255 related articles for article (PubMed ID: 12510614)
1. Keep tabs on who sees what.
Toth CL
Med Econ; 2002 Dec; 79(23):27-8. PubMed ID: 12510614
[No Abstract] [Full Text] [Related]
2. The future of card technology in health care.
Kelly B
Health Data Manag; 2002 May; 10(5):64-8. PubMed ID: 12017105
[No Abstract] [Full Text] [Related]
3. Juggling skills a must for health care CSOs.
Gillespie G
Health Data Manag; 2001 Jan; 9(1):50-2, 54, 56. PubMed ID: 11209207
[No Abstract] [Full Text] [Related]
4. EMR confidentiality and information security.
Kurtz G
J Healthc Inf Manag; 2003; 17(3):41-8. PubMed ID: 12858596
[TBL] [Abstract][Full Text] [Related]
5. Prevention of HIPAA security breaches.
Fesko H; McGuigan P
Health Care Law Mon; 2007 May; ():3-9. PubMed ID: 17590913
[No Abstract] [Full Text] [Related]
6. Surviving in a post-HIPAA environment by creating a culture of privacy and security.
Watson A
AHIP Cover; 2005; 46(4):26-30. PubMed ID: 16149657
[No Abstract] [Full Text] [Related]
7. An overview of the HIPAA Security Rule.
Optometry; 2004 Oct; 75(10):654-7. PubMed ID: 15508867
[No Abstract] [Full Text] [Related]
8. Recognizing and reducing risks: HIPAA privacy and security enforcement.
Wachler AB; Fehn AK
Mich Health Hosp; 2003; 39(6):32-3. PubMed ID: 14628331
[TBL] [Abstract][Full Text] [Related]
9. Tackling the privacy requirements. A standard exists for administering security policies.
Culpepper TC
Healthc Inform; 2002 Jan; 19(1):88-90. PubMed ID: 12827793
[No Abstract] [Full Text] [Related]
10. When technology and health care collide: issues with electronic medical records and electronic mail.
Jurevic AM
UMKC Law Rev; 1998; 66(4):809-36. PubMed ID: 16273691
[No Abstract] [Full Text] [Related]
11. Remote access security.
Stevens RA; O'Loughlin-Cahill K
Healthc Exec; 2002; 17(3):66-7. PubMed ID: 12014155
[No Abstract] [Full Text] [Related]
12. Building a secure home: protecting individually identifiable patient information.
Keese JM
Radiol Manage; 2001; 23(6):50-1. PubMed ID: 11793563
[No Abstract] [Full Text] [Related]
13. HIPAA. Blueprint for privacy and security. Bringing information protection up to code will require a new way of doing things.
Marietti C
Healthc Inform; 2002 Jan; 19(1):55-8, 60. PubMed ID: 12827790
[No Abstract] [Full Text] [Related]
14. Is nothing sacred on the Net?
McCarthy R
Bus Health; 2001 Feb; 19(2):21-2, 25-6. PubMed ID: 11225081
[No Abstract] [Full Text] [Related]
15. Too much of a good thing? CIOs strive to increase security while decreasing the 'obstacles' between users and data.
Gillespie G
Health Data Manag; 2001 Sep; 9(9):42-6, 48-50. PubMed ID: 11565145
[No Abstract] [Full Text] [Related]
16. Electronic medical record and HIPAA security implications.
Madison M
J Med Assoc Ga; 2007; 96(3):21-2. PubMed ID: 18203553
[No Abstract] [Full Text] [Related]
17. Instant virtual extranets. A new breed of technology offers another alternative for secure, remote data access.
Matlof J
Healthc Inform; 2002 Oct; 19(10):80. PubMed ID: 12440310
[No Abstract] [Full Text] [Related]
18. Can you keep a secret? Give your lab results a HIPAA privacy checkup.
Ham NJ; Boothe JF
MLO Med Lab Obs; 2003 Jan; 35(1):32-4. PubMed ID: 12561744
[No Abstract] [Full Text] [Related]
19. Can chief security officers protect data from prying eyes?
Siwicki B
Health Data Manag; 1998 Oct; 6(10):54-6, 58, 60 passim. PubMed ID: 10185885
[TBL] [Abstract][Full Text] [Related]
20. The informatics nurse specialist as privacy officer.
Malloy NP
J Healthc Inf Manag; 2003; 17(3):54-8. PubMed ID: 12858598
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]