Search Results

= Members only

Current search

198 results.

1 [2] 3 4 5 6 7 8

Uniting Security Forces Against Risk

Author: Wagner, Lew

Source: Journal of AHIMA

Publication Date: June 2002


Threats to your facility’s physical and information security become more complex all the time. To create a truly effective security program, consider developing an integrated security program that encompasses both traditional and information technology protection. The result? A strong, st....

Safe at Home: Remote Coding Meets HIPAA

Author: Keough, Tim

Source: Journal of AHIMA

Publication Date: February 2004


Remote coding offers big benefits and unique security challenges. Here’s how one organization moves patient data securely across the Internet.

"Whatever, in connection with my professional practice, or not in connection with it, I see or hear, in the life of men, which ought....

Primer on Encryption

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: June 2004


Encryption is an addressable implementation specification under HIPAA’s access control and transmission security standards. Many providers are grappling with just how to address these specifications:
Is there a difference between the two specifications, and if so, what is the diff....

1 [2] 3 4 5 6 7 8