98 results.
1 2 3 4 [5] 6 7 8 9 10
Guidance on Risk Analysis Requirements under the HIPAA Security Rule
Author: U.S. Office for Civil Rights
Source: Government (U.S.) | U.S. Department of Health & Human Services
Publication Date: July 15, 2010
Electronic Devices Create New Challenges for HIM
Author: Dimick, Chris
Source: AHIMA Advantage
Publication Date: May 2010
Moving Targets: Maximizing the Rewards and Minimizing the Risks of Mobile Devices
Author: Tessier, Claudia
Source: Journal of AHIMA
Publication Date: April 2010
How to Conduct an Information Security Risk Analysis
Author:
Source: AHIMA Today
Publication Date: October 07, 2009
Information Security Risk Analysis for Health Information Managers
Author: Sheldon-Dean, Jim
Source: AHIMA Convention
Publication Date: October 05, 2009
Securing Portable Devices
Author: Dinh, Angela K.
Source: Journal of AHIMA
Publication Date: January 2009
Security and Systems Requirements
Author: Connecting for Health
Source: External - used with permission | External healthcare industry report
Publication Date: June 25, 2008
Testing and Monitoring Access Policy Controls: The Right Controls Can Boost Compliance and Efficiency
Author: Traverse, Cheryl
Source: Journal of AHIMA
Publication Date: May 2008
Teeth for HIPAA in 2008? CMS Announces Plans for Security “Assessments”
Author: Dinh, Angela K.
Source: Journal of AHIMA
Publication Date: March 2008
How to React to a Security Incident
Author: AHIMA Privacy and Security Practice Council (2007)
Source: Journal of AHIMA
Publication Date: January 2008
1 2 3 4 [5] 6 7 8 9 10