211 related articles for article (PubMed ID: 10185885)
1. Can chief security officers protect data from prying eyes?
Siwicki B
Health Data Manag; 1998 Oct; 6(10):54-6, 58, 60 passim. PubMed ID: 10185885
[TBL] [Abstract][Full Text] [Related]
2. EMR confidentiality and information security.
Kurtz G
J Healthc Inf Manag; 2003; 17(3):41-8. PubMed ID: 12858596
[TBL] [Abstract][Full Text] [Related]
3. Information technologies need to protect patient confidentiality.
Pendrak RF; Ericson RP
Healthc Financ Manage; 1998 Oct; 52(10):66-8. PubMed ID: 10187618
[TBL] [Abstract][Full Text] [Related]
4. Final HIPAA security regulations: a review.
Garner JC
Manag Care Q; 2003; 11(3):15-27. PubMed ID: 14983648
[TBL] [Abstract][Full Text] [Related]
5. The first steps toward security.
Goedert J
Health Data Manag; 2001 Jul; 9(7):26-32, 34. PubMed ID: 11464723
[No Abstract] [Full Text] [Related]
6. Strategies for complying with the HIPAA security rule.
Pelletier A; Bresee SA; Hill JR
J Healthc Inf Manag; 2003; 17(3):49-53. PubMed ID: 12858597
[TBL] [Abstract][Full Text] [Related]
7. Recognizing and reducing risks: HIPAA privacy and security enforcement.
Wachler AB; Fehn AK
Mich Health Hosp; 2003; 39(6):32-3. PubMed ID: 14628331
[TBL] [Abstract][Full Text] [Related]
8. HIPAA's here. How to comply with new rules that govern protected health information.
Kibbe DC
Nurs Manage; 2001 Apr; 32(4):32-4. PubMed ID: 15103852
[TBL] [Abstract][Full Text] [Related]
9. Prevention of HIPAA security breaches.
Fesko H; McGuigan P
Health Care Law Mon; 2007 May; ():3-9. PubMed ID: 17590913
[No Abstract] [Full Text] [Related]
10. The informatics nurse specialist as privacy officer.
Malloy NP
J Healthc Inf Manag; 2003; 17(3):54-8. PubMed ID: 12858598
[TBL] [Abstract][Full Text] [Related]
11. The future of card technology in health care.
Kelly B
Health Data Manag; 2002 May; 10(5):64-8. PubMed ID: 12017105
[No Abstract] [Full Text] [Related]
12. Complying with the Health Insurance Portability and Accountability Act. Privacy standards.
Shuren AW; Livsey K
AAOHN J; 2001 Nov; 49(11):501-7. PubMed ID: 11760704
[TBL] [Abstract][Full Text] [Related]
13. HIPAA security standards: is your facility ready?
Hosp Peer Rev; 2000 May; 25(5):64-5. PubMed ID: 11184101
[TBL] [Abstract][Full Text] [Related]
14. HIPAA--a real world perspective.
Nulan C
Radiol Manage; 2001; 23(2):29-37; quiz 38-40. PubMed ID: 11302064
[TBL] [Abstract][Full Text] [Related]
15. The Health Insurance Portability & Accountability Act and the practice of dentistry in the United States: system security.
Chasteen JE; Murphy G; Forrey A; Heid D
J Contemp Dent Pract; 2004 Aug; 5(3):158-67. PubMed ID: 15318267
[TBL] [Abstract][Full Text] [Related]
16. CIOs eye HIPAA's privacy and security rules.
Goedert J
Health Data Manag; 2002 Sep; 10(9):50-4, 56, 58. PubMed ID: 12235990
[No Abstract] [Full Text] [Related]
17. HIPAA brings new requirements, new opportunities.
Moynihan JJ; McLure ML
Healthc Financ Manage; 2000 Mar; 54(3):52-6. PubMed ID: 10847916
[TBL] [Abstract][Full Text] [Related]
18. Implementing technological safeguards to ensure patient privacy.
Leestma R
Caring; 2003 Feb; 22(2):16-8. PubMed ID: 12625255
[TBL] [Abstract][Full Text] [Related]
19. Privacy and security compliance in the E-healthcare marketplace.
Lutes M
Healthc Financ Manage; 2000 Mar; 54(3):48-50. PubMed ID: 10847915
[TBL] [Abstract][Full Text] [Related]
20. Taiwan's perspective on electronic medical records' security and privacy protection: lessons learned from HIPAA.
Yang CM; Lin HC; Chang P; Jian WS
Comput Methods Programs Biomed; 2006 Jun; 82(3):277-82. PubMed ID: 16730852
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]