These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
3. Where is HIPAA taking physician practices? Bergeron B MedGenMed; 2005 Apr; 7(2):65. PubMed ID: 16369443 [No Abstract] [Full Text] [Related]
4. Privacy and security become financial concern under HITECH Act. McDavid JP Revenue-cycle Strateg; 2010; 7(7):6-7. PubMed ID: 20632690 [No Abstract] [Full Text] [Related]
5. Practice brief. Security audits. American Health Information Management Association. American Health Information Management Association. J AHIMA; 2000 Sep; 71(8):64E-64G. PubMed ID: 11186631 [No Abstract] [Full Text] [Related]
6. Patient privacy and security of electronic medical information for radiologists: the basics. Andriole KP; Khorasani R J Am Coll Radiol; 2010 Jun; 7(6):397-9. PubMed ID: 20522391 [No Abstract] [Full Text] [Related]
8. Information technologies need to protect patient confidentiality. Pendrak RF; Ericson RP Healthc Financ Manage; 1998 Oct; 52(10):66-8. PubMed ID: 10187618 [TBL] [Abstract][Full Text] [Related]
9. Taiwan's perspective on electronic medical records' security and privacy protection: lessons learned from HIPAA. Yang CM; Lin HC; Chang P; Jian WS Comput Methods Programs Biomed; 2006 Jun; 82(3):277-82. PubMed ID: 16730852 [TBL] [Abstract][Full Text] [Related]
10. EPHI crib notes. With proper security, safeguards and tools in place, the threat of a looming audit may not be so scary. Lukes S Healthc Inform; 2007 Sep; 24(9):54, 56. PubMed ID: 17927069 [No Abstract] [Full Text] [Related]
11. Federal legislation focuses attention on importance of standards. Frawley KA Stand News; 1999 Apr; 27(4):20-1. PubMed ID: 11693157 [No Abstract] [Full Text] [Related]
12. Data field standards and the Health Insurance Portability and Accountability Act. Braithwaite WR Stat Med; 2001 May 15-30; 20(9-10):1323-30. PubMed ID: 11343353 [TBL] [Abstract][Full Text] [Related]
13. Building a secure home: protecting individually identifiable patient information. Keese JM Radiol Manage; 2001; 23(6):50-1. PubMed ID: 11793563 [No Abstract] [Full Text] [Related]
14. The rules are out. A middle ground has been successfully achieved. Hellerstein D Health Manag Technol; 2001 Feb; 22(2):8, 10. PubMed ID: 11225346 [No Abstract] [Full Text] [Related]
15. New data security regs to pose challenge to healthcare administrators. Hosp Secur Saf Manage; 2000 Sep; 21(5):9-10. PubMed ID: 11186791 [No Abstract] [Full Text] [Related]
16. The proof is in the policy. Walsh T J AHIMA; 2004 Feb; 75(2):24-8. PubMed ID: 14981852 [No Abstract] [Full Text] [Related]
17. Practice brief. Security risk analysis and management: an overview. Amatayakul M; J AHIMA; 2003 Oct; 74(9):72A-72G; quiz 77-8. PubMed ID: 14571553 [No Abstract] [Full Text] [Related]