119 related articles for article (PubMed ID: 17409619)
1. [Security measures for medical data under the personal information protection law].
Noguchi Y
Nihon Hoshasen Gijutsu Gakkai Zasshi; 2007 Mar; 63(3):299-302. PubMed ID: 17409619
[No Abstract] [Full Text] [Related]
2. EMR confidentiality and information security.
Kurtz G
J Healthc Inf Manag; 2003; 17(3):41-8. PubMed ID: 12858596
[TBL] [Abstract][Full Text] [Related]
3. [Management System of Personal Data Protection in the Health Care Field].
Yamamoto R
Rinsho Byori; 2014 Nov; 62(11):1129-34. PubMed ID: 27509734
[TBL] [Abstract][Full Text] [Related]
4. Data protection and automated medical records in Belgium.
Roger FH
Med Inform (Lond); 1989; 14(3):227-8. PubMed ID: 2607858
[No Abstract] [Full Text] [Related]
5. Security standards for medical information systems.
Humphreys T
Stud Health Technol Inform; 1996; 27():131-44. PubMed ID: 10163728
[TBL] [Abstract][Full Text] [Related]
6. The principles of data protection concerning patient related data in Finland.
Tervo-Pellikka R
Int J Biomed Comput; 1994 Feb; 35 Suppl():39-50. PubMed ID: 8188421
[TBL] [Abstract][Full Text] [Related]
7. Practical aspects of handling data protection and data security.
Louwerse CP
Stud Health Technol Inform; 1991; 1():324-33. PubMed ID: 10172818
[TBL] [Abstract][Full Text] [Related]
8. Data protection and security within TANIT.
Corbeel LJ; Corbeel IL; Hortmann M
Stud Health Technol Inform; 1996; 27():162-7. PubMed ID: 10163731
[TBL] [Abstract][Full Text] [Related]
9. When technology and health care collide: issues with electronic medical records and electronic mail.
Jurevic AM
UMKC Law Rev; 1998; 66(4):809-36. PubMed ID: 16273691
[No Abstract] [Full Text] [Related]
10. Privacy and computerized medical records.
Williams RC
Ala Med; 1995 Nov-1996 Jan; 65(5-7):29-37. PubMed ID: 8607380
[TBL] [Abstract][Full Text] [Related]
11. You, the Act and data protection.
Cross P
Hosp Health Serv Rev; 1985 Nov; 81(6):269-70. PubMed ID: 10274512
[No Abstract] [Full Text] [Related]
12. Guarding patient confidentiality under managed care.
Walker LM
Med Econ; 1997 May; 74(10):155-6, 159-62, 168-70 passim. PubMed ID: 10167105
[No Abstract] [Full Text] [Related]
13. Computer security: a necessary element of integrated information systems.
Butzen F; Furler F
Bull Med Libr Assoc; 1986 Jul; 74(3):210-6. PubMed ID: 3742113
[TBL] [Abstract][Full Text] [Related]
14. The inclusion of genomic data in the 2015 revision of Japan's Protection of Personal Information Act: protection of wider range of genomic data as our next challenge.
Yamamoto N; Fujita T; Kawashima M; Wittig J; Suzuki M; Kato K
J Hum Genet; 2018 Apr; 63(4):537-538. PubMed ID: 29379193
[No Abstract] [Full Text] [Related]
15. 3 keys to security.
Joch A
Hosp Health Netw; 2004 Jan; 78(1):40-4, 2. PubMed ID: 14768450
[TBL] [Abstract][Full Text] [Related]
16. Connectivity, privacy, and liability. What medical professionals must consider.
Wernick AS
J AHIMA; 2007 Apr; 78(4):64-5. PubMed ID: 17455849
[No Abstract] [Full Text] [Related]
17. A legal examination of format, signature and confidentiality aspects of computerized health information.
Robinson DM
Health Law Can; 1997 Feb; 17(3):80-6. PubMed ID: 10165693
[No Abstract] [Full Text] [Related]
18. An accountability server for health care information systems.
Kowalski S
Int J Biomed Comput; 1994 Feb; 35 Suppl():129-38. PubMed ID: 8188405
[TBL] [Abstract][Full Text] [Related]
19. Business process design. Securing computerized health information files.
Barthel CW; Kalina CM; Fitko J
AAOHN J; 1998 Dec; 46(12):581-6; quiz 587-8. PubMed ID: 10025251
[TBL] [Abstract][Full Text] [Related]
20. Management and staff issues in data protection.
Peterson HE
Stud Health Technol Inform; 1991; 1():315-23. PubMed ID: 10164075
[No Abstract] [Full Text] [Related]
[Next] [New Search]