Search Results

= Members only

Current search

95 results.

1 2 3 4 5 6 7 [8] 9 10

Sample Information Security Program

Author: Ballam, Holly

Source: Journal of AHIMA

Publication Date: March 1999


Information Security Program
XYZ Hospital
Effective Date      
         ..............................................................................................................................

1. Poli....

Primer on Encryption

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: June 2004


Encryption is an addressable implementation specification under HIPAA’s access control and transmission security standards. Many providers are grappling with just how to address these specifications:
Is there a difference between the two specifications, and if so, what is the diff....

Journal Q&A (2/00)

Author: AHIMA Professional Practice Team

Source: AHIMA Q and A

Publication Date: February 02, 2000

Q: What Internet security guidelines are available?
A: Initially, Medicare issued a statement that the Internet was not secure enough for transmission of sensitive data. However, the growing demand for transmittal of HCFA Privacy Act-protected data via the Internet resulted in HCFA's....

1 2 3 4 5 6 7 [8] 9 10