272 related articles for article (PubMed ID: 11260852)
1. Five ways to deal with information security incidents under HIPAA.
Hosp Secur Saf Manage; 2001 Feb; 21(10):1-3. PubMed ID: 11260852
[No Abstract] [Full Text] [Related]
2. HIPAA security standards: is your facility ready?
Hosp Peer Rev; 2000 May; 25(5):64-5. PubMed ID: 11184101
[TBL] [Abstract][Full Text] [Related]
3. Beef up your information security with the new HIPAA-mandated standards.
Hosp Peer Rev; 1999 Dec; 24(12):177-9. PubMed ID: 10724616
[TBL] [Abstract][Full Text] [Related]
4. How to avoid a HIPAA horror story.
Withrow SC
Healthc Financ Manage; 2010 Aug; 64(8):82-8. PubMed ID: 20707266
[TBL] [Abstract][Full Text] [Related]
5. HIPAA: what's hot...
Curtin L; Simpson R
Health Manag Technol; 2000 Jun; 21(6):42-4. PubMed ID: 11406974
[No Abstract] [Full Text] [Related]
6. Moving toward a unified information security program.
Ruano M
J AHIMA; 2003 Jan; 74(1):66-8. PubMed ID: 12530350
[No Abstract] [Full Text] [Related]
7. Safe keeping.
Steve D
Health Facil Manage; 2003 Dec; 16(12):12-7. PubMed ID: 14710684
[No Abstract] [Full Text] [Related]
8. Health policy: ready, set, go! What's on the HIPAA horizon?
Hatton MR
Trustee; 2001 Jul; 54(7):29-30. PubMed ID: 11599490
[No Abstract] [Full Text] [Related]
9. How will HIPAA affect hospital Web sites?
Internet Healthc Strateg; 2001 Jul; 3(7):1-2. PubMed ID: 11450569
[No Abstract] [Full Text] [Related]
10. EMR confidentiality and information security.
Kurtz G
J Healthc Inf Manag; 2003; 17(3):41-8. PubMed ID: 12858596
[TBL] [Abstract][Full Text] [Related]
11. Recognizing and reducing risks: HIPAA privacy and security enforcement.
Wachler AB; Fehn AK
Mich Health Hosp; 2003; 39(6):32-3. PubMed ID: 14628331
[TBL] [Abstract][Full Text] [Related]
12. The final security rule. Compliance begins with risk analysis.
Adler MP
Healthc Inform; 2003 Oct; 20(10):74-6. PubMed ID: 14598463
[No Abstract] [Full Text] [Related]
13. Back to basics. Tackling the new HIPAA regulations.
O'Brien K
Trustee; 2000 Jun; 53(6):suppl 4 p. following 14. PubMed ID: 11806369
[No Abstract] [Full Text] [Related]
14. Risk management methodology for HIPAA security standard.
Aikins R
J Healthc Inf Manag; 2000; 14(4):29-40. PubMed ID: 11190260
[TBL] [Abstract][Full Text] [Related]
15. Down the beaten HIPAA path.
Goedert J
Health Data Manag; 2004 Feb; 12(2):64-6, 68, 70. PubMed ID: 14971100
[No Abstract] [Full Text] [Related]
16. 8 things trustees should know (or do) about HIPAA.
Greene J
Trustee; 2002 Feb; 55(2):12-5, 1. PubMed ID: 15700494
[TBL] [Abstract][Full Text] [Related]
17. HIPAA: ensuring patients' privacy and security.
Harrison S; Jackman C
Radiol Manage; 2004; 26(2):31-3. PubMed ID: 15098900
[No Abstract] [Full Text] [Related]
18. Security measures required for HIPAA privacy.
Amatayakul M
J Healthc Inf Manag; 2000; 14(4):5-12. PubMed ID: 11190262
[TBL] [Abstract][Full Text] [Related]
19. Prevention of HIPAA security breaches.
Fesko H; McGuigan P
Health Care Law Mon; 2007 May; ():3-9. PubMed ID: 17590913
[No Abstract] [Full Text] [Related]
20. Eye on info. Controlling information access. Providers contend with balancing act.
Morrissey J
Mod Healthc; 2001 Aug; 31(34):24-7. PubMed ID: 11534239
[No Abstract] [Full Text] [Related]
[Next] [New Search]