341 related articles for article (PubMed ID: 21870693)
1. Proactive defense.
Long K
Trustee; 2011; 64(7):8-9, 1. PubMed ID: 21870693
[TBL] [Abstract][Full Text] [Related]
2. Protecting patient information. Much work remains to be done on the data security front.
Degaspari J
Healthc Inform; 2011 Mar; 28(3):32-3. PubMed ID: 21446261
[No Abstract] [Full Text] [Related]
3. How to avoid a HIPAA horror story.
Withrow SC
Healthc Financ Manage; 2010 Aug; 64(8):82-8. PubMed ID: 20707266
[TBL] [Abstract][Full Text] [Related]
4. Privacy and security become financial concern under HITECH Act.
McDavid JP
Revenue-cycle Strateg; 2010; 7(7):6-7. PubMed ID: 20632690
[No Abstract] [Full Text] [Related]
5. 5 Ways to avoid noncompliance with privacy laws.
Rose RV
Healthc Financ Manage; 2014 Feb; 68(2):40. PubMed ID: 24611223
[No Abstract] [Full Text] [Related]
6. HIPAA: how to protect yourself and your practice.
Bendix J
Med Econ; 2013 Aug; 90(15):38, 40-1. PubMed ID: 24730106
[No Abstract] [Full Text] [Related]
7. Policy Tech Trends 2010. Trend: privacy.
Raths D
Healthc Inform; 2010 Feb; 27(2):20, 22-3. PubMed ID: 20218064
[TBL] [Abstract][Full Text] [Related]
8. Fall preview. A look at the season's expected rules.
Heubusch K
J AHIMA; 2011; 82(11):46-7. PubMed ID: 22184826
[No Abstract] [Full Text] [Related]
9. Clearing the final HIPAA hurdle: preparing for compliance with the HIPAA Security Rule.
Gertz E; Burge D
Mich Health Hosp; 2003; 39(4):16-7. PubMed ID: 12886652
[TBL] [Abstract][Full Text] [Related]
10. CIOs eye HIPAA's privacy and security rules.
Goedert J
Health Data Manag; 2002 Sep; 10(9):50-4, 56, 58. PubMed ID: 12235990
[No Abstract] [Full Text] [Related]
11. Obtaining providers' 'buy-in' and establishing effective means of information exchange will be critical to HITECH's success.
Gold MR; McLaughlin CG; Devers KJ; Berenson RA; Bovbjerg RR
Health Aff (Millwood); 2012 Mar; 31(3):514-26. PubMed ID: 22392662
[TBL] [Abstract][Full Text] [Related]
12. The health privacy provisions in the American Recovery and Reinvestment Act of 2009: implications for public health policy and practice.
Goldstein MM
Public Health Rep; 2010; 125(2):343-9. PubMed ID: 20297763
[No Abstract] [Full Text] [Related]
13. Final HIPAA security regulations: a review.
Garner JC
Manag Care Q; 2003; 11(3):15-27. PubMed ID: 14983648
[TBL] [Abstract][Full Text] [Related]
14. Electronic health records: privacy, confidentiality, and security.
Harman LB; Flite CA; Bond K
Virtual Mentor; 2012 Sep; 14(9):712-9. PubMed ID: 23351350
[No Abstract] [Full Text] [Related]
15. Recognizing and reducing risks: HIPAA privacy and security enforcement.
Wachler AB; Fehn AK
Mich Health Hosp; 2003; 39(6):32-3. PubMed ID: 14628331
[TBL] [Abstract][Full Text] [Related]
16. Tackling the privacy requirements. A standard exists for administering security policies.
Culpepper TC
Healthc Inform; 2002 Jan; 19(1):88-90. PubMed ID: 12827793
[No Abstract] [Full Text] [Related]
17. Revisiting HIPAA.
Gallagher LA
Nurs Manage; 2010 Apr; 41(4):34-9; quiz 39-40. PubMed ID: 20375675
[No Abstract] [Full Text] [Related]
18. Horizon-scanning around HIPAA, HITECH. How far will they protect healthcare data from insiders, outsiders?
Barlow RD
Health Manag Technol; 2015 Jun; 36(6):6-9. PubMed ID: 26357756
[No Abstract] [Full Text] [Related]
19. Comply with regulations or risk paying hefty fines: ten tips for choosing call recording to help ensure compliance.
Johnson B
J Med Pract Manage; 2014; 29(5):290-3. PubMed ID: 24873125
[TBL] [Abstract][Full Text] [Related]
20. Reader's perspectives. Health care organizations should put the identifier rules of the Health Insurance Portability and Accountability Act on the back burner.
Yanick M; Carney R
Health Data Manag; 2002 Apr; 10(4):64. PubMed ID: 11963417
[No Abstract] [Full Text] [Related]
[Next] [New Search]