publication Date: November 2013
When to Send a Breach Notification: New HIPAA Rules Revise “Harm” Standard Author: Warner, Diana Source: Journal of AHIMA Publication Date: April 2013
Keeping It Private: Staying Compliant with the HIPAA Privacy and Security Rules Author: Tomes, Jonathan P. Source: Journal of AHIMA Publication Date: March 2012
Automation for Privacy and Security Compliance Author: McLendon, Kelly Source: Journal of AHIMA Publication Date: March 2012