113 related articles for article (PubMed ID: 10157341)
1. Striking a balance between access and security.
Bunschoten B
Health Data Manag; 1996 May; 4(5):69-70, 72. PubMed ID: 10157341
[No Abstract] [Full Text] [Related]
2. Initiatives and experiences in developing, implementing, and administering data security and confidentiality policies.
Aikins R; Anderson J
Healthc Inf Manage; 1998; 12(1):51-7. PubMed ID: 10179267
[No Abstract] [Full Text] [Related]
3. Remote access security.
Stevens RA; O'Loughlin-Cahill K
Healthc Exec; 2002; 17(3):66-7. PubMed ID: 12014155
[No Abstract] [Full Text] [Related]
4. EMR confidentiality and information security.
Kurtz G
J Healthc Inf Manag; 2003; 17(3):41-8. PubMed ID: 12858596
[TBL] [Abstract][Full Text] [Related]
5. Information age requires strategic security plans.
Baldwin G
Health Data Manag; 1999 Oct; 7(10):98. PubMed ID: 10622931
[No Abstract] [Full Text] [Related]
6. Putting a lock on records.
Fuller SR
Provider; 1997 Jun; 23(6):59-60. PubMed ID: 10168008
[No Abstract] [Full Text] [Related]
7. What you see; what you get. Agencies, employers clamping down on medical records snooping.
Blesch G
Mod Healthc; 2010 May; 40(18):14-5. PubMed ID: 20480556
[No Abstract] [Full Text] [Related]
8. Security and confidentiality in an electronic medical record.
Olson LA; Peters SG; Stewart JB
Healthc Inf Manage; 1998; 12(1):27-37. PubMed ID: 10179264
[TBL] [Abstract][Full Text] [Related]
9. Patient record security starts with privacy rights.
Exec Solut Healthc Manag; 1998 Jul; 1(5):15-6. PubMed ID: 10181811
[No Abstract] [Full Text] [Related]
10. Fundamentals and trade-offs of IT security.
LaRochelle B
Health Manag Technol; 1999 Aug; 20(7):18-21. PubMed ID: 10620984
[No Abstract] [Full Text] [Related]
11. Government health information security standards. Beat the clock by developing security strategies now.
Fuller SR
Healthc Inform; 1997 Nov; 14(11):63-4, 66. PubMed ID: 10174847
[No Abstract] [Full Text] [Related]
12. Information technologies need to protect patient confidentiality.
Pendrak RF; Ericson RP
Healthc Financ Manage; 1998 Oct; 52(10):66-8. PubMed ID: 10187618
[TBL] [Abstract][Full Text] [Related]
13. Teaching effective security.
Siwicki B
Health Data Manag; 1998 Nov; 6(11):84, 86-7. PubMed ID: 10185899
[No Abstract] [Full Text] [Related]
14. Ethical guidance in Web site development.
Van Brunt D; Salehizadeh B
Healthc Exec; 2001; 16(5):68-9. PubMed ID: 11603347
[No Abstract] [Full Text] [Related]
15. Protecting your paperless medical record system requires addressing risks.
Sokol PE
QRC Advis; 2000 Apr; 16(6):1-5. PubMed ID: 11010360
[No Abstract] [Full Text] [Related]
16. The first steps toward security.
Goedert J
Health Data Manag; 2001 Jul; 9(7):26-32, 34. PubMed ID: 11464723
[No Abstract] [Full Text] [Related]
17. Completing the HIPAA compliance journey: security standards.
Pieper SK
Healthc Exec; 2003; 18(5):20-5. PubMed ID: 14503075
[No Abstract] [Full Text] [Related]
18. Protecting confidentiality in the Rockies.
Linton M; Clayton P
Healthplan; 1999; 40(5):63-6. PubMed ID: 10622970
[No Abstract] [Full Text] [Related]
19. Avoiding legal pitfalls in records automation.
Tomes JP
Health Data Manag; 1994 Mar; 2(2):61-4. PubMed ID: 10154872
[No Abstract] [Full Text] [Related]
20. Policy management and access control in practice.
Nordberg R
Stud Health Technol Inform; 2004; 103():428-33. PubMed ID: 15747951
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]