These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
246 related articles for article (PubMed ID: 21209454)
1. The importance of patients and their privacy. Perkins VH Health Aff (Millwood); 2011 Jan; 30(1):181; author reply 182. PubMed ID: 21209454 [No Abstract] [Full Text] [Related]
2. Protecting patient information. Much work remains to be done on the data security front. Degaspari J Healthc Inform; 2011 Mar; 28(3):32-3. PubMed ID: 21446261 [No Abstract] [Full Text] [Related]
3. Electronic health records: privacy, confidentiality, and security. Harman LB; Flite CA; Bond K Virtual Mentor; 2012 Sep; 14(9):712-9. PubMed ID: 23351350 [No Abstract] [Full Text] [Related]
4. Patient safety and privacy in the electronic health information era: medical and beyond. Civelek AC Clin Biochem; 2009 Mar; 42(4-5):298-9. PubMed ID: 19863928 [No Abstract] [Full Text] [Related]
5. EHR security: confluence of law, patient protection, benefit to physicians. Rashbaum KN Med Econ; 2011 Oct; 88(19):77-8. PubMed ID: 22175204 [No Abstract] [Full Text] [Related]
6. Proactive defense. Long K Trustee; 2011; 64(7):8-9, 1. PubMed ID: 21870693 [TBL] [Abstract][Full Text] [Related]
7. Obtaining providers' 'buy-in' and establishing effective means of information exchange will be critical to HITECH's success. Gold MR; McLaughlin CG; Devers KJ; Berenson RA; Bovbjerg RR Health Aff (Millwood); 2012 Mar; 31(3):514-26. PubMed ID: 22392662 [TBL] [Abstract][Full Text] [Related]
8. 'How many of you are using electronic health records?'. Grantham D Behav Healthc; 2011; 31(8):40. PubMed ID: 22283088 [No Abstract] [Full Text] [Related]
9. Protecting patient data on the go. Agabin E; Kesavan P; Coffin J J Med Assoc Ga; 2014; 103(3):14-5. PubMed ID: 25665341 [No Abstract] [Full Text] [Related]
10. Combating the privacy crime that can kill. McNabb J; Rhodes HB J AHIMA; 2014 Apr; 85(4):26-9. PubMed ID: 24834550 [No Abstract] [Full Text] [Related]
11. Sanction guidelines for privacy and security violations. Davis NA; Dinh AK; McElroy K; Olson BS; Poulson MJ; Schmidt M J AHIMA; 2011 Oct; 82(10):66-71. PubMed ID: 22029219 [No Abstract] [Full Text] [Related]
12. How to prevent cyber-virus damage to your practice. Rashbaum KN Med Econ; 2012 Feb; 89(4):58-60. PubMed ID: 24417011 [No Abstract] [Full Text] [Related]
13. Risk assessment of integrated electronic health records. Bjornsson BT; Sigurdardottir G; Stefansson SO Stud Health Technol Inform; 2010; 155():78-84. PubMed ID: 20543313 [TBL] [Abstract][Full Text] [Related]
14. Nurses and the Migration to Electronic Health Records. Duffy M Am J Nurs; 2015 Dec; 115(12):61-6. PubMed ID: 26600361 [TBL] [Abstract][Full Text] [Related]
15. Guiding deidentification forward. Goldstein MM Am J Bioeth; 2010 Sep; 10(9):27-8. PubMed ID: 20818554 [No Abstract] [Full Text] [Related]
16. Oklahoma to build statewide HIE. Interview by Jennifer Prestigiacomo. Calabro J Healthc Inform; 2010 Sep; 27(9):60, 62. PubMed ID: 20931945 [No Abstract] [Full Text] [Related]
17. 5 steps to prevent a data breach in your practice. Rey J Med Econ; 2011 Oct; 88(20):54-5. PubMed ID: 22175183 [No Abstract] [Full Text] [Related]
18. Privacy and security become financial concern under HITECH Act. McDavid JP Revenue-cycle Strateg; 2010; 7(7):6-7. PubMed ID: 20632690 [No Abstract] [Full Text] [Related]