These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

225 related articles for article (PubMed ID: 10184018)

  • 1. Guidelines for minimal data security measures for the protection of computer-based patient records.
    Gabrieli ER
    J Clin Comput; 1993; 21(6):139-82 contd. PubMed ID: 10184018
    [No Abstract]   [Full Text] [Related]  

  • 2. Guidelines for minimal data security measures for the protection of computer-based patient records.
    Gabrieli E
    J Clin Comput; 1993; 22(1):1-48 concl. PubMed ID: 10131095
    [No Abstract]   [Full Text] [Related]  

  • 3. How secure is secure?
    Fotsch E
    Healthc Financ Manage; 1996 Nov; 50(11):30, 32. PubMed ID: 10162344
    [No Abstract]   [Full Text] [Related]  

  • 4. How safe are computerized patient records?
    Kibbe D; Bard MR
    Fam Pract Manag; 1997 May; 4(5):34-6, 41-4, 46 passim. PubMed ID: 10184800
    [No Abstract]   [Full Text] [Related]  

  • 5. Security standards for medical information systems.
    Humphreys T
    Stud Health Technol Inform; 1996; 27():131-44. PubMed ID: 10163728
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Information security: how safe is your system?
    Brandt M
    Healthc Inform; 1995 Oct; 12(10):24-6, 28, 30-2. PubMed ID: 10152279
    [No Abstract]   [Full Text] [Related]  

  • 7. Standards for electronic patient records.
    Gabrieli ER
    J Clin Comput; 1991; 20(1):21-32. PubMed ID: 10183506
    [No Abstract]   [Full Text] [Related]  

  • 8. Information technologies need to protect patient confidentiality.
    Pendrak RF; Ericson RP
    Healthc Financ Manage; 1998 Oct; 52(10):66-8. PubMed ID: 10187618
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Preparing for the computerized patient. Record and managing its security.
    Pierce S
    J Am Assoc Med Transcr; 1995; 14(3):38-9. PubMed ID: 10142443
    [No Abstract]   [Full Text] [Related]  

  • 10. Building a secure home: protecting individually identifiable patient information.
    Keese JM
    Radiol Manage; 2001; 23(6):50-1. PubMed ID: 11793563
    [No Abstract]   [Full Text] [Related]  

  • 11. Protection of privacy of personal health information: the Australian standard approach.
    Cheong IR
    Top Health Inf Manage; 1996 May; 16(4):49-55. PubMed ID: 10157661
    [TBL] [Abstract][Full Text] [Related]  

  • 12. FDA draft guidance on computerised systems used in clinical trials.
    Donawa ME;
    Med Device Technol; 2005; 16(1):24-7. PubMed ID: 16334601
    [TBL] [Abstract][Full Text] [Related]  

  • 13. A reasonable approach to security. Quantitative risk management goes beyond HIPAA compliance.
    Drake A
    Healthc Inform; 2004 Aug; 21(8):38. PubMed ID: 15373303
    [No Abstract]   [Full Text] [Related]  

  • 14. Data protection and security within TANIT.
    Corbeel LJ; Corbeel IL; Hortmann M
    Stud Health Technol Inform; 1996; 27():162-7. PubMed ID: 10163731
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Health data security: a new priority.
    Siwicki B
    Health Data Manag; 1997 Sep; 5(9):46-50, 52-4, 56-8 passim. PubMed ID: 10169997
    [TBL] [Abstract][Full Text] [Related]  

  • 16. CPR alert: Ten steps to end the great paper chase.
    Brandt M
    Healthc Inform; 1995 Feb; 12(2):104-6, 108. PubMed ID: 10140916
    [No Abstract]   [Full Text] [Related]  

  • 17. Eight steps to integrating security standards.
    Happ J;
    Biomed Instrum Technol; 2006; Suppl():22-4. PubMed ID: 16596845
    [No Abstract]   [Full Text] [Related]  

  • 18. Records standards: making sure everything fits perfectly.
    Siwicki B
    Health Data Manag; 1997 Oct; 5(10):65-8, 70, 72 passim. PubMed ID: 10175745
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Keep electronic records safe!
    Celia LM
    RN; 2002 Jun; 65(6):69-71. PubMed ID: 12087602
    [No Abstract]   [Full Text] [Related]  

  • 20. HIPAA. Blueprint for privacy and security. Bringing information protection up to code will require a new way of doing things.
    Marietti C
    Healthc Inform; 2002 Jan; 19(1):55-8, 60. PubMed ID: 12827790
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 12.