Search Results

= Members only

Current search

95 results.

[1] 2 3 4 5 6 7 8 9 10

Information Security--A Database View

Author: Zender, Anne

Source: Journal of AHIMA

Publication Date: March 1998



HIM professionals agree that applying the principles of information security is important in a hospital setting. But as Sharon Johnson, RRA, knows, those principles can be applied in many situations--including settings under construction. Since spring 1997, Johnson has been ....

Uniting Security Forces Against Risk

Author: Wagner, Lew

Source: Journal of AHIMA

Publication Date: June 2002


Threats to your facility’s physical and information security become more complex all the time. To create a truly effective security program, consider developing an integrated security program that encompasses both traditional and information technology protection. The result? A strong, st....

EMR ... CMR ... CPR ... G-CPR??

Author: Tadwalt, Bobbi

Source: Brief Encounter

Publication Date: October 02, 1999


Most of you have probably heard of the first few acronyms listed in the title; however, it is likely most of you have never heard of the G-CPR. Most people hadn't, until they attended the Multi-Specialty Group Educational Forum held in Baltimore, MD this past March. Robert M. Kolodner, MD, th....

Encryption Basics

Author: Stine, Kevin; Dang, Quynh

Source: Journal of AHIMA

Publication Date: May 2011


Healthcare and health IT professionals are entrusted with protecting the privacy and confidentiality of patient data. To provide this protection, these professionals frequently look to commonly accepted technologies and methodologies to safeguard the data while at rest and in transit. One tech....

[1] 2 3 4 5 6 7 8 9 10