169 related articles for article (PubMed ID: 10118229)
1. Health law. The fuss over computer-based records.
J AHIMA; 1992 Jan; 63(1):17-8. PubMed ID: 10118229
[No Abstract] [Full Text] [Related]
2. Beyond HIPAA: the complexities of electronic record management.
Kahn RA
J AHIMA; 2003 Apr; 74(4):31-6; quiz 37-8. PubMed ID: 12698938
[TBL] [Abstract][Full Text] [Related]
3. Connectivity, privacy, and liability. What medical professionals must consider.
Wernick AS
J AHIMA; 2007 Apr; 78(4):64-5. PubMed ID: 17455849
[No Abstract] [Full Text] [Related]
4. Policies and procedures for a legal EHR.
Quinsey CA
J AHIMA; 2007 Apr; 78(4):62-3. PubMed ID: 17455848
[No Abstract] [Full Text] [Related]
5. The computer-based patient record: risks, security, and the HIM role.
Picukaric JM
J AHIMA; 1992 Mar; 63(3):78-84. PubMed ID: 10118259
[No Abstract] [Full Text] [Related]
6. Final HIPAA security regulations: a review.
Garner JC
Manag Care Q; 2003; 11(3):15-27. PubMed ID: 14983648
[TBL] [Abstract][Full Text] [Related]
7. Contracting with photocopy services.
Schraffenberger LA
J AHIMA; 1992 Jan; 63(1):25-6. PubMed ID: 10118230
[No Abstract] [Full Text] [Related]
8. Big brother.
Cross M
Health Serv J; 1993 Apr; 103(5348):20-2. PubMed ID: 10126013
[TBL] [Abstract][Full Text] [Related]
9. The first steps toward security.
Goedert J
Health Data Manag; 2001 Jul; 9(7):26-32, 34. PubMed ID: 11464723
[No Abstract] [Full Text] [Related]
10. Safeguarding health information.
Cavoukian A
Health Law Can; 1998 May; 18(4):115-7. PubMed ID: 10181436
[No Abstract] [Full Text] [Related]
11. Confidentiality of health care information in the computer age: a litigator's perspective.
Rangel JL; Friend GN
J Healthc Risk Manag; 1995; 15(3):2-10. PubMed ID: 10155812
[No Abstract] [Full Text] [Related]
12. Too much of a good thing? CIOs strive to increase security while decreasing the 'obstacles' between users and data.
Gillespie G
Health Data Manag; 2001 Sep; 9(9):42-6, 48-50. PubMed ID: 11565145
[No Abstract] [Full Text] [Related]
13. Promoting health information networks while protecting patient confidentiality.
Carey MH
QRC Advis; 1995 Feb; 11(4):7-8. PubMed ID: 10140295
[No Abstract] [Full Text] [Related]
14. Government health information security standards. Beat the clock by developing security strategies now.
Fuller SR
Healthc Inform; 1997 Nov; 14(11):63-4, 66. PubMed ID: 10174847
[No Abstract] [Full Text] [Related]
15. Practice brief. Letters of agreement/contracts. American Health Information Management Association.
J AHIMA; 2000; 71(7):72A-72D. PubMed ID: 11010112
[No Abstract] [Full Text] [Related]
16. Electronic signature thrives in different environments.
French B; Priester RA
J AHIMA; 1995 Jun; 66(6):61-3. PubMed ID: 10142916
[TBL] [Abstract][Full Text] [Related]
17. Banking on privacy. Hospitals must protect patient information--and their own liability--as banks balk at HIPAA.
Haugh R
Hosp Health Netw; 2004 Feb; 78(2):50-4, 56, 2. PubMed ID: 14999878
[TBL] [Abstract][Full Text] [Related]
18. Confidentiality: a health record department perspective.
Ringwood G
Health Law Can; 1992; 13(2):162-3. PubMed ID: 10126147
[No Abstract] [Full Text] [Related]
19. Practice brief. Security risk analysis and management: an overview.
Amatayakul M;
J AHIMA; 2003 Oct; 74(9):72A-72G; quiz 77-8. PubMed ID: 14571553
[No Abstract] [Full Text] [Related]
20. Network liability: a new frontier for healthcare risk management.
Switzer DP
J Healthc Risk Manag; 2001; 21(2):3-13. PubMed ID: 11411063
[No Abstract] [Full Text] [Related]
[Next] [New Search]