Search Results

= Members only

Current search

1097 results.

<< 2 3 4 5 6 7 8 9 [10] 11 12 13 14 15 16 17 >>

Information Security—An Overview (2010 update)

Author: AHIMA

Source: AHIMA practice brief

Publication Date: December 2010

..hod used to preserve the Confidentiality , integrity, and availabi.. ..e resources to a loss of Confidentiality , integrity, or availabil.. ..inst the criticality and Confidentiality of the information they .. ..se of their expertise in Confidentiality and legal and regulatory..

Electronic Signature, Attestation, and Authorship (2009 update) - Retired

Author: AHIMA e-HIM Work Group: Best Practices for Electronic Signature and Attestation

Source: AHIMA practice brief | Journal of AHIMA

Publication Date: November 2009

..thentication is the Security process of verifying a u.. ..ns can add more tiers of Security to the signature, such a.. ..ith attendant end-to-end Security safeguards that establis.. ..rmation Technology– Security Techniques–Digital.. .. Security of Passwords and PINs ..

Privacy and Security Gaps in Health Information Exchanges

Author: AHIMA; HIMSS

Source: AHIMA report

Publication Date: June 09, 2011

..manner, protecting the Confidentiality of the information among.. ..nforces and protects the Confidentiality , integrity, and availabi.. ..he risks associated with Confidentiality , integrity, and availabi.. ..the Confidentiality , integrity, and availabi.. ..clearly describe how the Confidentiality , integrity, and availabi..

<< 2 3 4 5 6 7 8 9 [10] 11 12 13 14 15 16 17 >>