53 results.
1 2 3 4 [5] 6
Rethinking Initial HIPAA Efforts (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: November 2003
Risk Assessment: Doing More With Less
Author: Burrington-Brown, Jill
Source: Journal of AHIMA
Publication Date: October 2003
Protecting Your Assets: Identifying and Securing Against Vulnerabilities
Author: Banzhof, Carl
Source: In Confidence (newsletter)
Publication Date: October 02, 2003
Provider-Patient E-mail: With Benefits Come Risks
Author: Baker, Dixie B.
Source: Journal of AHIMA
Publication Date: September 2003
Departmental Information Systems and HIPAA: Easing the Tension (part 2)
Author: Nulan, Craig A.
Source: In Confidence (newsletter)
Publication Date: June 02, 2002
Departmental Information Systems and HIPAA: Easing the Tension (part 1)
Author: Nulan, Craig A.
Source: In Confidence (newsletter)
Publication Date: May 02, 2002
Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology
Author: Stoneburner, Gary; Goguen, Alice; Feringa, Alexis
Source: Government (U.S.)
Publication Date: January 01, 2002
Conducting a HIPAA Security Risk Assessment
Author: Klein, Jim
Source: AHIMA Convention
Publication Date: October 10, 2001
Securing Your IT Environment from the Inside Out
Author: Bakman, Alex
Source: In Confidence (newsletter)
Publication Date: September 02, 2001
Developing a Framework for a Security Assessment
Author: Parisien, Darryl
Source: In Confidence (newsletter)
Publication Date: September 02, 2001
1 2 3 4 [5] 6