Search Results

= Members only

Current search

540 results.

[1] 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 >>

You've Got Inappropriate Mail

Author: Planchon, Don

Source: In Confidence (newsletter)

Publication Date: July 02, 2000


The use of e-mail and Internet access as a communication and research tool is now of strategic importance to both healthcare providers and consumers worldwide. However, use, or rather misuse, of these communication tools has introduced a host of security and legal threats uncontrolled by trad....

Workflow for Breach Notification

Author: Walsh, Tom

Source: Journal of AHIMA

Publication Date: April 2010


Federal regulations that took effect in September 2009 require HIPAA covered entities and their business associates to notify individuals if their protected health information (PHI) was accessed or disclosed in an unauthorized manner or by unauthorized individuals. Certain exemptions apply, su....

Where to Begin with Cyber Defense

Author: Lewis, Sharon; McDonald, Kevin B

Source: Journal of AHIMA

Publication Date: April 2015



As data is made more readily available through a growing number of public and private channels, understanding the risks is critical. Patients expect organizations to take the steps required to protect their sensitive and personal information as it is being produced, processed, shared, and....

[1] 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 >>