211 related articles for article (PubMed ID: 10185885)
21. Juggling skills a must for health care CSOs.
Gillespie G
Health Data Manag; 2001 Jan; 9(1):50-2, 54, 56. PubMed ID: 11209207
[No Abstract] [Full Text] [Related]
22. Information security strategy: questions you wish the CEO would ask.
Ennis JB
J Healthc Inf Manag; 2003; 17(3):5-8. PubMed ID: 12858586
[No Abstract] [Full Text] [Related]
23. Security measures required for HIPAA privacy.
Amatayakul M
J Healthc Inf Manag; 2000; 14(4):5-12. PubMed ID: 11190262
[TBL] [Abstract][Full Text] [Related]
24. Down the beaten HIPAA path.
Goedert J
Health Data Manag; 2004 Feb; 12(2):64-6, 68, 70. PubMed ID: 14971100
[No Abstract] [Full Text] [Related]
25. The rules are out. A middle ground has been successfully achieved.
Hellerstein D
Health Manag Technol; 2001 Feb; 22(2):8, 10. PubMed ID: 11225346
[No Abstract] [Full Text] [Related]
26. New data security regs to pose challenge to healthcare administrators.
Hosp Secur Saf Manage; 2000 Sep; 21(5):9-10. PubMed ID: 11186791
[No Abstract] [Full Text] [Related]
27. Job: security. 7 steps for HIPAA compliance.
Johnson LM; Schulte JD
Healthc Financ Manage; 2004 Oct; 58(10):46-9. PubMed ID: 15524033
[TBL] [Abstract][Full Text] [Related]
28. Clearing the final HIPAA hurdle: preparing for compliance with the HIPAA Security Rule.
Gertz E; Burge D
Mich Health Hosp; 2003; 39(4):16-7. PubMed ID: 12886652
[TBL] [Abstract][Full Text] [Related]
29. The HIPAA security rule--more questions than answers.
Lang RD
J Healthc Inf Manag; 2009; 23(2):2-3. PubMed ID: 19382728
[No Abstract] [Full Text] [Related]
30. An industry unready for HIPAA's proposed privacy legislation.
Haramboure D
Health Manag Technol; 1999 Aug; 20(7):16-7. PubMed ID: 10620983
[No Abstract] [Full Text] [Related]
31. Reader's perspectives. Health care organizations should put the identifier rules of the Health Insurance Portability and Accountability Act on the back burner.
Yanick M; Carney R
Health Data Manag; 2002 Apr; 10(4):64. PubMed ID: 11963417
[No Abstract] [Full Text] [Related]
32. Clooney and hospital prying eyes. Experts wonder if incident will expose HIPAA weakness.
Rhea S
Mod Healthc; 2007 Oct; 37(41):10. PubMed ID: 17974064
[No Abstract] [Full Text] [Related]
33. New security regulations aimed at protecting patient information.
Rossi MS
N Y State Dent J; 2005 Jan; 71(1):6-7. PubMed ID: 15768905
[No Abstract] [Full Text] [Related]
34. Completing the HIPAA compliance journey: security standards.
Pieper SK
Healthc Exec; 2003; 18(5):20-5. PubMed ID: 14503075
[No Abstract] [Full Text] [Related]
35. What will stop data breaches?
Goedert J
Health Data Manag; 2008 Jun; 16(6):12. PubMed ID: 18551865
[No Abstract] [Full Text] [Related]
36. The HIPAAcratic oath: do no harm to patient data.
Tang PC
Physician Exec; 2000; 26(3):50-5. PubMed ID: 10947464
[TBL] [Abstract][Full Text] [Related]
37. Rightsizing HIPAA security compliance for smaller organizations.
Proctor PE; Davis N; Rosenblum B
J Healthc Inf Manag; 2003; 17(3):34-40. PubMed ID: 12858595
[TBL] [Abstract][Full Text] [Related]
38. HIPAA update. Achieving compliance with the new standards.
Amatayakul M
MD Comput; 2000; 17(3):54-6. PubMed ID: 10842986
[No Abstract] [Full Text] [Related]
39. Information age requires strategic security plans.
Baldwin G
Health Data Manag; 1999 Oct; 7(10):98. PubMed ID: 10622931
[No Abstract] [Full Text] [Related]
40. Keep tabs on who sees what.
Toth CL
Med Econ; 2002 Dec; 79(23):27-8. PubMed ID: 12510614
[No Abstract] [Full Text] [Related]
[Previous] [Next] [New Search]