132 results.
1 2 3 4 [5] 6 7 8 9 10 11 12 13 14
Access, Use, and Disclosure: HITECH’s Impact on the HIPAA Touchstones
Author: Miaoulis, William M
Source: Journal of AHIMA
Publication Date: March 2010
Adapting BA Practices to Meet the Omnibus Rule
Author: McSteen, Thomas
Source: Journal of AHIMA
Publication Date: September 2013
Automation for Privacy and Security Compliance
Author: McLendon, Kelly
Source: Journal of AHIMA
Publication Date: March 2012
HIPAA Changes Call for Revising BA Agreements
Author: McDavid, Jan P
Source: Journal of AHIMA
Publication Date: May 2013
Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) [DRAFT]
Author: McCallister, Erika; Grance, Tim; Scarfone, Karen
Source: Government (U.S.)
Publication Date: January 13, 2009
Notification of Misuse or Breach
Author: Markle Foundation; Connecting for Health
Source: External healthcare industry report | External - used with permission
Publication Date: June 25, 2008
Breaches of Confidential Health Information
Author: Markle Foundation; Connecting for Health
Source: External healthcare industry report | External - used with permission
Publication Date: April 06, 2006
Exploring Medical Identity Theft
Author: Mancilla, Desla; Moczygemba, Jackie
Source: Perspectives in Health Information Management
Publication Date: September 2009
Medical Identity Theft: An Exploratory Foundational Study
Author: Mancilla, Desla; Moczygemba, Jackie
Source: AHIMA Convention
Publication Date: October 05, 2009
Cybersecurity 101
Author: Lucci, Susan; Walsh, Tom
Source: Journal of AHIMA
Publication Date: November 2015
1 2 3 4 [5] 6 7 8 9 10 11 12 13 14