Search Results

= Members only

Current search

56 results.

1 2 [3] 4 5 6

Stealth Software Deters PHI Theft

Author: Kawles, Terrance L.

Source: Journal of AHIMA

Publication Date: July 2003


As the leading edge of digital portability advances, the protections afforded the “portability” portion of HIPAA become strained. Under the final security standards, covered entities (CEs) must establish procedures and mechanisms to protect the confidentiality, integrity, and availab....

Internet "Cookie Jar"

Author: Hughes, Gwen

Source: In Confidence (newsletter) | AHIMA Q and A

Publication Date: May 02, 2001


Q: What does the term “cookie”mean when used in reference to the Internet? Are cookies something I need to be concerned about?
A: Cookies are bits of code sent to your computer by the Web sites you visit. These cookies allow sites to collect and store information about your visits. Cook....

1 2 [3] 4 5 6