These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
272 related articles for article (PubMed ID: 11260852)
21. The first steps toward security. Goedert J Health Data Manag; 2001 Jul; 9(7):26-32, 34. PubMed ID: 11464723 [No Abstract] [Full Text] [Related]
22. Strengthening system security to prepare for HIPAA. Shehata A Health Manag Technol; 2002 Sep; 23(9):14-5, 19. PubMed ID: 12232896 [No Abstract] [Full Text] [Related]
23. CIOs coming in for a pit stop in the HIPAA compliance race. Gillespie G Health Data Manag; 2003 Aug; 11(8):34-8, 40. PubMed ID: 12945482 [No Abstract] [Full Text] [Related]
24. The HIPAA security rule. The final version provides a flexible framework for achieving compliance. Hirsch R Healthc Inform; 2003 Apr; 20(4):56, 58. PubMed ID: 18800468 [No Abstract] [Full Text] [Related]
25. The key to a HIPAA-safe computer system. Lowes R Med Econ; 2003 Apr; 80(7):62, 68-9. PubMed ID: 12723433 [No Abstract] [Full Text] [Related]
26. This is not your parents' security system. Defining user roles and creating audit trails in a HIPAA-compliant system are two critical steps to successful compliance. Korpman RA Health Manag Technol; 2002 Nov; 23(11):16, 19. PubMed ID: 12416419 [No Abstract] [Full Text] [Related]
27. Too much of a good thing? CIOs strive to increase security while decreasing the 'obstacles' between users and data. Gillespie G Health Data Manag; 2001 Sep; 9(9):42-6, 48-50. PubMed ID: 11565145 [No Abstract] [Full Text] [Related]
28. Status report: time is nigh for HIPAA rules. Goedert J Health Data Manag; 2003 Feb; 11(2):82-4, 86, 88. PubMed ID: 12602288 [No Abstract] [Full Text] [Related]
29. Final HIPAA security regulations: a review. Garner JC Manag Care Q; 2003; 11(3):15-27. PubMed ID: 14983648 [TBL] [Abstract][Full Text] [Related]
30. The Health Insurance Portability & Accountability Act and the practice of dentistry in the United States: system security. Chasteen JE; Murphy G; Forrey A; Heid D J Contemp Dent Pract; 2004 Aug; 5(3):158-67. PubMed ID: 15318267 [TBL] [Abstract][Full Text] [Related]
31. A problem-oriented approach to the HIPAA security standards. Kibbe DC Fam Pract Manag; 2001; 8(7):37-43. PubMed ID: 11477951 [No Abstract] [Full Text] [Related]
32. How will CIOs protect data to comply with HIPAA? Gillespie G Health Data Manag; 2000 Aug; 8(8):40-1, 43, 46-52. PubMed ID: 11186746 [No Abstract] [Full Text] [Related]
33. The HIPAA prescription for healthcare--why isn't it working? Gue DG; Upham R Health Manag Technol; 2004 Sep; 25(9):34-7. PubMed ID: 15460307 [No Abstract] [Full Text] [Related]
34. Practice brief. A HIPAA security overview. Quinsey CA J AHIMA; 2004 Apr; 75(4):56A-56C. PubMed ID: 15098461 [No Abstract] [Full Text] [Related]
35. Rightsizing HIPAA security compliance for smaller organizations. Proctor PE; Davis N; Rosenblum B J Healthc Inf Manag; 2003; 17(3):34-40. PubMed ID: 12858595 [TBL] [Abstract][Full Text] [Related]