95 results.
[1] 2
Application of Data Security for Electronic Health Information
Author: Abbott, Debbie
Source: AHIMA Convention
Publication Date: October 15, 2004
Integrating Privacy and Security: Coordination Benefits HIPAA Compliance Efforts
Author: Adler, M. Peter
Source: Journal of AHIMA
Publication Date: April 2008
Information Security is for Everyone
Author: AHIMA
Source: AHIMA presentation | AHIMA recognition week resources
Publication Date: July 12, 2003
Security Audits of Electronic Health Information (2011 update)
Author: AHIMA
Source: AHIMA practice brief
Publication Date: March 2011
10 Security Domains (2010 Update)
Author: AHIMA
Source: AHIMA practice brief
Publication Date: February 2010
10 Security Domains (2012 update)
Author: AHIMA
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: May 2012
Mobile Device Security (Updated) - Retired
Author: AHIMA
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: April 2012
The 10 Security Domains (Updated 2013) - Retired
Author: AHIMA
Source: AHIMA practice brief
Publication Date: October 2013
10 Security Domains (2011 update)
Author: AHIMA
Source: AHIMA practice brief
Publication Date: July 2011
Information Security—An Overview (2010 update)
Author: AHIMA
Source: AHIMA practice brief
Publication Date: December 2010
Electronic Signature, Attestation, and Authorship (2009 update) - Retired
Author: AHIMA e-HIM Work Group: Best Practices for Electronic Signature and Attestation
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: November 2009
Access: the Missing HIM Practice Element (Resolution)
Author: AHIMA House of Delegates
Source: Journal of AHIMA | AHIMA HoD Resolution
Publication Date: January 1998
Safeguards for Remote Access
Author: AHIMA Privacy and Security Practice Council
Source: Journal of AHIMA
Publication Date: July 2007
Journal Q&A (2/00)
Author: AHIMA Professional Practice Team
Source: AHIMA Q and A
Publication Date: February 02, 2000
Security Risk Analysis and Management: an Overview
Author: Amatayakul, Margret
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: October 2003
HIPAA Reins in Shadow Charts, Independent Databases (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: October 2003
Primer on Encryption
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: June 2004
Make Your Telecommuting Program HIPAA Compliant (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: February 2002
Translating the Language of Security (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: June 2003
Selecting Strong Passwords (HIPAA on the Job)
Author: Amatayakul, Margret; Walsh, Tom
Source: Journal of AHIMA
Publication Date: October 2001
Sample Information Security Program
Author: Ballam, Holly
Source: Journal of AHIMA
Publication Date: March 1999
Information Security: an Overview
Author: Brandt, Mary D.
Source: AHIMA practice brief
Publication Date: June 1996
"Need to Know" Access: Meeting HIPAA's Minimum Necessary Requirements
Author: Brandt, Mary D.
Source: In Confidence (newsletter)
Publication Date: February 02, 2002
At Close Range: Protecting Privacy Through Proximity Access Control
Author: Brostoff, George
Source: In Confidence (newsletter)
Publication Date: May 02, 2000
Provider-Patient E-Mail Security (2003 update)
Author: Burrington-Brown, Jill; Hughes, Gwen
Source: AHIMA practice brief
Publication Date: June 2003
Tips for Preventing and Responding to a Ransomware Attack
Author: Butler, Mary
Source: Journal of AHIMA - website
Publication Date: April 01, 2016
Exploring Encryption and Standards in Release of Information
Author: Butler, Mary
Source: Journal of AHIMA - website
Publication Date: January 2016
Privacy, Security, and the Regional Health Information Organization
Author: California HealthCare Foundation
Source: External web site
Publication Date: June 02, 2007
Information Security: a Checklist for Healthcare Professionals (2000)
Author: Carpenter, Jennifer E.
Source: AHIMA practice brief
Publication Date: January 2000
OASIS Cracks Down on Home Care
Author: Carpenter, Jennifer E.
Source: Journal of AHIMA
Publication Date: May 1999
Securely Implementing Remote Access within Health Information Management
Author: Carroll, Eugene T.; Wright, Susan; Zakoworotny, Cindy
Source: Journal of AHIMA
Publication Date: March 1998
Update on Business Partner/Associate Agreements (HIPAA on the Job)
Author: Cassidy, Bonnie S.
Source: Journal of AHIMA
Publication Date: November 2000
Updated Toolkit for Security Strategies
Author: Cooper, Ted
Source: Journal of AHIMA
Publication Date: July 2004
Three Steps to Increasing Employee Information Security Awareness
Author: Czirr, Karen
Source: Journal of AHIMA
Publication Date: July 2000
Evaluating the Information Governance Principles for Healthcare: Integrity and Protection
Author: Datskovsky, Galina; Hedges, Ron; Empel, Sofia; Washington, Lydia
Source: Journal of AHIMA
Publication Date: April 2015
Great PHRontier: Private Business Stakes a Claim in Personal Health Records
Author: Dimick, Chris
Source: Journal of AHIMA
Publication Date: June 2008
The New Privacy Officer
Author: Dimick, Chris
Source: Journal of AHIMA
Publication Date: April 2012
Cloud Computing 101
Author: Dinh, Angela K.
Source: Journal of AHIMA
Publication Date: April 2011
10 Security Domains (2004)
Author: Dougherty, Michelle
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: February 2004
Handling a Security Breach: Lessons Learned
Author: Dougherty, Michelle
Source: Journal of AHIMA
Publication Date: February 2002
Changing Face of Public Health Reporting
Author: Dougherty, Michelle
Source: Journal of AHIMA
Publication Date: April 2002
Securing Wireless Technology for Healthcare (2013 update) - Retired
Author: Evans, Brian
Source: AHIMA practice brief
Publication Date: November 2013
HIPAA and the EHR: Making Technical Safeguard Changes
Author: Fodor, Joseph
Source: Journal of AHIMA
Publication Date: January 2004
Online Records Serve Patients, Clinicians, and HIM
Author: Foster, Erica; Martin, Holly; Partin, Mary; Lockshaw, Jim; Fogelman, Adam; Folz-Murphy, Nancy; Harris, C Martin
Source: Journal of AHIMA
Publication Date: September 2003
HHS Releases White Paper on Unique Health Identifier
Author: Frawley, Kathleen A.; Asmonga, Donald D.
Source: Journal of AHIMA
Publication Date: September 1998
Comments on Medicare Program: Expanding Uses of Medicare Data by Qualified Entities
Author: Gordon, Lynne Thomas
Source: AHIMA testimony and comments
Publication Date: March 2016
Electronic Record, Electronic Security
Author: Hagland, Mark
Source: Journal of AHIMA
Publication Date: February 2004
Access Audit Trails: En Route to Security
Author: Halpert, Aviva M.
Source: Journal of AHIMA
Publication Date: September 2000
IT Standards for PHRs: Are PHRs Ready for Standards? Are Standards Ready for PHRs?
Author: Heubusch, Kevin
Source: Journal of AHIMA
Publication Date: June 2008
2009 HIMSS Security Survey
Author: HIMSS
Source: External web site
Publication Date: November 03, 2009
Managing Information Security in Heathcare
Author: HIMSS CPRI Toolkit Work Group
Source: External web site
Publication Date: January 01, 2004
HIMSS Privacy & Security Toolkit
Author: HIMSS Privacy and Security Toolkit Work Group
Source: External web site
Publication Date: January 02, 2007
Security Audits (2000)
Author: Hjort, Beth M.
Source: AHIMA practice brief
Publication Date: September 2000
Security Audits (2003 update)
Author: Hjort, Beth M.
Source: AHIMA practice brief
Publication Date: November 2003
Information Security: It Takes a Community
Author: Hjort, Beth M.
Source: Journal of AHIMA
Publication Date: January 2001
On the Line: Professional Practice Solutions (3/03)
Author: Hjort, Beth M.
Source: AHIMA Q and A | Journal of AHIMA
Publication Date: March 2003
Portable Computer Security (2000)
Author: Hughes, Gwen
Source: AHIMA practice brief
Publication Date: October 2000
E-Mail Security
Author: Hughes, Gwen
Source: AHIMA practice brief
Publication Date: February 2000
Is Fingerprint Technology the Right Choice for Access Control?
Author: Katz, Neil A.
Source: In Confidence (newsletter)
Publication Date: October 02, 2002
Safe at Home: Remote Coding Meets HIPAA
Author: Keough, Tim
Source: Journal of AHIMA
Publication Date: February 2004
What Is the Future of Electronic Patient Communication?
Author: Levitt, Randy
Source: In Confidence (newsletter)
Publication Date: July 02, 2001
Information Infrastructure Promises Better Healthcare, Lower Costs
Author: Marchibroda, Janet; Gerber, Ticia
Source: Journal of AHIMA
Publication Date: January 2003
Protection of Personal Data -- The European View
Author: Mathews, Steve
Source: Journal of AHIMA
Publication Date: March 1998
Internal Audit Model for Information Security
Author: Mead, Kevin
Source: In Confidence (newsletter)
Publication Date: July 02, 2000
Internet Security: What Health Information Managers Should Know
Author: Miller, Dale W.
Source: Journal of AHIMA
Publication Date: September 1996
For the Record: Protecting Electronic Health Information [link]
Author: National Research Council. Computer Science and Telecommunications Board
Source: External web site
Publication Date: January 02, 1997
IT Contingency Plan to Meet HIPAA Security Standards
Author: Nutten, Sandra; Mansueti, Chris
Source: Journal of AHIMA
Publication Date: February 2004
Document Management Systems in the Healthcare Environment
Author: Odette, Rose
Source: In Confidence (newsletter)
Publication Date: February 02, 2002
Guarding the Electronic Gates: a Plan for Access Management
Author: Okamoto, Carole; Zak, Cynthia; Lawson, Jayne W.
Source: In Confidence (newsletter)
Publication Date: May 02, 2000
New Face of Security: Remember When All We Had to Worry About Were Modems?
Author: Pierson, Ed; Martin, Dan
Source: Journal of AHIMA
Publication Date: January 2005
Information Security: an Overview (2003 update)
Author: Quinsey, Carol Ann
Source: AHIMA practice brief
Publication Date: November 2003
Portable Computer Security (2003 update)
Author: Quinsey, Carol Ann; Hughes, Gwen
Source: AHIMA practice brief
Publication Date: June 2003
Securing Wireless Technology for Healthcare
Author: Retterer, John; Casto, Brian
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: May 2004
Privacy Versus Protection: Weighing Confidentiality Against Public Safety
Author: Rhodes, Harry B.
Source: In Confidence (newsletter)
Publication Date: January 02, 2000
E-Mail Security (1997)
Author: Rhodes, Harry B.
Source: AHIMA practice brief
Publication Date: June 1997
[1] 2