44 results.
[1] 2 3 4 5
Putting It in Writing: Updating BA Agreements to Cover Breach Notification
Author: Hjort, Beth M.; Rhodes, Harry B.
Source: Journal of AHIMA
Publication Date: June 2010
Elements of a Breach Notification Letter
Author: Hjort, Beth M.
Source: Journal of AHIMA
Publication Date: February 2010
Healthcare Breach Management: Business Associate Agreement Addendum
Author: Hjort, Beth M.; Rhodes, Harry B.
Source: AHIMA Advocacy and Policy
Publication Date: January 22, 2010
[DRAFT] Template: Health Information Privacy and Security Breach Notification Letter
Author: Hjort, Beth M.
Source: AHIMA
Publication Date: November 24, 2009
Redefining the Health Information Management Privacy and Security Role
Author: Rinehart-Thompson, Laurie A.; Hjort, Beth M.; Cassidy, Bonnie S.
Source: Perspectives in Health Information Management
Publication Date: August 2009
Medical Identity Theft Protection for the Consumer
Author: Hjort, Beth M.
Source: AHIMA recognition week resources
Publication Date: April 13, 2009
Quality Health Care: Can Health Information Be Both Available and Private?
Author: Hjort, Beth M.
Source: External - used with permission
Publication Date: September 02, 2008
Confidential is Essential: How Do We Make That Happen
Author: Hjort, Beth M.
Source: AHIMA recognition week resources
Publication Date: April 14, 2008
Health Data Access, Use, and Control
Author: Burrington-Brown, Jill; Hjort, Beth M.; Washington, Lydia
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: May 2007
Privacy and Security in Health Information Exchange
Author: Carter, Patricia; Lemery, Chrisann; Mikels, Debra A; Bowen, Rita K.; Hjort, Beth M.
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: November 2006
[1] 2 3 4 5