280 related articles for article (PubMed ID: 10346126)
21. HIPAA security requirements.
Wilber K
Healthplan; 2003; 44(1):28-31. PubMed ID: 12611250
[No Abstract] [Full Text] [Related]
22. The rules are out. A middle ground has been successfully achieved.
Hellerstein D
Health Manag Technol; 2001 Feb; 22(2):8, 10. PubMed ID: 11225346
[No Abstract] [Full Text] [Related]
23. Tackling the privacy requirements. A standard exists for administering security policies.
Culpepper TC
Healthc Inform; 2002 Jan; 19(1):88-90. PubMed ID: 12827793
[No Abstract] [Full Text] [Related]
24. Too much of a good thing? CIOs strive to increase security while decreasing the 'obstacles' between users and data.
Gillespie G
Health Data Manag; 2001 Sep; 9(9):42-6, 48-50. PubMed ID: 11565145
[No Abstract] [Full Text] [Related]
25. Medical privacy regs hit employers on many fronts.
Gemignani J
Bus Health; 1999 Dec; 17(12):9. PubMed ID: 10787492
[No Abstract] [Full Text] [Related]
26. Prevention of HIPAA security breaches.
Fesko H; McGuigan P
Health Care Law Mon; 2007 May; ():3-9. PubMed ID: 17590913
[No Abstract] [Full Text] [Related]
27. ebXML's practical benefits. Formation of a path to HIPAA security compliance is only one outcome.
Rishel W
Healthc Inform; 2002 Jan; 19(1):43-4. PubMed ID: 12827788
[No Abstract] [Full Text] [Related]
28. Down the beaten HIPAA path.
Goedert J
Health Data Manag; 2004 Feb; 12(2):64-6, 68, 70. PubMed ID: 14971100
[No Abstract] [Full Text] [Related]
29. EPHI crib notes. With proper security, safeguards and tools in place, the threat of a looming audit may not be so scary.
Lukes S
Healthc Inform; 2007 Sep; 24(9):54, 56. PubMed ID: 17927069
[No Abstract] [Full Text] [Related]
30. Building a secure home: protecting individually identifiable patient information.
Keese JM
Radiol Manage; 2001; 23(6):50-1. PubMed ID: 11793563
[No Abstract] [Full Text] [Related]
31. Major new regs coming for patient privacy, security.
OR Manager; 2001 Jan; 17(1):1, 10, 13-4. PubMed ID: 11209188
[No Abstract] [Full Text] [Related]
32. HIPAA's here. How to comply with new rules that govern protected health information.
Kibbe DC
Nurs Manage; 2001 Apr; 32(4):32-4. PubMed ID: 15103852
[TBL] [Abstract][Full Text] [Related]
33. HIPAA. Blueprint for privacy and security. Bringing information protection up to code will require a new way of doing things.
Marietti C
Healthc Inform; 2002 Jan; 19(1):55-8, 60. PubMed ID: 12827790
[No Abstract] [Full Text] [Related]
34. HHS publishes notice of proposed rule making for security, electronic signature standards.
Frawley KA; Asmonga DD
J AHIMA; 1998 Oct; 69(9):14, 16, 18-20. PubMed ID: 10187467
[No Abstract] [Full Text] [Related]
35. Mapping the way to HIPAA compliance.
Wagner L
Provider; 2002 Mar; 28(3):20-2, 25-6, 29-34. PubMed ID: 11899597
[No Abstract] [Full Text] [Related]
36. Coming soon. HIPAA compliance deadline looms for security.
Conn J
Mod Healthc; 2005 Apr; 35(16):8-9, 12. PubMed ID: 15852768
[No Abstract] [Full Text] [Related]
37. Health Insurance Portability and Accountability Act of 1996. Public Law 104-191.
United States
US Statut Large; 1996 Aug; 110():1936-2103. PubMed ID: 16477734
[No Abstract] [Full Text] [Related]
38. Practice brief. Security audits. American Health Information Management Association.
American Health Information Management Association.
J AHIMA; 2000 Sep; 71(8):64E-64G. PubMed ID: 11186631
[No Abstract] [Full Text] [Related]
39. Organizational repertoires and rites in health information security.
Cooper T; Collmann J; Neidermeier H
Camb Q Healthc Ethics; 2008; 17(4):441-52. PubMed ID: 18724883
[No Abstract] [Full Text] [Related]
40. Is nothing sacred on the Net?
McCarthy R
Bus Health; 2001 Feb; 19(2):21-2, 25-6. PubMed ID: 11225081
[No Abstract] [Full Text] [Related]
[Previous] [Next] [New Search]