188 related articles for article (PubMed ID: 16619786)
1. How safe is your patient data?
Lowes R
Med Econ; 2006 Mar; 83(6):22-5. PubMed ID: 16619786
[No Abstract] [Full Text] [Related]
2. Security, durability & portable computers.
Miller D
Healthc Inform; 1993 May; 10(5):72, 74. PubMed ID: 10126082
[No Abstract] [Full Text] [Related]
3. Naked before the world. Will your medical secrets be safe in a new national databank?
Spragins EE; Hager M
Newsweek; 1997 Jun; 129(26):84. PubMed ID: 10168329
[No Abstract] [Full Text] [Related]
4. Identity theft and fraud--the impact on HIM operations.
Davis N; Lemery C; Roberts K
J AHIMA; 2005 Apr; 76(4):64A-64D. PubMed ID: 15871474
[No Abstract] [Full Text] [Related]
5. 5 steps to prevent a data breach in your practice.
Rey J
Med Econ; 2011 Oct; 88(20):54-5. PubMed ID: 22175183
[No Abstract] [Full Text] [Related]
6. The new threat to your medical privacy.
Consum Rep; 2006 Mar; 71(3):39-42. PubMed ID: 16541539
[No Abstract] [Full Text] [Related]
7. A real steal. Patients, providers face big liabilities as medical identity theft continues to rise, and in many cases it's an inside job.
Conn J
Mod Healthc; 2006 Oct; 36(40):26-8. PubMed ID: 17066729
[No Abstract] [Full Text] [Related]
8. Protecting your paperless medical record system requires addressing risks.
Sokol PE
QRC Advis; 2000 Apr; 16(6):1-5. PubMed ID: 11010360
[No Abstract] [Full Text] [Related]
9. Protecting patient data.
Frawley K
Qual Lett Healthc Lead; 1998 Jun; 10(6):10-3. PubMed ID: 10180625
[No Abstract] [Full Text] [Related]
10. It's 10 p.m.--do you know where your data are?
Nussbaum GM; Ault SP
Healthc Inf Manage; 1998; 12(1):3-13. PubMed ID: 10179265
[No Abstract] [Full Text] [Related]
11. Inside job. When it comes to patient information, the importance of maintaining proper data security can never be overestimated.
Grey M
Healthc Inform; 2007 Oct; 24(10):50-4, 56. PubMed ID: 17990649
[No Abstract] [Full Text] [Related]
12. Mitigating medical identity theft.
Apgar C; Apple G; Ayers L; Berntsen ML; Busch R; Childress J; Curtis E; Davis N; Dawson M; Hjort B; Hughes G; Lemery C; Mancilla D; Mozie D; O'Brien J; Rhodes H; Shewchuk T; Sweet D; White M; Zeltov Y;
J AHIMA; 2008 Jul; 79(7):63-9. PubMed ID: 18672731
[No Abstract] [Full Text] [Related]
13. Initiatives and experiences in developing, implementing, and administering data security and confidentiality policies.
Aikins R; Anderson J
Healthc Inf Manage; 1998; 12(1):51-7. PubMed ID: 10179267
[No Abstract] [Full Text] [Related]
14. Taking aim at medical identity theft. Document security key element to comply with government regulations.
Raymond C
J Med Pract Manage; 2010; 25(6):383-5. PubMed ID: 20695253
[TBL] [Abstract][Full Text] [Related]
15. VA theft included medical data. Groups concerned information could be used to discriminate against vets.
Lubell J
Mod Healthc; 2006 May; 36(22):12. PubMed ID: 16770961
[No Abstract] [Full Text] [Related]
16. Think a privacy breach couldn't happen at your facility? Think again.
Amatayakul M
Healthc Financ Manage; 2008 May; 62(5):100-1. PubMed ID: 18546975
[No Abstract] [Full Text] [Related]
17. The threat of hackers. The need to secure patient data & other important records on your agency's notebook computers.
Ott W
JEMS; 2008 Aug; 33(8):68-71. PubMed ID: 18692732
[No Abstract] [Full Text] [Related]
18. Lessons learned: mobile device encryption in the academic medical center.
Kusche KP
J Healthc Inf Manag; 2009; 23(2):22-5. PubMed ID: 19382736
[TBL] [Abstract][Full Text] [Related]
19. Medical identity theft and telemedicine security.
Terry M
Telemed J E Health; 2009 Dec; 15(10):928-32. PubMed ID: 19908998
[No Abstract] [Full Text] [Related]
20. Data security.
Tabar P
Healthc Inform; 2000 Feb; 17(2):50-2. PubMed ID: 11321693
[No Abstract] [Full Text] [Related]
[Next] [New Search]