Search Results

= Members only

Current search

31 results.

1 [2] 3 4

How to Conduct an Information Security Risk Analysis

Author:

Source: AHIMA Today

Publication Date: October 07, 2009


Consider the following scenario. During a conversation with your neighbor, you mention that your pediatrician has not yet received the operative report from your daughter’s appendectomy almost three weeks ago. Your neighbor, who resigned as a medical transcriptionist from the local hospital a m....

Securing Portable Devices

Author: Dinh, Angela K.

Source: Journal of AHIMA

Publication Date: January 2009


Reports of data breaches involving portable devices last year ran the gamut from oversight to theft: a college of medicine professor gave away a personal computer containing protected health information, including photos of his patients, to friends; a flash drive containing Social Security num....

1 [2] 3 4