Search Results

= Members only

Current search

1097 results.

<< 11 12 13 14 15 16 17 18 [19] 20 21 22 23 24 25 26 >>

Kick Starting the Security Risk Analysis

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: July 2004

..d vulnerabilities to the Confidentiality , integrity, and availabi.. .. Unauthorized access Confidentiality Wrongful disclosure a.. ..dentifies three targets: Confidentiality , data integrity, and ava.. .. care, cause a breach of Confidentiality , result in a complaint o..

What is Security Auditing?

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: November 2004

..d vulnerabilities to the Confidentiality , integrity, and .. ..HIMSS The HIPAA Security rule includes a .. ..d manage ongoing Security for a variety of process.. ..ed to “information Security activity review,&r.. .. So what are the “ Security audits” people are..

Trouble with Audit Controls

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: October 2004

..tigations into potential Confidentiality breaches. Risk managers .. ..ly a potential breach of Confidentiality , but also techni.. ..t difficult of the HIPAA Security standards to imple.. ..en the information Security official (ISO) and execu..

<< 11 12 13 14 15 16 17 18 [19] 20 21 22 23 24 25 26 >>