132 results.
1 2 3 4 5 6 7 8 [9] 10 11 12 13 14
No Harm Done? Assessing Risk of Harm under the Federal Breach Notification Rule
Author: Dimick, Chris
Source: Journal of AHIMA
Publication Date: August 2010
Guide to California’s Breaches: First Year of State reporting requirement Reveals Common Privacy Violations
Author: Dimick, Chris
Source: Journal of AHIMA
Publication Date: April 2010
The New Privacy Officer
Author: Dimick, Chris
Source: Journal of AHIMA
Publication Date: April 2012
Uncovering the Enemy Within: Utilizing Incident Response, Forensics
Author: Derhak, Mike
Source: In Confidence (newsletter)
Publication Date: September 02, 2003
Data Mining a Breach’s Silver Lining: Analyze Breach Data to Improve Release of Information Performance in HIM
Author: Delahoussaye, Elizabeth A
Source: Journal of AHIMA
Publication Date: October 2016
Identity Theft and Fraud--the Impact on HIM Operations
Author: Davis, Nancy; Lemery, Chrisann; Roberts, Kim
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: April 2005
Meeting the FTC’s Red Flag Requirements: How One Organization Developed Its Compliance Plan
Author: Davis, Nancy
Source: Journal of AHIMA
Publication Date: February 2009
Developing an HIM Centric Privacy & IT Security Approach in Healthcare
Author: Cothran, Carey L.; Kost-Woodrow, Beth
Source: AHIMA Convention
Publication Date: September 28, 2010
Model Contract for Health Information Exchange
Author: Connecting for Health
Source: External - used with permission
Publication Date: April 06, 2006
HIPAA Breach Enforcement Roundup
Author: Cacciatore, Victoria; Downing, Katherine
Source: Journal of AHIMA
Publication Date: July 2014
1 2 3 4 5 6 7 8 [9] 10 11 12 13 14