202 related articles for article (PubMed ID: 15573519)
1. Locking down health information networks.
Fenner M
Health Data Manag; 2004 Jul; 12(7):56, 58, 60 passim. PubMed ID: 15573519
[No Abstract] [Full Text] [Related]
2. Is security compliance just IT's problem?
Mack J
Manag Care; 2004 Sep; 13(9 Suppl Readiness):4-5, 7. PubMed ID: 15490671
[No Abstract] [Full Text] [Related]
3. Best practices for compliance with the final security rule.
Walsh T
J Healthc Inf Manag; 2003; 17(3):14-8. PubMed ID: 12858589
[No Abstract] [Full Text] [Related]
4. CIOs coming in for a pit stop in the HIPAA compliance race.
Gillespie G
Health Data Manag; 2003 Aug; 11(8):34-8, 40. PubMed ID: 12945482
[No Abstract] [Full Text] [Related]
5. CIOs eye HIPAA's privacy and security rules.
Goedert J
Health Data Manag; 2002 Sep; 10(9):50-4, 56, 58. PubMed ID: 12235990
[No Abstract] [Full Text] [Related]
6. Finding the right HIPAA mix.
Goedert J
Health Data Manag; 2004 Jul; 12(7):48, 50, 52 passim. PubMed ID: 15573518
[No Abstract] [Full Text] [Related]
7. Maximizing security standards. Technology can help achieve more than HIPAA requires.
Stokes N
Healthc Inform; 2005 Feb; 22(2):98. PubMed ID: 15759783
[No Abstract] [Full Text] [Related]
8. The new survival kit.
Tabar P
Healthc Inform; 2004 Feb; 21(2):56-8, 61. PubMed ID: 15004911
[No Abstract] [Full Text] [Related]
9. The HIPAA security rule. The final version provides a flexible framework for achieving compliance.
Hirsch R
Healthc Inform; 2003 Apr; 20(4):56, 58. PubMed ID: 18800468
[No Abstract] [Full Text] [Related]
10. An integrated business approach to process improvement and HIPAA compliance.
Vegoda PR; Abramson CN
J Healthc Inf Manag; 2003; 17(3):59-62. PubMed ID: 12858599
[TBL] [Abstract][Full Text] [Related]
11. EPHI crib notes. With proper security, safeguards and tools in place, the threat of a looming audit may not be so scary.
Lukes S
Healthc Inform; 2007 Sep; 24(9):54, 56. PubMed ID: 17927069
[No Abstract] [Full Text] [Related]
12. The final security rule. Compliance begins with risk analysis.
Adler MP
Healthc Inform; 2003 Oct; 20(10):74-6. PubMed ID: 14598463
[No Abstract] [Full Text] [Related]
13. Rightsizing HIPAA security compliance for smaller organizations.
Proctor PE; Davis N; Rosenblum B
J Healthc Inf Manag; 2003; 17(3):34-40. PubMed ID: 12858595
[TBL] [Abstract][Full Text] [Related]
14. CIOs speak out.
Brighton J; Henderson M; Hiester G; O'Brien P; Voran D
Healthc Inform; 2000 Apr; 17(4):75-6, 78, 80-2. PubMed ID: 11066571
[No Abstract] [Full Text] [Related]
15. Are you up to speed on HIPAA security?
OR Manager; 2004 Jul; 20(7):25-7. PubMed ID: 15338660
[No Abstract] [Full Text] [Related]
16. Reader's perspectives. Health care organizations should put the identifier rules of the Health Insurance Portability and Accountability Act on the back burner.
Yanick M; Carney R
Health Data Manag; 2002 Apr; 10(4):64. PubMed ID: 11963417
[No Abstract] [Full Text] [Related]
17. Two technologies let hospitals pass on words.
Briggs B
Health Data Manag; 2004 Sep; 12(9):34-6, 38, 40 passim. PubMed ID: 15568574
[No Abstract] [Full Text] [Related]
18. Readers' Perspectives. "The Health Insurance Portability and Accountability Act will increase use by health care organizations of data security technologies".
Dooley C; Almanza G
Health Data Manag; 2001 Nov; 9(11):64. PubMed ID: 11721546
[No Abstract] [Full Text] [Related]
19. How your technology vendor can help achieve--not guarantee--HIPAA compliance.
Paton J
Behav Healthc Tomorrow; 2002 Dec; 11(6):SR33, SR36. PubMed ID: 12506602
[No Abstract] [Full Text] [Related]
20. HIPPA, 10 years after.
Conn J
Mod Healthc; 2006 Aug; 36(31):26-8. PubMed ID: 16958352
[No Abstract] [Full Text] [Related]
[Next] [New Search]