These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

376 related articles for article (PubMed ID: 14571553)

  • 1. Practice brief. Security risk analysis and management: an overview.
    Amatayakul M;
    J AHIMA; 2003 Oct; 74(9):72A-72G; quiz 77-8. PubMed ID: 14571553
    [No Abstract]   [Full Text] [Related]  

  • 2. Too much of a good thing? CIOs strive to increase security while decreasing the 'obstacles' between users and data.
    Gillespie G
    Health Data Manag; 2001 Sep; 9(9):42-6, 48-50. PubMed ID: 11565145
    [No Abstract]   [Full Text] [Related]  

  • 3. The first steps toward security.
    Goedert J
    Health Data Manag; 2001 Jul; 9(7):26-32, 34. PubMed ID: 11464723
    [No Abstract]   [Full Text] [Related]  

  • 4. Recognizing and reducing risks: HIPAA privacy and security enforcement.
    Wachler AB; Fehn AK
    Mich Health Hosp; 2003; 39(6):32-3. PubMed ID: 14628331
    [TBL] [Abstract][Full Text] [Related]  

  • 5. The computer-based patient record: risks, security, and the HIM role.
    Picukaric JM
    J AHIMA; 1992 Mar; 63(3):78-84. PubMed ID: 10118259
    [No Abstract]   [Full Text] [Related]  

  • 6. EMR confidentiality and information security.
    Kurtz G
    J Healthc Inf Manag; 2003; 17(3):41-8. PubMed ID: 12858596
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Down the beaten HIPAA path.
    Goedert J
    Health Data Manag; 2004 Feb; 12(2):64-6, 68, 70. PubMed ID: 14971100
    [No Abstract]   [Full Text] [Related]  

  • 8. The HIPAA prescription for healthcare--why isn't it working?
    Gue DG; Upham R
    Health Manag Technol; 2004 Sep; 25(9):34-7. PubMed ID: 15460307
    [No Abstract]   [Full Text] [Related]  

  • 9. Privacy and security become financial concern under HITECH Act.
    McDavid JP
    Revenue-cycle Strateg; 2010; 7(7):6-7. PubMed ID: 20632690
    [No Abstract]   [Full Text] [Related]  

  • 10. Prevention of HIPAA security breaches.
    Fesko H; McGuigan P
    Health Care Law Mon; 2007 May; ():3-9. PubMed ID: 17590913
    [No Abstract]   [Full Text] [Related]  

  • 11. An IT contingency plan to meet HIPAA security standards.
    Nutten S; Mansueti C
    J AHIMA; 2004 Feb; 75(2):30-7; quiz 39-40. PubMed ID: 14981853
    [No Abstract]   [Full Text] [Related]  

  • 12. Beyond HIPAA: the complexities of electronic record management.
    Kahn RA
    J AHIMA; 2003 Apr; 74(4):31-6; quiz 37-8. PubMed ID: 12698938
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Sounding the alarm. Knowing when to notify patients of a data breach can be unclear.
    Dimick C
    J AHIMA; 2009 Feb; 80(2):20-4; quiz 25-6. PubMed ID: 19245055
    [No Abstract]   [Full Text] [Related]  

  • 14. Translating the language of security.
    Amatayakul M;
    J AHIMA; 2003 Jun; 74(6):16A-16D. PubMed ID: 12822390
    [No Abstract]   [Full Text] [Related]  

  • 15. New data security regs to pose challenge to healthcare administrators.
    Hosp Secur Saf Manage; 2000 Sep; 21(5):9-10. PubMed ID: 11186791
    [No Abstract]   [Full Text] [Related]  

  • 16. Final HIPAA security regulations: a review.
    Garner JC
    Manag Care Q; 2003; 11(3):15-27. PubMed ID: 14983648
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Practice brief. Redisclosure of patient health information.
    American Information Management Association
    J AHIMA; 2001 Sep; 72(8):72A-72B; quiz 75-6. PubMed ID: 15714649
    [No Abstract]   [Full Text] [Related]  

  • 18. Final security regulations present challenges, opportunities for HIM.
    Rode D
    J AHIMA; 2003 May; 74(5):14, 16, 18. PubMed ID: 12793446
    [No Abstract]   [Full Text] [Related]  

  • 19. Patient privacy and security of electronic medical information for radiologists: the basics.
    Andriole KP; Khorasani R
    J Am Coll Radiol; 2010 Jun; 7(6):397-9. PubMed ID: 20522391
    [No Abstract]   [Full Text] [Related]  

  • 20. What will stop data breaches?
    Goedert J
    Health Data Manag; 2008 Jun; 16(6):12. PubMed ID: 18551865
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 19.