113 results.
1 2 [3] 4 5
Surviving a CMS Security Investigation: Oregon Facility Shares an Early Look at the Process
Author: Hofman, Judi
Source: Journal of AHIMA
Publication Date: February 2009
Securing Portable Devices
Author: Dinh, Angela K.
Source: Journal of AHIMA
Publication Date: January 2009
Help in Setting Access Controls: Using the HL7 RBAC Healthcare Permission Catalog to Reduce Data Breaches
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: November 2008
Synching up Privacy and Security
Author:
Source: AHIMA Today
Publication Date: October 13, 2008
Security and Systems Requirements
Author: Connecting for Health
Source: External - used with permission | External healthcare industry report
Publication Date: June 25, 2008
Immutable Audit Trails
Author: Markle Foundation; Connecting for Health
Source: External healthcare industry report | External - used with permission
Publication Date: June 25, 2008
Developing Emergency Access Standards for EHR Systems: The HL7 Standards Development Process Helps (and Empowers) HIM Processes
Author: Gelzer, Reed D.
Source: Journal of AHIMA
Publication Date: May 2008
Testing and Monitoring Access Policy Controls: The Right Controls Can Boost Compliance and Efficiency
Author: Traverse, Cheryl
Source: Journal of AHIMA
Publication Date: May 2008
HIPAA Security Compliance: What Comes Next?
Author: Dinh, Angela K.
Source: External - used with permission
Publication Date: May 02, 2008
Online, On Message, On Duty: Privacy Experts Share Their Challenges
Author: AHIMA
Source: AHIMA report
Publication Date: April 15, 2008
Teeth for HIPAA in 2008? CMS Announces Plans for Security “Assessments”
Author: Dinh, Angela K.
Source: Journal of AHIMA
Publication Date: March 2008
Handling Sensitive Information in an NHIN
Author: Dimick, Chris
Source: Journal of AHIMA
Publication Date: February 2008
How to React to a Security Incident
Author: AHIMA Privacy and Security Practice Council (2007)
Source: Journal of AHIMA
Publication Date: January 2008
HIPAA Security Redux: A Re-evaluation Process and Recommended Areas to Review
Author: Adler, M. Peter
Source: Journal of AHIMA
Publication Date: November 2007
Renewing HIM's Commitment to Privacy and Security
Author: Kloss, Linda L
Source: Journal of AHIMA
Publication Date: November 2007
Privacy and Confidentiality by Design: Fundamental Design Principles for Health IT
Author: Mon, Donald T.
Source: Journal of AHIMA
Publication Date: November 2006
Resource for Privacy and Security Programs: Version 5.0 of HIMSS CPRI Toolkit Expands to Include Privacy Topics
Author: Demster, Barbara
Source: Journal of AHIMA
Publication Date: July 2006
Privacy and Security Challenges in HIEs: Unique Factors Add New Complexities to Familiar Issues
Author: Rhodes, Harry B.
Source: Journal of AHIMA
Publication Date: July 2006
Tough Compliance Questions to Ask Your Business Associates
Author: Klasa, Marge
Source: AHIMA Convention
Publication Date: October 21, 2005
Application of Data Security for Electronic Health Information
Author: Abbott, Debbie
Source: AHIMA Convention
Publication Date: October 15, 2004
HIPAA Requirements for Secure Record Storage and Data Transfer
Author: Rosenbaum, Arnold S.; Nelson, Gina A.
Source: AHIMA Convention
Publication Date: October 15, 2004
Connecting with Consumers: Web-based Health Technologies and Keeping Them Secure
Author: Friedman, Beth; Pierson, Ed
Source: AHIMA Convention
Publication Date: October 15, 2004
Health Information Security: Revisiting the 80/20 Rule
Author: Kloss, Linda L
Source: Journal of AHIMA
Publication Date: February 2004
Using Web-based Report Management to Achieve HIPAA Compliance
Author: Levin, Jerry
Source: In Confidence (newsletter)
Publication Date: November 02, 2003
Protecting Your Assets: Identifying and Securing Against Vulnerabilities
Author: Banzhof, Carl
Source: In Confidence (newsletter)
Publication Date: October 02, 2003
1 2 [3] 4 5