These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
42. Handhelds and HIPAA. Knox C; Smith A Nurs Manage; 2007 Jun; 38(6):38-40. PubMed ID: 17538460 [No Abstract] [Full Text] [Related]
43. Online medical and dental history submission for patients. Rossein KD Dent Today; 2008 Sep; 27(9):136, 138. PubMed ID: 18807964 [No Abstract] [Full Text] [Related]
44. Securing ePHI--can clinicians and IT ever agree? Stevenson GW; Valenta AL J Healthc Inf Manag; 2009; 23(4):46-53. PubMed ID: 19894487 [TBL] [Abstract][Full Text] [Related]
45. E-SIGN paves the way for electronic signatures. Hirsch WR J Cardiovasc Manag; 2000; 11(5):14-5. PubMed ID: 11183726 [No Abstract] [Full Text] [Related]
46. Security impacts physicians ... as well as developers. How software companies are coping with EMR security needs. Cox JL Health Manag Technol; 2000 Oct; 21(10):27. PubMed ID: 11143056 [No Abstract] [Full Text] [Related]
48. May I please see some identification? Victoroff MS Manag Care; 2002 Jan; 11(1):20-2. PubMed ID: 11828867 [No Abstract] [Full Text] [Related]
49. What will stop data breaches? Goedert J Health Data Manag; 2008 Jun; 16(6):12. PubMed ID: 18551865 [No Abstract] [Full Text] [Related]
50. An overview of the HIPAA Security Rule. Optometry; 2004 Oct; 75(10):654-7. PubMed ID: 15508867 [No Abstract] [Full Text] [Related]
51. HIPAA security redux. A re-evaluation process and recommended areas to review. Adler MP J AHIMA; 2007; 78(10):38-42. PubMed ID: 18062433 [No Abstract] [Full Text] [Related]
52. HIPAA compliant auditing system for medical images. Zhou Z; Liu BJ Comput Med Imaging Graph; 2005; 29(2-3):235-41. PubMed ID: 15755540 [TBL] [Abstract][Full Text] [Related]
53. Compliance with security standards: an ongoing process. Kertesz L AHIP Cover; 2005; 46(4):10, 70, 72. PubMed ID: 16149654 [No Abstract] [Full Text] [Related]
54. Deploying secure, reliable wireless LANs in the healthcare environment. Sims B Health Manag Technol; 2003 Apr; 24(4):24, 27-9. PubMed ID: 12698616 [No Abstract] [Full Text] [Related]
55. Transfer of health data in the post-HIPAA era. Manag Care Interface; 2001 Jun; Suppl():7-8. PubMed ID: 11428233 [No Abstract] [Full Text] [Related]
56. Respiratory care in the computer age. Stewart KJ Respir Care; 2004 Apr; 49(4):361-4; discussion 364-6. PubMed ID: 15030609 [TBL] [Abstract][Full Text] [Related]
57. Readers' perspectives. . . The HIPPA security rule has contributed to better protection of patient information. Do you agree or disagree? Dechow J; Price A; Kerber J; Brancato C; Shaw K Health Data Manag; 2005 Dec; 13(12):64. PubMed ID: 16381497 [No Abstract] [Full Text] [Related]
58. HIPAA and the EHR: making technical safeguard changes. Fodor J J AHIMA; 2004 Jan; 75(1):54-5; quiz 61-2. PubMed ID: 14748230 [No Abstract] [Full Text] [Related]
59. Firewalls: cheap and easy protection. Lowes B Med Econ; 2003 Sep; 80(17):20-1. PubMed ID: 14521007 [No Abstract] [Full Text] [Related]
60. Privacy and security in Pennsylvania: ensuring privacy and security of health information exchange in Pennsylvania. Marshall GF; Gillespie W; Fox SJ J Healthc Inf Manag; 2009; 23(2):38-44. PubMed ID: 19382739 [TBL] [Abstract][Full Text] [Related] [Previous] [Next] [New Search]