BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

272 related articles for article (PubMed ID: 11260852)

  • 1. Five ways to deal with information security incidents under HIPAA.
    Hosp Secur Saf Manage; 2001 Feb; 21(10):1-3. PubMed ID: 11260852
    [No Abstract]   [Full Text] [Related]  

  • 2. HIPAA security standards: is your facility ready?
    Hosp Peer Rev; 2000 May; 25(5):64-5. PubMed ID: 11184101
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Beef up your information security with the new HIPAA-mandated standards.
    Hosp Peer Rev; 1999 Dec; 24(12):177-9. PubMed ID: 10724616
    [TBL] [Abstract][Full Text] [Related]  

  • 4. How to avoid a HIPAA horror story.
    Withrow SC
    Healthc Financ Manage; 2010 Aug; 64(8):82-8. PubMed ID: 20707266
    [TBL] [Abstract][Full Text] [Related]  

  • 5. HIPAA: what's hot...
    Curtin L; Simpson R
    Health Manag Technol; 2000 Jun; 21(6):42-4. PubMed ID: 11406974
    [No Abstract]   [Full Text] [Related]  

  • 6. Moving toward a unified information security program.
    Ruano M
    J AHIMA; 2003 Jan; 74(1):66-8. PubMed ID: 12530350
    [No Abstract]   [Full Text] [Related]  

  • 7. Safe keeping.
    Steve D
    Health Facil Manage; 2003 Dec; 16(12):12-7. PubMed ID: 14710684
    [No Abstract]   [Full Text] [Related]  

  • 8. Health policy: ready, set, go! What's on the HIPAA horizon?
    Hatton MR
    Trustee; 2001 Jul; 54(7):29-30. PubMed ID: 11599490
    [No Abstract]   [Full Text] [Related]  

  • 9. How will HIPAA affect hospital Web sites?
    Internet Healthc Strateg; 2001 Jul; 3(7):1-2. PubMed ID: 11450569
    [No Abstract]   [Full Text] [Related]  

  • 10. EMR confidentiality and information security.
    Kurtz G
    J Healthc Inf Manag; 2003; 17(3):41-8. PubMed ID: 12858596
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Recognizing and reducing risks: HIPAA privacy and security enforcement.
    Wachler AB; Fehn AK
    Mich Health Hosp; 2003; 39(6):32-3. PubMed ID: 14628331
    [TBL] [Abstract][Full Text] [Related]  

  • 12. The final security rule. Compliance begins with risk analysis.
    Adler MP
    Healthc Inform; 2003 Oct; 20(10):74-6. PubMed ID: 14598463
    [No Abstract]   [Full Text] [Related]  

  • 13. Back to basics. Tackling the new HIPAA regulations.
    O'Brien K
    Trustee; 2000 Jun; 53(6):suppl 4 p. following 14. PubMed ID: 11806369
    [No Abstract]   [Full Text] [Related]  

  • 14. Risk management methodology for HIPAA security standard.
    Aikins R
    J Healthc Inf Manag; 2000; 14(4):29-40. PubMed ID: 11190260
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Down the beaten HIPAA path.
    Goedert J
    Health Data Manag; 2004 Feb; 12(2):64-6, 68, 70. PubMed ID: 14971100
    [No Abstract]   [Full Text] [Related]  

  • 16. 8 things trustees should know (or do) about HIPAA.
    Greene J
    Trustee; 2002 Feb; 55(2):12-5, 1. PubMed ID: 15700494
    [TBL] [Abstract][Full Text] [Related]  

  • 17. HIPAA: ensuring patients' privacy and security.
    Harrison S; Jackman C
    Radiol Manage; 2004; 26(2):31-3. PubMed ID: 15098900
    [No Abstract]   [Full Text] [Related]  

  • 18. Security measures required for HIPAA privacy.
    Amatayakul M
    J Healthc Inf Manag; 2000; 14(4):5-12. PubMed ID: 11190262
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Prevention of HIPAA security breaches.
    Fesko H; McGuigan P
    Health Care Law Mon; 2007 May; ():3-9. PubMed ID: 17590913
    [No Abstract]   [Full Text] [Related]  

  • 20. Eye on info. Controlling information access. Providers contend with balancing act.
    Morrissey J
    Mod Healthc; 2001 Aug; 31(34):24-7. PubMed ID: 11534239
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 14.