215 results.
<< 7 8 9 10 11 12 13 [14] 15 16 17 18 19 20 21 22
Stealth Software Deters PHI Theft
Author: Kawles, Terrance L.
Source: Journal of AHIMA
Publication Date: July 2003
Understanding HIPAA Enforcement: Trust, but Verify
Author: Apple, Gordon J.
Source: In Confidence (newsletter)
Publication Date: June 02, 2003
Translating the Language of Security (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: June 2003
Sorting Out Employee Sanctions
Author: Burrington-Brown, Jill
Source: Journal of AHIMA
Publication Date: June 2003
Final Security Regulations Present Challenges, Opportunities for HIM
Author: Rode, Dan
Source: Journal of AHIMA
Publication Date: May 2003
Understanding Telecommunications, Network Security, and HIPAA
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: May 02, 2003
Exploring HIPAA's Security Domains: Security Management Practices
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: March 02, 2003
Think You're Ready? Don't Forget the Self-insured Health Plan (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: March 2003
Final Rule for HIPAA Security Standards: Analysis by the American Health Information Management Association Policy and Government Relations Team - February 2003
Author: AHIMA Policy and Government Relations Team
Source: AHIMA regulation analysis
Publication Date: February 28, 2003
Health Insurance Reform: Security Standards; Final Rule
Author: U.S. Centers for Medicare & Medicaid Services
Source: Government (U.S.)
Publication Date: February 20, 2003
<< 7 8 9 10 11 12 13 [14] 15 16 17 18 19 20 21 22