Uncovering the Enemy Within: Utilizing Incident Response, Forensics
Inappropriate sharing of protected health information. Sending intimidating e-mails. Browsing inappropriate Web sites. Downloading unauthorized Web content. Software, music, or video piracy. These are just a few examples of internal security breaches companies may face. According to the 2003....
You are trying to access a resource only available to AHIMA members. Join today to have full access to everything in the BoK, take advantage of all the benefits of AHIMA membership, and become part of a network of more than 103,000 health information management professionals strong.