Search Results

= Members only

Current search

56 results.

1 2 3 4 [5] 6

Stealth Software Deters PHI Theft

Author: Kawles, Terrance L.

Source: Journal of AHIMA

Publication Date: July 2003


As the leading edge of digital portability advances, the protections afforded the “portability” portion of HIPAA become strained. Under the final security standards, covered entities (CEs) must establish procedures and mechanisms to protect the confidentiality, integrity, and availab....

Biometric Technology Offers Secure Solutions

Author: Wheeler, Doug

Source: In Confidence (newsletter)

Publication Date: May 02, 2002


The latest information from the Centers for Disease Control and Prevention on emergency department visits indicates that the number of patient visits continues to climb. If the current increase in patient volume continues, emergency departments across the US will handle approximately 115 mill....

Key to Using Digital Certificates

Author: Barnett, David H.

Source: In Confidence (newsletter)

Publication Date: April 02, 2002


This is the second article in a two-part series.
Background

For over 2,000 years, in all recorded histories and for all civilizations, sending secret messages required that both the sender and receiver share a common secret key. The key that decrypted a message was the same a....

Implementing a Mobile Coding Solution

Author: Colgan, Peter

Source: In Confidence (newsletter)

Publication Date: July 02, 2001


Wireless computing technologies capable of enabling clinical and administrative decision support throughout the extended healthcare enterprise have arrived! Among the benefits of any wireless healthcare solution is the wide distribution of information throughout the enterprise. This benefit r....

1 2 3 4 [5] 6