113 results.
1 [2] 3 4 5
Seven Select Questions to Ask Your Privacy Officer (Or Yourself)
Author: Downing, Katherine
Source: Journal of AHIMA
Publication Date: April 2014
Privacy and Security Audits of Electronic Health Information (2014 update)
Author: Walsh, Tom; Miaoulis, William M
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: March 2014
Information Security—An Overview (2014 update)
Author: Miaoulis, William M
Source: AHIMA practice brief
Publication Date: January 2014
Privacy and Security Audits of Electronic Health Information (2013 update)
Author: Walsh, Tom
Source: AHIMA practice brief
Publication Date: November 2013
The Privacy and Security of Non-Traditional Occupational Health Services
Author: Dunn, Rose T; Odia, Godwin
Source: Journal of AHIMA
Publication Date: November 2013
Guidelines for a Compliant Business Associate Agreement - Retired
Author: AHIMA
Source: AHIMA practice brief
Publication Date: November 2013
HIPAA Security Overview - Retired
Author: Miaoulis, William M
Source: AHIMA practice brief
Publication Date: November 2013
The Healthcare Wall of Shame
Author: AHIMA
Source: Journal of AHIMA
Publication Date: November 2013
The Privacy and Security of Occupational Health Records
Author: AHIMA
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: April 2013
Patient Portals: Express Lane on the Health Information Highway
Author: Eramo, Lisa A
Source: Journal of AHIMA
Publication Date: September 2012
HIPAA Compliance for Clinician Texting
Author: Greene, Adam H
Source: Journal of AHIMA
Publication Date: April 2012
Ensuring Remote Coding Compliance
Author: Comfort, Angie
Source: Journal of AHIMA - Coding Notes
Publication Date: April 2012
Keeping It Private: Staying Compliant with the HIPAA Privacy and Security Rules
Author: Tomes, Jonathan P.
Source: Journal of AHIMA
Publication Date: March 2012
Automation for Privacy and Security Compliance
Author: McLendon, Kelly
Source: Journal of AHIMA
Publication Date: March 2012
Managing Compliance in Healthcare An Integrated Approach to Privacy, Security, and Identity Management
Author: Shim, Steven
Source: AHIMA Convention
Publication Date: October 02, 2011
Transitioning to a Principle Based Privacy Compliance
Author: Williams, Jutta; Thomason, Mary
Source: AHIMA Convention
Publication Date: October 02, 2011
Information Security—An Overview (2010 update)
Author: AHIMA
Source: AHIMA practice brief
Publication Date: December 2010
HITECH Security – A Practical Approach
Author: Rudloff, Rob
Source: AHIMA Convention
Publication Date: September 28, 2010
Developing an HIM Centric Privacy & IT Security Approach in Healthcare
Author: Cothran, Carey L.; Kost-Woodrow, Beth
Source: AHIMA Convention
Publication Date: September 28, 2010
Moving Targets: Maximizing the Rewards and Minimizing the Risks of Mobile Devices
Author: Tessier, Claudia
Source: Journal of AHIMA
Publication Date: April 2010
Balancing Access, Privacy, and Security: Applying Core Values in an Era of Accelerating Digital Practice
Author: Dowling, Alan F.
Source: Journal of AHIMA
Publication Date: April 2010
Healthcare Breach Management: Business Associate Agreement Addendum
Author: Hjort, Beth M.; Rhodes, Harry B.
Source: AHIMA Advocacy and Policy
Publication Date: January 22, 2010
CMS’s 2009 Security Assessment Process
Author: Dinh, Angela K.
Source: Journal of AHIMA
Publication Date: September 2009
Documenting Data Loss: Losses Must Be Documented Just Like Other Business Activities
Author: Nunn, Sandra L.
Source: Journal of AHIMA
Publication Date: July 2009
Untangling Privacy
Author: Dimick, Chris
Source: Journal of AHIMA
Publication Date: February 2009
1 [2] 3 4 5