These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
3. Legal protections related to security concerns. McKenzie DJ; Petersen ML J Healthc Inf Manag; 2003; 17(3):19-21. PubMed ID: 12858590 [No Abstract] [Full Text] [Related]
4. Doing the right thing. While HIPAA's ends are noble, its means are hotly disputed. Meanwhile, time is running out.... Interview by Charlene Marietti. Braithwaite B Healthc Inform; 1998 Oct; 15(10):51-4, 56, 58 passim. PubMed ID: 10185030 [No Abstract] [Full Text] [Related]
6. Building a secure home: protecting individually identifiable patient information. Keese JM Radiol Manage; 2001; 23(6):50-1. PubMed ID: 11793563 [No Abstract] [Full Text] [Related]
7. EPHI crib notes. With proper security, safeguards and tools in place, the threat of a looming audit may not be so scary. Lukes S Healthc Inform; 2007 Sep; 24(9):54, 56. PubMed ID: 17927069 [No Abstract] [Full Text] [Related]
8. Where we are with HIPAA. Kroken P Radiol Manage; 2005; 27(4):10-2. PubMed ID: 16187605 [No Abstract] [Full Text] [Related]
9. The HIPAA security rule. The final version provides a flexible framework for achieving compliance. Hirsch R Healthc Inform; 2003 Apr; 20(4):56, 58. PubMed ID: 18800468 [No Abstract] [Full Text] [Related]
10. Status report: time is nigh for HIPAA rules. Goedert J Health Data Manag; 2003 Feb; 11(2):82-4, 86, 88. PubMed ID: 12602288 [No Abstract] [Full Text] [Related]
12. Information security issues that healthcare management must understand. Beaver K J Healthc Inf Manag; 2003; 17(1):46-9. PubMed ID: 12553220 [TBL] [Abstract][Full Text] [Related]
13. The story on security: stay tuned for details... Bauer JC J Healthc Inf Manag; 2003; 17(3):12-3. PubMed ID: 12858588 [No Abstract] [Full Text] [Related]
14. Mobile tech gets security check. Schuerenberg BK Health Data Manag; 2003 Nov; 11(11):54-7. PubMed ID: 14619104 [No Abstract] [Full Text] [Related]
15. Best practices for compliance with the final security rule. Walsh T J Healthc Inf Manag; 2003; 17(3):14-8. PubMed ID: 12858589 [No Abstract] [Full Text] [Related]
16. The HIPAA security rule--more questions than answers. Lang RD J Healthc Inf Manag; 2009; 23(2):2-3. PubMed ID: 19382728 [No Abstract] [Full Text] [Related]
17. Locking down health information networks. Fenner M Health Data Manag; 2004 Jul; 12(7):56, 58, 60 passim. PubMed ID: 15573519 [No Abstract] [Full Text] [Related]
18. Are you up to speed on HIPAA security? OR Manager; 2004 Jul; 20(7):25-7. PubMed ID: 15338660 [No Abstract] [Full Text] [Related]
19. Organizational repertoires and rites in health information security. Cooper T; Collmann J; Neidermeier H Camb Q Healthc Ethics; 2008; 17(4):441-52. PubMed ID: 18724883 [No Abstract] [Full Text] [Related]
20. Maximizing security standards. Technology can help achieve more than HIPAA requires. Stokes N Healthc Inform; 2005 Feb; 22(2):98. PubMed ID: 15759783 [No Abstract] [Full Text] [Related] [Next] [New Search]