These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

188 related articles for article (PubMed ID: 24630409)

  • 1. Disaster easily averted? Data confidentiality and the hospital desktop computer.
    Sethi N; Lane G; Newton S; Egan P; Ghosh S
    Int J Med Inform; 2014 May; 83(5):385-91. PubMed ID: 24630409
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Data protection among junior medical staff: a questionnaire study.
    Titchener AG; Ramoutar A; Ramoutar DN; Yousef A
    J Patient Saf; 2013 Jun; 9(2):75-8. PubMed ID: 23429244
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Confidentiality of Information Stored on the Desktop of Computers in a Psychiatric Hospital: Before and After an Intervention.
    Ahmadian L; Raeesi A; Abbasi R
    Comput Inform Nurs; 2021 Jun; 39(12):948-954. PubMed ID: 34091474
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Knowledge and practice of confidential data handling in the Welsh Deanery: a brief report.
    Jackson LE; Lim MW
    J Med Ethics; 2011 Jan; 37(1):58-60. PubMed ID: 21149322
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Electronic patient data confidentiality practices among surgical trainees: questionnaire study.
    Mole DJ; Fox C; Napolitano G
    Ann R Coll Surg Engl; 2006 Oct; 88(6):550-3. PubMed ID: 17059715
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Electronic documentation on a psychiatric unit.
    Tiessen B; Doan K; Benoit L
    Can Nurse; 2001 Nov; 97(10):27-9. PubMed ID: 11765435
    [No Abstract]   [Full Text] [Related]  

  • 7. Protection of computerized medical data--a problem?
    van der Poel KG; Smit PC
    S Afr Med J; 1985 Jul; 68(2):106-9. PubMed ID: 4012498
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Keep electronic records safe!
    Celia LM
    RN; 2002 Jun; 65(6):69-71. PubMed ID: 12087602
    [No Abstract]   [Full Text] [Related]  

  • 9. What is a Caldicott guardian?
    Roch-Berry C
    Postgrad Med J; 2003 Sep; 79(935):516-8. PubMed ID: 13679547
    [TBL] [Abstract][Full Text] [Related]  

  • 10. At the virtual watercooler with a look at HIPAA and occupational dose information.
    Masih ST
    Health Phys; 2004 May; 86(5 Suppl):S69-70. PubMed ID: 15069290
    [No Abstract]   [Full Text] [Related]  

  • 11. Balancing potential risks and benefits of using confidential data.
    Davies C; Collins R
    BMJ; 2006 Aug; 333(7563):349-51. PubMed ID: 16902218
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Cleaning up the paper trail - our clinical notes in open view.
    Lambe G; Linnane N; Callanan I; Butler MW
    Int J Health Care Qual Assur; 2018 Apr; 31(3):228-236. PubMed ID: 29687753
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Taiwan's perspective on electronic medical records' security and privacy protection: lessons learned from HIPAA.
    Yang CM; Lin HC; Chang P; Jian WS
    Comput Methods Programs Biomed; 2006 Jun; 82(3):277-82. PubMed ID: 16730852
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Data protection: Part One.
    Eby M
    Nurs Manag (Harrow); 2003 Jun; 10(3):32-5. PubMed ID: 12830635
    [No Abstract]   [Full Text] [Related]  

  • 15. Information technologies need to protect patient confidentiality.
    Pendrak RF; Ericson RP
    Healthc Financ Manage; 1998 Oct; 52(10):66-8. PubMed ID: 10187618
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Patient accessible electronic health records: exploring recommendations for successful implementation strategies.
    Wiljer D; Urowitz S; Apatu E; DeLenardo C; Eysenbach G; Harth T; Pai H; Leonard KJ;
    J Med Internet Res; 2008 Oct; 10(4):e34. PubMed ID: 18974036
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Guide to good practices to ensure privacy protection in secondary use of medical records.
    Riou C; Fresson J; Serre JL; Avillach P; Leneveut L; Quantin C;
    Rev Epidemiol Sante Publique; 2014 Jun; 62(3):207-14. PubMed ID: 24889912
    [No Abstract]   [Full Text] [Related]  

  • 18. Implementing technological safeguards to ensure patient privacy.
    Leestma R
    Caring; 2003 Feb; 22(2):16-8. PubMed ID: 12625255
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Access control and system audit based on "patient-doctor relation and clinical situation" model.
    Hirose Y
    Stud Health Technol Inform; 1998; 52 Pt 2():1151-5. PubMed ID: 10384640
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Beyond the DICOM header: additional issues in deidentification.
    Robinson JD
    AJR Am J Roentgenol; 2014 Dec; 203(6):W658-64. PubMed ID: 25415732
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 10.