These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

213 related articles for article (PubMed ID: 15162714)

  • 1. Single Logon: balancing security and healthcare productivity.
    Sapp MJ; Behrens TL
    J Healthc Inf Manag; 2004; 18(2):21-6. PubMed ID: 15162714
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Implementing HIPAA security in a membership organization.
    Hillabrant LP; Gaignard KE
    J Healthc Inf Manag; 2000; 14(4):53-63. PubMed ID: 11190263
    [TBL] [Abstract][Full Text] [Related]  

  • 3. HIPAA may boost technologies.
    Kelly B
    Health Data Manag; 2001 Feb; 9(2):134-6, 138. PubMed ID: 11272393
    [No Abstract]   [Full Text] [Related]  

  • 4. Healthcare information security. The threats and the safeguards--and how to manage them.
    Health Devices; 2001; 30(1-2):31-48. PubMed ID: 11258232
    [TBL] [Abstract][Full Text] [Related]  

  • 5. The HIPAA prescription for healthcare--why isn't it working?
    Gue DG; Upham R
    Health Manag Technol; 2004 Sep; 25(9):34-7. PubMed ID: 15460307
    [No Abstract]   [Full Text] [Related]  

  • 6. This is not your parents' security system. Defining user roles and creating audit trails in a HIPAA-compliant system are two critical steps to successful compliance.
    Korpman RA
    Health Manag Technol; 2002 Nov; 23(11):16, 19. PubMed ID: 12416419
    [No Abstract]   [Full Text] [Related]  

  • 7. The Health Insurance Portability & Accountability Act and the practice of dentistry in the United States: system security.
    Chasteen JE; Murphy G; Forrey A; Heid D
    J Contemp Dent Pract; 2004 Aug; 5(3):158-67. PubMed ID: 15318267
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Planning and implementing HIPAA compliance activities.
    Lee P; Staley M
    J Healthc Inf Manag; 2002; 16(2):21-5. PubMed ID: 11941916
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Comparing HIPAA practices in two multi-hospital systems.
    Rada R; Klawans C; Newton T
    J Healthc Inf Manag; 2002; 16(2):40-5. PubMed ID: 11941919
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Five ways to deal with information security incidents under HIPAA.
    Hosp Secur Saf Manage; 2001 Feb; 21(10):1-3. PubMed ID: 11260852
    [No Abstract]   [Full Text] [Related]  

  • 11. Compliance with HIPAA security standards in U.S. Hospitals.
    Davis D; Having K
    J Healthc Inf Manag; 2006; 20(2):108-15. PubMed ID: 16669594
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Making time for HIPAA.
    Szynal D
    Health Data Manag; 2001 May; 9(5):66-8, 70, 72. PubMed ID: 11372458
    [No Abstract]   [Full Text] [Related]  

  • 13. How automated access verification can help organizations demonstrate HIPAA compliance: A case study.
    Hill L
    J Healthc Inf Manag; 2006; 20(2):116-22. PubMed ID: 16669595
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Are you up to speed on HIPAA security?
    OR Manager; 2004 Jul; 20(7):25-7. PubMed ID: 15338660
    [No Abstract]   [Full Text] [Related]  

  • 15. Protecting shared information.
    Bingham A
    Healthc Inform; 2000 Oct; 17(10):122. PubMed ID: 11141745
    [No Abstract]   [Full Text] [Related]  

  • 16. Job: security. 7 steps for HIPAA compliance.
    Johnson LM; Schulte JD
    Healthc Financ Manage; 2004 Oct; 58(10):46-9. PubMed ID: 15524033
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Maximizing security standards. Technology can help achieve more than HIPAA requires.
    Stokes N
    Healthc Inform; 2005 Feb; 22(2):98. PubMed ID: 15759783
    [No Abstract]   [Full Text] [Related]  

  • 18. HIPAA security: the home stretch.
    Goedert J
    Health Data Manag; 2005 Feb; 13(2):88, 90, 92 passim. PubMed ID: 15913098
    [No Abstract]   [Full Text] [Related]  

  • 19. Hospital looks for data security, also gets improved productivity.
    Data Strateg Benchmarks; 2001 Jul; 5(7):107-10, 97. PubMed ID: 11499087
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Controlling your high-tech security shopping list.
    Amatayakul M
    Healthc Financ Manage; 2004 Feb; 58(2):86-7. PubMed ID: 14997724
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 11.