These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
207 related articles for article (PubMed ID: 22393606)
21. Reader's perspectives. Health care organizations should put the identifier rules of the Health Insurance Portability and Accountability Act on the back burner. Yanick M; Carney R Health Data Manag; 2002 Apr; 10(4):64. PubMed ID: 11963417 [No Abstract] [Full Text] [Related]
22. Clearing the final HIPAA hurdle: preparing for compliance with the HIPAA Security Rule. Gertz E; Burge D Mich Health Hosp; 2003; 39(4):16-7. PubMed ID: 12886652 [TBL] [Abstract][Full Text] [Related]
23. Health Insurance Portability and Accountability Act of 1996. Public Law 104-191. United States US Statut Large; 1996 Aug; 110():1936-2103. PubMed ID: 16477734 [No Abstract] [Full Text] [Related]
25. Providers try to keep bearings in tech fog. Myers B Provider; 2013 Mar; 39(3):20-2, 24, 26 passim. PubMed ID: 23556246 [No Abstract] [Full Text] [Related]
26. Clinical decision support systems and how critical care clinicians use them. Weber S J Healthc Inf Manag; 2007; 21(2):41-52. PubMed ID: 17583167 [TBL] [Abstract][Full Text] [Related]
28. Readers' Perspectives. "The Health Insurance Portability and Accountability Act will increase use by health care organizations of data security technologies". Dooley C; Almanza G Health Data Manag; 2001 Nov; 9(11):64. PubMed ID: 11721546 [No Abstract] [Full Text] [Related]
29. Recognizing and reducing risks: HIPAA privacy and security enforcement. Wachler AB; Fehn AK Mich Health Hosp; 2003; 39(6):32-3. PubMed ID: 14628331 [TBL] [Abstract][Full Text] [Related]
30. Compliance with security standards: an ongoing process. Kertesz L AHIP Cover; 2005; 46(4):10, 70, 72. PubMed ID: 16149654 [No Abstract] [Full Text] [Related]
31. Health plan 2009. Technology's good and ill effects. Newhouse J Manag Care; 2004 Jan; 13(1):25. PubMed ID: 14763273 [No Abstract] [Full Text] [Related]
32. HIPAA security: the home stretch. Goedert J Health Data Manag; 2005 Feb; 13(2):88, 90, 92 passim. PubMed ID: 15913098 [No Abstract] [Full Text] [Related]
33. Data security: the time to begin is now. Goedert J Health Data Manag; 1999 Feb; 7(2):108-10, 112, 114-8. PubMed ID: 10346126 [No Abstract] [Full Text] [Related]
34. Remote access simplified. A large healthcare provider shares some practical lessons learned. Torre D Healthc Inform; 2004 Apr; 21(4):45-6. PubMed ID: 15116518 [No Abstract] [Full Text] [Related]
35. Tackling the privacy requirements. A standard exists for administering security policies. Culpepper TC Healthc Inform; 2002 Jan; 19(1):88-90. PubMed ID: 12827793 [No Abstract] [Full Text] [Related]
36. How to avoid a HIPAA horror story. Withrow SC Healthc Financ Manage; 2010 Aug; 64(8):82-8. PubMed ID: 20707266 [TBL] [Abstract][Full Text] [Related]
37. The first steps toward security. Goedert J Health Data Manag; 2001 Jul; 9(7):26-32, 34. PubMed ID: 11464723 [No Abstract] [Full Text] [Related]
38. The key to a HIPAA-safe computer system. Lowes R Med Econ; 2003 Apr; 80(7):62, 68-9. PubMed ID: 12723433 [No Abstract] [Full Text] [Related]
39. Medical informatics in population health: building Wisconsin's strategic framework for health information technology. Hanrahan LP; Foldy S; Barthell EN; Wood S WMJ; 2006 Jan; 105(1):16-20. PubMed ID: 16676485 [TBL] [Abstract][Full Text] [Related]
40. Emerging Technology and the Health Insurance Portability and Accountability Act. Boyce B J Acad Nutr Diet; 2017 Apr; 117(4):517-518. PubMed ID: 27436531 [No Abstract] [Full Text] [Related] [Previous] [Next] [New Search]