Quest for Managing Cyberthreats in Healthcare Author: Carey, Susan Source: Journal of AHIMA Publication Date: May 2017
How Small Organizations Handle HIPAA Compliance Author: Primeau, Debra Source: Journal of AHIMA Publication Date: April 2017
DIY Privacy Risk Assessments Author: Butler, Mary Source: Journal of AHIMA - website Publication Date: November 2015
Cybersecurity 101 Author: Lucci, Susan; Walsh, Tom Source: Journal of AHIMA Publication Date: November 2015
IGPHC Provides Guidance for Privacy Risk Assessment Author: Lewis, Sharon Source: AHIMA blog post | Journal of AHIMA - website Publication Date: September 2015
Industry Awaits Phase 2 of HIPAA Audit Program Author: Asmonga, Donald D. Source: Journal of AHIMA Publication Date: January 2015
Black Market PHI Does Exist: Why It’s Time to Take Security Risk Assessments Seriously Author: Source: Journal of AHIMA Publication Date: May 2014
Prepare Now for Meaningful Use Attestation and Compliance Audits Author: Warner, Diana Source: Journal of AHIMA Publication Date: March 2014
The 10 Security Domains (Updated 2013) - Retired Author: AHIMA Source: AHIMA practice brief Publication Date: October 2013
De-identification and the Sharing of Big Data Author: White, Susan E Source: Journal of AHIMA Publication Date: April 2013