These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
212 related articles for article (PubMed ID: 17974083)
21. Patients justified in their concern about privacy of health Web sites, study finds. Health Care Strateg Manage; 2000 Mar; 18(3):9-10. PubMed ID: 10787670 [No Abstract] [Full Text] [Related]
23. Property rights and privacy principles. Knapp TR; Walter J; Renaudin CP J Healthc Inf Manag; 2000; 14(4):83-93. PubMed ID: 11190265 [TBL] [Abstract][Full Text] [Related]
24. Information technologies need to protect patient confidentiality. Pendrak RF; Ericson RP Healthc Financ Manage; 1998 Oct; 52(10):66-8. PubMed ID: 10187618 [TBL] [Abstract][Full Text] [Related]
25. Implications of the HITECH Act of 2009. Crownover K Caring; 2009 Jul; 28(7):40-2. PubMed ID: 19772086 [No Abstract] [Full Text] [Related]
26. What will stop data breaches? Goedert J Health Data Manag; 2008 Jun; 16(6):12. PubMed ID: 18551865 [No Abstract] [Full Text] [Related]
27. Conducting your own internal assessment. American Health Information Management Association. Cassidy B J AHIMA; 2000 May; 71(5):16A-16D. PubMed ID: 11009868 [No Abstract] [Full Text] [Related]
28. Surviving in a post-HIPAA environment by creating a culture of privacy and security. Watson A AHIP Cover; 2005; 46(4):26-30. PubMed ID: 16149657 [No Abstract] [Full Text] [Related]
29. Prevention of HIPAA security breaches. Fesko H; McGuigan P Health Care Law Mon; 2007 May; ():3-9. PubMed ID: 17590913 [No Abstract] [Full Text] [Related]
30. Patient privacy and security of electronic medical information for radiologists: the basics. Andriole KP; Khorasani R J Am Coll Radiol; 2010 Jun; 7(6):397-9. PubMed ID: 20522391 [No Abstract] [Full Text] [Related]
31. Readers' perspectives. . . The HIPPA security rule has contributed to better protection of patient information. Do you agree or disagree? Dechow J; Price A; Kerber J; Brancato C; Shaw K Health Data Manag; 2005 Dec; 13(12):64. PubMed ID: 16381497 [No Abstract] [Full Text] [Related]
33. Clearing the final HIPAA hurdle: preparing for compliance with the HIPAA Security Rule. Gertz E; Burge D Mich Health Hosp; 2003; 39(4):16-7. PubMed ID: 12886652 [TBL] [Abstract][Full Text] [Related]
34. A reasonable approach to security. Quantitative risk management goes beyond HIPAA compliance. Drake A Healthc Inform; 2004 Aug; 21(8):38. PubMed ID: 15373303 [No Abstract] [Full Text] [Related]
35. The HIPAA security rule--more questions than answers. Lang RD J Healthc Inf Manag; 2009; 23(2):2-3. PubMed ID: 19382728 [No Abstract] [Full Text] [Related]
36. Security impacts physicians ... as well as developers. How software companies are coping with EMR security needs. Cox JL Health Manag Technol; 2000 Oct; 21(10):27. PubMed ID: 11143056 [No Abstract] [Full Text] [Related]
37. HIPAA update. Achieving compliance with the new standards. Amatayakul M MD Comput; 2000; 17(3):54-6. PubMed ID: 10842986 [No Abstract] [Full Text] [Related]
38. The Health Insurance Portability & Accountability Act and the practice of dentistry in the United States: system security. Chasteen JE; Murphy G; Forrey A; Heid D J Contemp Dent Pract; 2004 Aug; 5(3):158-67. PubMed ID: 15318267 [TBL] [Abstract][Full Text] [Related]
39. A security strategy: possibly the biggest task on healthcare's to-do list. Tabar P Healthc Inform; 2001 Feb; 18(2):46, 48. PubMed ID: 11225064 [No Abstract] [Full Text] [Related]
40. The hope of HIPAA 2. Data stewardship must replace minimal compliance. Cushman R Mod Healthc; 2008 Feb; 38(7):28. PubMed ID: 18389819 [No Abstract] [Full Text] [Related] [Previous] [Next] [New Search]