113 results.
1 2 3 4 5 6 7 [8] 9 10 11 12
HIPAA Requirements for Secure Record Storage and Data Transfer
Author: Rosenbaum, Arnold S.; Nelson, Gina A.
Source: AHIMA Convention
Publication Date: October 15, 2004
Connecting with Consumers: Web-based Health Technologies and Keeping Them Secure
Author: Friedman, Beth; Pierson, Ed
Source: AHIMA Convention
Publication Date: October 15, 2004
Health Information Security: Revisiting the 80/20 Rule
Author: Kloss, Linda L
Source: Journal of AHIMA
Publication Date: February 2004
Using Web-based Report Management to Achieve HIPAA Compliance
Author: Levin, Jerry
Source: In Confidence (newsletter)
Publication Date: November 02, 2003
Protecting Your Assets: Identifying and Securing Against Vulnerabilities
Author: Banzhof, Carl
Source: In Confidence (newsletter)
Publication Date: October 02, 2003
Uncovering the Enemy Within: Utilizing Incident Response, Forensics
Author: Derhak, Mike
Source: In Confidence (newsletter)
Publication Date: September 02, 2003
Managing Applications, Systems Development Security Under HIPAA
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: September 02, 2003
Security and HIPAA: Protecting Your Operations
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: August 02, 2003
Establishing Security Safeguards to Meet the Privacy Rule: What You Need to Know
Author: Gallagher, Lisa; Yale, Ken
Source: In Confidence (newsletter)
Publication Date: August 02, 2003
Building Privacy: Security Architecture, Models Under HIPAA
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: July 02, 2003
1 2 3 4 5 6 7 [8] 9 10 11 12