Search Results

= Members only

Current search

215 results.

<< 7 8 9 10 11 12 [13] 14 15 16 17 18 19 20 21 22

Security and HIPAA: Protecting Your Operations

Author: Ruano, Michael

Source: In Confidence (newsletter)

Publication Date: August 02, 2003


Part six in a 10-part series.
This article is the sixth of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. The information security domain of operations security includes the topics of controls, protections, monitoring,....

Stealth Software Deters PHI Theft

Author: Kawles, Terrance L.

Source: Journal of AHIMA

Publication Date: July 2003


As the leading edge of digital portability advances, the protections afforded the “portability” portion of HIPAA become strained. Under the final security standards, covered entities (CEs) must establish procedures and mechanisms to protect the confidentiality, integrity, and availab....

<< 7 8 9 10 11 12 [13] 14 15 16 17 18 19 20 21 22