132 results.
1 2 3 4 [5] 6
Avoiding Liability for Business Associates' Breaches: Rule Changes Overview
Author: Tomes, Jonathan P.
Source: Journal of AHIMA - website
Publication Date: January 2014
Avoiding Liability for Business Associates' Breaches: Guidance
Author: Tomes, Jonathan P.
Source: Journal of AHIMA - website
Publication Date: January 2014
Avoiding Liability for Business Associates' Breaches: Adjustments and Ongoing Strategies
Author: Tomes, Jonathan P.
Source: Journal of AHIMA - website
Publication Date: January 2014
HIPAA Whistleblower Protections Promote Information Governance
Author: Butler, Mary
Source: Journal of AHIMA - website
Publication Date: March 01, 2014
Breach Management Toolkit: a Comprehensive Guide for Compliance
Author: AHIMA Work Group
Source: AHIMA toolkit
Publication Date: March 2014
Seven Select Questions to Ask Your Privacy Officer (Or Yourself)
Author: Downing, Katherine
Source: Journal of AHIMA
Publication Date: April 2014
Top HITECH-HIPAA Compliance Obstacles Emerge: Analyzing lessons learned from six months of Omnibus Privacy Rule implementation efforts
Author: Butler, Mary
Source: Journal of AHIMA
Publication Date: April 2014
On the HIPAA Hook
Author: Hicks, Andrew
Source: Journal of AHIMA
Publication Date: April 2014
ACA Raises Privacy, Security Concerns, Study Finds
Author: Butler, Mary
Source: Journal of AHIMA - website
Publication Date: May 01, 2014
Black Market PHI Does Exist: Why It’s Time to Take Security Risk Assessments Seriously
Author:
Source: Journal of AHIMA
Publication Date: May 2014
Navigating a Compliant Breach Management Process
Author: Downing, Katherine
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: June 2014
HIPAA Breach Enforcement Roundup
Author: Cacciatore, Victoria; Downing, Katherine
Source: Journal of AHIMA
Publication Date: July 2014
HIPAA's Place in Court-Ordered Discovery: Determining What's Legal During Litigation Health Record Requests
Author: Hedges, Ron; Brady, Kevin
Source: Journal of AHIMA
Publication Date: September 2014
What Caused the Breach? An Examination of Use of Information Technology and Health Data Breaches
Author: Wikina, Suanu Bliss
Source: Perspectives in Health Information Management
Publication Date: October 2014
Comparative Cost of Inadequate Protection: Healthcare Breaches Ranked the Most Expensive
Author: AHIMA Staff
Source: Journal of AHIMA
Publication Date: October 2014
FDA Offers Guidance on Cybersecurity and Medical Devices
Author: Thomas, Liisa; Udofia, Idara
Source: Journal of AHIMA
Publication Date: February 2015
Cracking Encryption: Despite Benefits, Technology Still Not Widely Used to Combat Multi-Million Dollar Breaches
Author: Butler, Mary
Source: Journal of AHIMA
Publication Date: April 2015
Clearing the HIPAA Cobwebs: New ONC Chief Privacy Officer Lucia Savage Focuses on Balancing Privacy and Security with Expanding Interoperable EHR Exchange
Author: Dimick, Chris
Source: Journal of AHIMA
Publication Date: April 2015
Where to Begin with Cyber Defense
Author: Lewis, Sharon; McDonald, Kevin B
Source: Journal of AHIMA
Publication Date: April 2015
Creating an Environment of Trust for Patients and Consumers
Author: Birnbaum, Cassi L
Source: Journal of AHIMA
Publication Date: April 2015
Biggest Security Lapses for 2014-2015 and How to Handle Them
Author: Butler, Mary
Source: Journal of AHIMA - website
Publication Date: April 2015
Beware the Dark Side of the Web
Author: Journal of AHIMA Staff
Source: Journal of AHIMA
Publication Date: May 2015
Cybersecurity 101
Author: Lucci, Susan; Walsh, Tom
Source: Journal of AHIMA
Publication Date: November 2015
Shifting from Reactive to Proactive HIPAA Audits
Author: Brinda, Danika
Source: Journal of AHIMA
Publication Date: January 2016
Exploring Encryption and Standards in Release of Information
Author: Butler, Mary
Source: Journal of AHIMA - website
Publication Date: January 2016
1 2 3 4 [5] 6