452 related articles for article (PubMed ID: 15490671)
41. HIPAA privacy and security regulations.
Kibbe DC
Case Manager; 2001; 12(2):34-9. PubMed ID: 11244399
[No Abstract] [Full Text] [Related]
42. Finding the right HIPAA mix.
Goedert J
Health Data Manag; 2004 Jul; 12(7):48, 50, 52 passim. PubMed ID: 15573518
[No Abstract] [Full Text] [Related]
43. How your technology vendor can help achieve--not guarantee--HIPAA compliance.
Paton J
Behav Healthc Tomorrow; 2002 Dec; 11(6):SR33, SR36. PubMed ID: 12506602
[No Abstract] [Full Text] [Related]
44. Legal protections related to security concerns.
McKenzie DJ; Petersen ML
J Healthc Inf Manag; 2003; 17(3):19-21. PubMed ID: 12858590
[No Abstract] [Full Text] [Related]
45. A final checklist. It's never too late--there is still time to take some critical steps to advance your organization toward HIPAA compliance.
Robertson A
Health Manag Technol; 2003 Mar; 24(3):12, 14. PubMed ID: 12647611
[No Abstract] [Full Text] [Related]
46. ebXML's practical benefits. Formation of a path to HIPAA security compliance is only one outcome.
Rishel W
Healthc Inform; 2002 Jan; 19(1):43-4. PubMed ID: 12827788
[No Abstract] [Full Text] [Related]
47. Compliance with security standards: an ongoing process.
Kertesz L
AHIP Cover; 2005; 46(4):10, 70, 72. PubMed ID: 16149654
[No Abstract] [Full Text] [Related]
48. Safe keeping.
Steve D
Health Facil Manage; 2003 Dec; 16(12):12-7. PubMed ID: 14710684
[No Abstract] [Full Text] [Related]
49. HIPAA's impact on radiology.
Lehman J
Radiol Manage; 2003; 25(1):45-6. PubMed ID: 12656058
[No Abstract] [Full Text] [Related]
50. HIPAA compliance strategies.
Goedert J
Health Data Manag; 2002 Jul; 10(7):32-6, 38, 40-1. PubMed ID: 12141052
[No Abstract] [Full Text] [Related]
51. Can you keep a secret?
Curtin L; Simpson RL
Health Manag Technol; 2001 Jun; 22(6):44. PubMed ID: 11409284
[No Abstract] [Full Text] [Related]
52. A reasonable approach to security. Quantitative risk management goes beyond HIPAA compliance.
Drake A
Healthc Inform; 2004 Aug; 21(8):38. PubMed ID: 15373303
[No Abstract] [Full Text] [Related]
53. 'Second generation' Internet e-health: the gladiator for HIPAA compliance?
Korpman RA; Rose JS
Physician Exec; 2001; 27(2):50-6. PubMed ID: 11291221
[TBL] [Abstract][Full Text] [Related]
54. Trusted networks: the state of healthcare security.
Sheffel W
Behav Healthc Tomorrow; 2001 Jun; 10(3):SR26-9. PubMed ID: 11419267
[No Abstract] [Full Text] [Related]
55. Risk management methodology for HIPAA security standard.
Aikins R
J Healthc Inf Manag; 2000; 14(4):29-40. PubMed ID: 11190260
[TBL] [Abstract][Full Text] [Related]
56. Job: security. 7 steps for HIPAA compliance.
Johnson LM; Schulte JD
Healthc Financ Manage; 2004 Oct; 58(10):46-9. PubMed ID: 15524033
[TBL] [Abstract][Full Text] [Related]
57. Do your e-mails comply with new security regs?
Healthcare Benchmarks Qual Improv; 2005 May; 12(5):54-6. PubMed ID: 15918244
[TBL] [Abstract][Full Text] [Related]
58. It's all about process. Focusing on improving the process rather than eliminating the paper is the key to reducing administrative costs.
Wilson S
Health Manag Technol; 2002 Sep; 23(9):24, 27-9. PubMed ID: 12232898
[No Abstract] [Full Text] [Related]
59. Patient privacy: how far is too far?
Gallagher SM
Ostomy Wound Manage; 2002 Feb; 48(2):50-1. PubMed ID: 15382414
[TBL] [Abstract][Full Text] [Related]
60. Down the beaten HIPAA path.
Goedert J
Health Data Manag; 2004 Feb; 12(2):64-6, 68, 70. PubMed ID: 14971100
[No Abstract] [Full Text] [Related]
[Previous] [Next] [New Search]