215 results.
<< 7 8 9 10 11 12 [13] 14 15 16 17 18 19 20 21 22
Uncovering the Enemy Within: Utilizing Incident Response, Forensics
Author: Derhak, Mike
Source: In Confidence (newsletter)
Publication Date: September 02, 2003
Managing Applications, Systems Development Security Under HIPAA
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: September 02, 2003
Medicare Program; Electronic Submission of Medicare Claims
Author: U.S. Centers for Medicare & Medicaid Services
Source: Federal Register
Publication Date: August 15, 2003
Security and HIPAA: Protecting Your Operations
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: August 02, 2003
Establishing Security Safeguards to Meet the Privacy Rule: What You Need to Know
Author: Gallagher, Lisa; Yale, Ken
Source: In Confidence (newsletter)
Publication Date: August 02, 2003
Handling Security Breaches Under HIPAA: a Legal Perspective
Author: Gradle, Brian D.
Source: In Confidence (newsletter)
Publication Date: August 02, 2003
Guidance on Compliance with HIPAA Transactions and Code Sets after the October 16, 2003, Implementation Deadline
Author: U.S. Centers for Medicare & Medicaid Services
Source: Government (U.S.)
Publication Date: July 24, 2003
HIPAA Transaction Standards Force OASIS Changes for Home Health
Author: Abraham, Prinny
Source: AHIMA community resource
Publication Date: July 24, 2003
Ready for the Transactions Rule? Get Started with Code Sets (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: July 2003
Building Privacy: Security Architecture, Models Under HIPAA
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: July 02, 2003
<< 7 8 9 10 11 12 [13] 14 15 16 17 18 19 20 21 22