95 results.
1 2 3 4 5 6 7 [8] 9 10
Information Security: an Overview (2003 update)
Author: Quinsey, Carol Ann
Source: AHIMA practice brief
Publication Date: November 2003
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
Portable Computer Security (2003 update)
Author: Quinsey, Carol Ann; Hughes, Gwen
Source: AHIMA practice brief
Publication Date: June 2003
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
Securing Wireless Technology for Healthcare
Author: Retterer, John; Casto, Brian
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: May 2004
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
Privacy Versus Protection: Weighing Confidentiality Against Public Safety
Author: Rhodes, Harry B.
Source: In Confidence (newsletter)
Publication Date: January 02, 2000
We all agree that appropriately used information has many benefits. However, many of us are so fearful of the damage that could occur through inappropriately utilized information, we demand access restrictions far greater than what currently exist for paper records. Fueling our national ob....
E-Mail Security (1997)
Author: Rhodes, Harry B.
Source: AHIMA practice brief
Publication Date: June 1997
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
Establishing the Information Security Manager's Job Description
Author: Rhodes, Harry B.
Source: In Confidence (newsletter)
Publication Date: January 02, 2000
Though the need for the information security manager has been clearly mandated by the Health Insurance Portability and Accountability Act (HIPAA), the information security manager’s exact role is still evolving. Because of this, development of an appropriate job description for the position r....
Information Governance’s Privacy and Security Component
Author: Rose, Angela Dinh
Source: Journal of AHIMA
Publication Date: November 2013
In the most simple terms, information governance is the accountability framework and decision rights employed by an organization to ensure effective and efficient use of information across the enterprise. Ideally, this also achieves enterprise information management (EIM), which is the inf....
Moving Toward a Unified Information Security Program
Author: Ruano, Michael
Source: Journal of AHIMA
Publication Date: January 2003
Is your organization up to the challenge of creating a unified information security program?
A unified information security program has been all but mandated for healthcare organizations by the federal government. HIPAA requires that electronic, paper, and oral patient identif....
Information Governance for Offsite Data Security
Author: Saharia, Devendra
Source: Journal of AHIMA
Publication Date: April 2016
Disruptive technology can turn any industry on its head—virtually overnight. Just five years ago, summoning a taxi was an inefficient, time-consuming effort that often involved dialing up a dispatcher, who contacted a driver, who would then make their way to your location, perhaps in an h....
Intrusion Detection FAQ
Author: SANS (SysAdmin Audit Network Security) Institute
Source: External web site
Publication Date: June 12, 2003
1 2 3 4 5 6 7 [8] 9 10