Search Results

= Members only

Current search

95 results.

1 2 [3] 4 5 6 7 8 9 10

Internal Audit Model for Information Security

Author: Mead, Kevin

Source: In Confidence (newsletter)

Publication Date: July 02, 2000


Internal auditors are found within many organizations, and have traditionally concerned themselves with the protection of assets. In the past, this manifested itself by the placing of asset tags on furniture and equipment and verifying the presence of the asset each year. Recently, however, i....

Protection of Personal Data -- The European View

Author: Mathews, Steve

Source: Journal of AHIMA

Publication Date: March 1998


A new series of laws are being passed to control the processing of personal information -- including medical information -- inside the European Commonwealth. The author gives an overview of the European view of personal information and examines the implications for healthcare professionals bo....

1 2 [3] 4 5 6 7 8 9 10