113 results.
[1] 2 3 4 5
Standards for Safety, Security, and Interoperability of Medical Devices in an Integrated Health Information Environment
Author: Williams, Patricia A.H
Source: Journal of AHIMA
Publication Date: April 2017
Things Privacy Officers Can Do Today to Defend Against a Cyberattack
Author: Arvin, Marti
Source: Journal of AHIMA
Publication Date: April 2017
Statistically, What’s the Chance of a Breach?
Author: Wiedemann, Lou Ann
Source: Journal of AHIMA
Publication Date: March 2017
Considerations for Contracting with Cybersecurity Firms
Author: Glondys, Barbara
Source: Journal of AHIMA
Publication Date: July 2016
Information Governance for Offsite Data Security
Author: Saharia, Devendra
Source: Journal of AHIMA
Publication Date: April 2016
Privacy and Security a Gordian Knot Far From Being Cut
Author: Gordon, Lynne Thomas
Source: Journal of AHIMA
Publication Date: April 2016
Shifting from Reactive to Proactive HIPAA Audits
Author: Brinda, Danika
Source: Journal of AHIMA
Publication Date: January 2016
DIY Privacy Risk Assessments
Author: Butler, Mary
Source: Journal of AHIMA - website
Publication Date: November 2015
Cybersecurity 101
Author: Lucci, Susan; Walsh, Tom
Source: Journal of AHIMA
Publication Date: November 2015
Evolving Role of the Privacy and Security Officer
Author: Bowen, Rita K.
Source: Journal of AHIMA
Publication Date: June 2015
Privacy Holes in the 'Hidden Healthcare System': Students' PHI-laden Education Records that are Stored and Shared Electronically Don’t Have the Same Safeguards as most EHRs
Author: DuBravec, Daniel A; Daigle, Matt
Source: Journal of AHIMA
Publication Date: June 2015
Sample (Chief) Security Officer Job Description
Author: AHIMA Privacy and Security Practice Council
Source: AHIMA sample job description
Publication Date: May 2015
Beware the Dark Side of the Web
Author: Journal of AHIMA Staff
Source: Journal of AHIMA
Publication Date: May 2015
Biggest Security Lapses for 2014-2015 and How to Handle Them
Author: Butler, Mary
Source: Journal of AHIMA - website
Publication Date: April 2015
Consumer Access to EHRs Could Help Improve Security Efforts
Author: Butler, Mary
Source: Journal of AHIMA - website
Publication Date: April 2015
Cracking Encryption: Despite Benefits, Technology Still Not Widely Used to Combat Multi-Million Dollar Breaches
Author: Butler, Mary
Source: Journal of AHIMA
Publication Date: April 2015
Where to Begin with Cyber Defense
Author: Lewis, Sharon; McDonald, Kevin B
Source: Journal of AHIMA
Publication Date: April 2015
Industry Awaits Phase 2 of HIPAA Audit Program
Author: Asmonga, Donald D.
Source: Journal of AHIMA
Publication Date: January 2015
Security Starts at Admissions, But Can’t End After Discharge
Author: Morper, Mike
Source: Journal of AHIMA
Publication Date: November 2014
Comparative Cost of Inadequate Protection: Healthcare Breaches Ranked the Most Expensive
Author: AHIMA Staff
Source: Journal of AHIMA
Publication Date: October 2014
Who Are You? Authenticating Consumer Identity is Becoming Increasingly Important in Healthcare
Author:
Source: Journal of AHIMA
Publication Date: September 2014
Trusted Health IT and IT-as-a-Service: A Prescription for Change
Author: Katz, Roberta
Source: Journal of AHIMA - website
Publication Date: August 2014
Download Two Apps and Text Me in the Morning: Physicians are Increasingly Prescribing mHealth Apps, but Privacy and Security Worries Remain
Author: AHIMA
Source: Journal of AHIMA
Publication Date: May 2014
Black Market PHI Does Exist: Why It’s Time to Take Security Risk Assessments Seriously
Author:
Source: Journal of AHIMA
Publication Date: May 2014
ACA Raises Privacy, Security Concerns, Study Finds
Author: Butler, Mary
Source: Journal of AHIMA - website
Publication Date: May 01, 2014
[1] 2 3 4 5