95 results.
1 2 3 4 5 [6] 7 8 9 10
Managing Information Security in Heathcare
Author: HIMSS CPRI Toolkit Work Group
Source: External web site
Publication Date: January 01, 2004
HIMSS Privacy & Security Toolkit
Author: HIMSS Privacy and Security Toolkit Work Group
Source: External web site
Publication Date: January 02, 2007
Security Audits (2000)
Author: Hjort, Beth M.
Source: AHIMA practice brief
Publication Date: September 2000
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
Security Audits (2003 update)
Author: Hjort, Beth M.
Source: AHIMA practice brief
Publication Date: November 2003
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
Information Security: It Takes a Community
Author: Hjort, Beth M.
Source: Journal of AHIMA
Publication Date: January 2001
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) reinforces what HIM professionals have known for a long time: security training is a prudent and valuable mission for an organization to support. Besides the obvious need for compliance with this new federal mandate, it’s....
On the Line: Professional Practice Solutions (3/03)
Author: Hjort, Beth M.
Source: AHIMA Q and A | Journal of AHIMA
Publication Date: March 2003
Q: When is it appropriate to separate files for select types of medical records? What practice guidelines are available?
A: Circumstances, reasons, and applicable laws affect decisions to create separate medical record files within varying types of healthcare organizations. Org....
Portable Computer Security (2000)
Author: Hughes, Gwen
Source: AHIMA practice brief
Publication Date: October 2000
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
E-Mail Security
Author: Hughes, Gwen
Source: AHIMA practice brief
Publication Date: February 2000
This practice brief has been retired. It is made available for historical purposes only.
Is Fingerprint Technology the Right Choice for Access Control?
Author: Katz, Neil A.
Source: In Confidence (newsletter)
Publication Date: October 02, 2002
After you determine that you want to use biometrics for your access control solution, the process has just begun. There are numerous issues to consider, including the type of biometric device you want to use, cost, ease of use, false negatives, false positives, reliability of the system, and....
Safe at Home: Remote Coding Meets HIPAA
Author: Keough, Tim
Source: Journal of AHIMA
Publication Date: February 2004
Remote coding offers big benefits and unique security challenges. Here’s how one organization moves patient data securely across the Internet.
"Whatever, in connection with my professional practice, or not in connection with it, I see or hear, in the life of men, which ought....
1 2 3 4 5 [6] 7 8 9 10