136 related articles for article (PubMed ID: 23469473)
1. Identifying the most vulnerable devices to HIPAA compliance.
Brost D
Health Manag Technol; 2013 Feb; 34(2):28. PubMed ID: 23469473
[No Abstract] [Full Text] [Related]
2. HIPAA security rule FAQs.
J Okla Dent Assoc; 2005 Sep; 97(1):20-1. PubMed ID: 16268271
[No Abstract] [Full Text] [Related]
3. Countdown to HIPAA compliance.
Weiss SJ
Manag Care Interface; 2002 Apr; 15(4):56-9, 75. PubMed ID: 11979707
[TBL] [Abstract][Full Text] [Related]
4. HIPAA security regulations. Protecting patient's electronic health information.
Sfikas PM
J Okla Dent Assoc; 2004; 94(4):16-20, 22. PubMed ID: 15218791
[No Abstract] [Full Text] [Related]
5. HIPAA final regulations: how final and how to comply?
Commins KJ; Short JW
Mich Health Hosp; 2001; 37(3):34-5. PubMed ID: 11372522
[No Abstract] [Full Text] [Related]
6. Mapping the way to HIPAA compliance.
Wagner L
Provider; 2002 Mar; 28(3):20-2, 25-6, 29-34. PubMed ID: 11899597
[No Abstract] [Full Text] [Related]
7. Wireless network safe and secure.
Helgeson L
Health Data Manag; 2005 Feb; 13(2):110, 112, 114. PubMed ID: 15913103
[No Abstract] [Full Text] [Related]
8. Electronic records and signatures in health care and the interplay of E-SIGN (Electronic Signatures in Global and National Commerce Act), HIPAA, and UETA (Uniform Electronic Transactions Act).
McNelis D; Helbling C
Health Care Law Mon; 2000 Oct; ():3-9. PubMed ID: 11142227
[No Abstract] [Full Text] [Related]
9. Public key infrastructure. Securing the exchange of health information.
van Dyk J
MD Comput; 2000; 17(5):44-6. PubMed ID: 11050858
[No Abstract] [Full Text] [Related]
10. New technology enables high-speed, secure access for service.
Faure P
Radiol Manage; 2002; 24(5):16-7. PubMed ID: 12422658
[No Abstract] [Full Text] [Related]
11. Trusted networks: the state of healthcare security.
Sheffel W
Behav Healthc Tomorrow; 2001 Jun; 10(3):SR26-9. PubMed ID: 11419267
[No Abstract] [Full Text] [Related]
12. HIPAA watch. Securing the perimeter.
Higgins M
Health Manag Technol; 2000 Dec; 21(12):8, 10, 12. PubMed ID: 11142001
[No Abstract] [Full Text] [Related]
13. Clearing the final HIPAA hurdle: preparing for compliance with the HIPAA Security Rule.
Gertz E; Burge D
Mich Health Hosp; 2003; 39(4):16-7. PubMed ID: 12886652
[TBL] [Abstract][Full Text] [Related]
14. Are you ready for HIPAA legislation?
Novacoski SL
Health Manag Technol; 1998 Sep; 19(10):66, 65. PubMed ID: 10185155
[No Abstract] [Full Text] [Related]
15. Prevention of HIPAA security breaches.
Fesko H; McGuigan P
Health Care Law Mon; 2007 May; ():3-9. PubMed ID: 17590913
[No Abstract] [Full Text] [Related]
16. Three myths about HIPAA compliance.
Feightner RC
Provider; 2002 Jul; 28(7):63-4. PubMed ID: 12119838
[No Abstract] [Full Text] [Related]
17. Administrative simplification or bureaucratic nightmare? HIPAA regulations to define electronic data storage and transactions.
Lazarus SS
Med Group Manage J; 1998; 45(6):14, 16, 18. PubMed ID: 10387243
[No Abstract] [Full Text] [Related]
18. Job: security. 7 steps for HIPAA compliance.
Johnson LM; Schulte JD
Healthc Financ Manage; 2004 Oct; 58(10):46-9. PubMed ID: 15524033
[TBL] [Abstract][Full Text] [Related]
19. The Health Insurance Portability & Accountability Act and the practice of dentistry in the United States: system security.
Chasteen JE; Murphy G; Forrey A; Heid D
J Contemp Dent Pract; 2004 Aug; 5(3):158-67. PubMed ID: 15318267
[TBL] [Abstract][Full Text] [Related]
20. Practical risk management considerations for clinical E-mail in ambulatory care.
Lloyd MG
J Healthc Risk Manag; 2001; 21(3):11-7. PubMed ID: 11507938
[No Abstract] [Full Text] [Related]
[Next] [New Search]