BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

113 related articles for article (PubMed ID: 10157341)

  • 1. Striking a balance between access and security.
    Bunschoten B
    Health Data Manag; 1996 May; 4(5):69-70, 72. PubMed ID: 10157341
    [No Abstract]   [Full Text] [Related]  

  • 2. Initiatives and experiences in developing, implementing, and administering data security and confidentiality policies.
    Aikins R; Anderson J
    Healthc Inf Manage; 1998; 12(1):51-7. PubMed ID: 10179267
    [No Abstract]   [Full Text] [Related]  

  • 3. Remote access security.
    Stevens RA; O'Loughlin-Cahill K
    Healthc Exec; 2002; 17(3):66-7. PubMed ID: 12014155
    [No Abstract]   [Full Text] [Related]  

  • 4. EMR confidentiality and information security.
    Kurtz G
    J Healthc Inf Manag; 2003; 17(3):41-8. PubMed ID: 12858596
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Information age requires strategic security plans.
    Baldwin G
    Health Data Manag; 1999 Oct; 7(10):98. PubMed ID: 10622931
    [No Abstract]   [Full Text] [Related]  

  • 6. Putting a lock on records.
    Fuller SR
    Provider; 1997 Jun; 23(6):59-60. PubMed ID: 10168008
    [No Abstract]   [Full Text] [Related]  

  • 7. What you see; what you get. Agencies, employers clamping down on medical records snooping.
    Blesch G
    Mod Healthc; 2010 May; 40(18):14-5. PubMed ID: 20480556
    [No Abstract]   [Full Text] [Related]  

  • 8. Security and confidentiality in an electronic medical record.
    Olson LA; Peters SG; Stewart JB
    Healthc Inf Manage; 1998; 12(1):27-37. PubMed ID: 10179264
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Patient record security starts with privacy rights.
    Exec Solut Healthc Manag; 1998 Jul; 1(5):15-6. PubMed ID: 10181811
    [No Abstract]   [Full Text] [Related]  

  • 10. Fundamentals and trade-offs of IT security.
    LaRochelle B
    Health Manag Technol; 1999 Aug; 20(7):18-21. PubMed ID: 10620984
    [No Abstract]   [Full Text] [Related]  

  • 11. Government health information security standards. Beat the clock by developing security strategies now.
    Fuller SR
    Healthc Inform; 1997 Nov; 14(11):63-4, 66. PubMed ID: 10174847
    [No Abstract]   [Full Text] [Related]  

  • 12. Information technologies need to protect patient confidentiality.
    Pendrak RF; Ericson RP
    Healthc Financ Manage; 1998 Oct; 52(10):66-8. PubMed ID: 10187618
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Teaching effective security.
    Siwicki B
    Health Data Manag; 1998 Nov; 6(11):84, 86-7. PubMed ID: 10185899
    [No Abstract]   [Full Text] [Related]  

  • 14. Ethical guidance in Web site development.
    Van Brunt D; Salehizadeh B
    Healthc Exec; 2001; 16(5):68-9. PubMed ID: 11603347
    [No Abstract]   [Full Text] [Related]  

  • 15. Protecting your paperless medical record system requires addressing risks.
    Sokol PE
    QRC Advis; 2000 Apr; 16(6):1-5. PubMed ID: 11010360
    [No Abstract]   [Full Text] [Related]  

  • 16. The first steps toward security.
    Goedert J
    Health Data Manag; 2001 Jul; 9(7):26-32, 34. PubMed ID: 11464723
    [No Abstract]   [Full Text] [Related]  

  • 17. Completing the HIPAA compliance journey: security standards.
    Pieper SK
    Healthc Exec; 2003; 18(5):20-5. PubMed ID: 14503075
    [No Abstract]   [Full Text] [Related]  

  • 18. Protecting confidentiality in the Rockies.
    Linton M; Clayton P
    Healthplan; 1999; 40(5):63-6. PubMed ID: 10622970
    [No Abstract]   [Full Text] [Related]  

  • 19. Avoiding legal pitfalls in records automation.
    Tomes JP
    Health Data Manag; 1994 Mar; 2(2):61-4. PubMed ID: 10154872
    [No Abstract]   [Full Text] [Related]  

  • 20. Policy management and access control in practice.
    Nordberg R
    Stud Health Technol Inform; 2004; 103():428-33. PubMed ID: 15747951
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.