These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
152 related articles for article (PubMed ID: 23488397)
1. How to protect valuable patient data. Encryption, passwords essential lines of defense, experts say. McBride M Med Econ; 2012 Sep; 89(17):42-4. PubMed ID: 23488397 [No Abstract] [Full Text] [Related]
2. Final HIPAA security regulations: a review. Garner JC Manag Care Q; 2003; 11(3):15-27. PubMed ID: 14983648 [TBL] [Abstract][Full Text] [Related]
3. EPHI crib notes. With proper security, safeguards and tools in place, the threat of a looming audit may not be so scary. Lukes S Healthc Inform; 2007 Sep; 24(9):54, 56. PubMed ID: 17927069 [No Abstract] [Full Text] [Related]
4. Privacy: after the compliance date. Mikels D J Healthc Inf Manag; 2004; 18(2):34-7. PubMed ID: 15162716 [TBL] [Abstract][Full Text] [Related]
5. Building a secure home: protecting individually identifiable patient information. Keese JM Radiol Manage; 2001; 23(6):50-1. PubMed ID: 11793563 [No Abstract] [Full Text] [Related]
7. Information technologies need to protect patient confidentiality. Pendrak RF; Ericson RP Healthc Financ Manage; 1998 Oct; 52(10):66-8. PubMed ID: 10187618 [TBL] [Abstract][Full Text] [Related]
8. The first steps toward security. Goedert J Health Data Manag; 2001 Jul; 9(7):26-32, 34. PubMed ID: 11464723 [No Abstract] [Full Text] [Related]
9. Data security: the time to begin is now. Goedert J Health Data Manag; 1999 Feb; 7(2):108-10, 112, 114-8. PubMed ID: 10346126 [No Abstract] [Full Text] [Related]
11. Compliance with security standards: an ongoing process. Kertesz L AHIP Cover; 2005; 46(4):10, 70, 72. PubMed ID: 16149654 [No Abstract] [Full Text] [Related]
12. The hope of HIPAA 2. Data stewardship must replace minimal compliance. Cushman R Mod Healthc; 2008 Feb; 38(7):28. PubMed ID: 18389819 [No Abstract] [Full Text] [Related]
13. Clearing the final HIPAA hurdle: preparing for compliance with the HIPAA Security Rule. Gertz E; Burge D Mich Health Hosp; 2003; 39(4):16-7. PubMed ID: 12886652 [TBL] [Abstract][Full Text] [Related]
14. HIPAA compliance: getting beyond the hype to real solutions. Ciotti VG Patient Acc; 2001 Jul; 24(7):2. PubMed ID: 12966761 [No Abstract] [Full Text] [Related]
15. Tackling the privacy requirements. A standard exists for administering security policies. Culpepper TC Healthc Inform; 2002 Jan; 19(1):88-90. PubMed ID: 12827793 [No Abstract] [Full Text] [Related]
16. HIPAA's here. How to comply with new rules that govern protected health information. Kibbe DC Nurs Manage; 2001 Apr; 32(4):32-4. PubMed ID: 15103852 [TBL] [Abstract][Full Text] [Related]
17. New data security regs to pose challenge to healthcare administrators. Hosp Secur Saf Manage; 2000 Sep; 21(5):9-10. PubMed ID: 11186791 [No Abstract] [Full Text] [Related]
18. HIPAA. Blueprint for privacy and security. Bringing information protection up to code will require a new way of doing things. Marietti C Healthc Inform; 2002 Jan; 19(1):55-8, 60. PubMed ID: 12827790 [No Abstract] [Full Text] [Related]
19. A reasonable approach to security. Quantitative risk management goes beyond HIPAA compliance. Drake A Healthc Inform; 2004 Aug; 21(8):38. PubMed ID: 15373303 [No Abstract] [Full Text] [Related]