113 results.
1 2 3 [4] 5
Smart Cards May Make Security a Non-Issue
Author: Deike, Karen
Source: In Confidence (newsletter)
Publication Date: November 02, 2000
Developing an HIM Centric Privacy & IT Security Approach in Healthcare
Author: Cothran, Carey L.; Kost-Woodrow, Beth
Source: AHIMA Convention
Publication Date: September 28, 2010
CPRI-HOST Toolkit: Developing New Guidance on Sound Security Practices
Author: Cooper, Ted
Source: In Confidence (newsletter)
Publication Date: April 02, 2003
Security and Systems Requirements
Author: Connecting for Health
Source: External - used with permission | External healthcare industry report
Publication Date: June 25, 2008
Ensuring Remote Coding Compliance
Author: Comfort, Angie
Source: Journal of AHIMA - Coding Notes
Publication Date: April 2012
Biggest Security Lapses for 2014-2015 and How to Handle Them
Author: Butler, Mary
Source: Journal of AHIMA - website
Publication Date: April 2015
DIY Privacy Risk Assessments
Author: Butler, Mary
Source: Journal of AHIMA - website
Publication Date: November 2015
Cracking Encryption: Despite Benefits, Technology Still Not Widely Used to Combat Multi-Million Dollar Breaches
Author: Butler, Mary
Source: Journal of AHIMA
Publication Date: April 2015
Consumer Access to EHRs Could Help Improve Security Efforts
Author: Butler, Mary
Source: Journal of AHIMA - website
Publication Date: April 2015
ACA Raises Privacy, Security Concerns, Study Finds
Author: Butler, Mary
Source: Journal of AHIMA - website
Publication Date: May 01, 2014
Remote Coding Solution Offers Ultimate in Privacy, Security Measures
Author: Brucker, Mary Ann
Source: In Confidence (newsletter)
Publication Date: June 02, 2003
Shifting from Reactive to Proactive HIPAA Audits
Author: Brinda, Danika
Source: Journal of AHIMA
Publication Date: January 2016
Enterprise Access to Online HIM Information: a Status Report
Author: Bowers, Donna
Source: In Confidence (newsletter)
Publication Date: May 02, 2000
Evolving Role of the Privacy and Security Officer
Author: Bowen, Rita K.
Source: Journal of AHIMA
Publication Date: June 2015
Security @ the Edge
Author: Boroditsky, Marc
Source: In Confidence (newsletter)
Publication Date: November 02, 2000
E-Health and PKI Interoperability (Part 2)
Author: Barnett, David H.
Source: In Confidence (newsletter)
Publication Date: November 02, 2000
Value of Digital Signatures
Author: Barnett, David H.
Source: In Confidence (newsletter)
Publication Date: March 02, 2002
E-Health and PKI Interoperability (Part 1)
Author: Barnett, David H.
Source: In Confidence (newsletter)
Publication Date: September 02, 2000
Protecting Your Assets: Identifying and Securing Against Vulnerabilities
Author: Banzhof, Carl
Source: In Confidence (newsletter)
Publication Date: October 02, 2003
Securing Your IT Environment from the Inside Out
Author: Bakman, Alex
Source: In Confidence (newsletter)
Publication Date: September 02, 2001
Industry Awaits Phase 2 of HIPAA Audit Program
Author: Asmonga, Donald D.
Source: Journal of AHIMA
Publication Date: January 2015
Things Privacy Officers Can Do Today to Defend Against a Cyberattack
Author: Arvin, Marti
Source: Journal of AHIMA
Publication Date: April 2017
Digital Signature & PKI Assessment Guidelines
Author: American Bar Association
Source: External web site
Publication Date: August 01, 1996
Help in Setting Access Controls: Using the HL7 RBAC Healthcare Permission Catalog to Reduce Data Breaches
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: November 2008
Comparative Cost of Inadequate Protection: Healthcare Breaches Ranked the Most Expensive
Author: AHIMA Staff
Source: Journal of AHIMA
Publication Date: October 2014
1 2 3 [4] 5