These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
142 related articles for article (PubMed ID: 26168652)
1. PROTECTING PATIENT PRIVACY. Kiser K Minn Med; 2015 Jun; 98(6):8-10. PubMed ID: 26168652 [No Abstract] [Full Text] [Related]
2. Health Information Security & Privacy Collaboration (HISPC) Provider Education Toolkit (PET). Conner MH; Cole L; Krebs CA Ky Nurse; 2010; 58(1):8. PubMed ID: 20128210 [No Abstract] [Full Text] [Related]
3. Electronic health records: privacy, confidentiality, and security. Harman LB; Flite CA; Bond K Virtual Mentor; 2012 Sep; 14(9):712-9. PubMed ID: 23351350 [No Abstract] [Full Text] [Related]
4. Security of electronic medical information and patient privacy: what you need to know. Andriole KP J Am Coll Radiol; 2014 Dec; 11(12 Pt B):1212-6. PubMed ID: 25467897 [TBL] [Abstract][Full Text] [Related]
5. Protecting patient information. Much work remains to be done on the data security front. Degaspari J Healthc Inform; 2011 Mar; 28(3):32-3. PubMed ID: 21446261 [No Abstract] [Full Text] [Related]
6. To text or not to text? Blustein AE; Gulick SL J Am Coll Radiol; 2012 Jun; 9(6):434-6. PubMed ID: 22632672 [No Abstract] [Full Text] [Related]
7. EHR security: confluence of law, patient protection, benefit to physicians. Rashbaum KN Med Econ; 2011 Oct; 88(19):77-8. PubMed ID: 22175204 [No Abstract] [Full Text] [Related]
8. 2012-2013 National Health Law Moot Court Competition: best brief. J Leg Med; 2013; 34(4):357-91. PubMed ID: 24328515 [No Abstract] [Full Text] [Related]
9. Into the breach: introduction to the 2012-2013 National Health Law Moot Court Competition problem. Bambauer J J Leg Med; 2013; 34(4):337-9. PubMed ID: 24328513 [No Abstract] [Full Text] [Related]
10. HIPAA: how to protect yourself and your practice. Bendix J Med Econ; 2013 Aug; 90(15):38, 40-1. PubMed ID: 24730106 [No Abstract] [Full Text] [Related]
11. How HIPAA final rules affect health information technology vendors. Clark LW; Bilimoria NM J Med Pract Manage; 2013; 29(1):56-8. PubMed ID: 24044202 [No Abstract] [Full Text] [Related]
12. Combating the privacy crime that can kill. McNabb J; Rhodes HB J AHIMA; 2014 Apr; 85(4):26-9. PubMed ID: 24834550 [No Abstract] [Full Text] [Related]
13. Protecting the privacy of computerized health information. The Kassabaum-Kennedy Act. Prentnieks M; Qual S Minn Med; 1996 Nov; 79(11):47-51. PubMed ID: 8961736 [No Abstract] [Full Text] [Related]
15. Healthcare information technology. ; Lee A Issue Brief Health Policy Track Serv; 2012 Jan; ():1-42. PubMed ID: 22413189 [No Abstract] [Full Text] [Related]
16. [The final impetus for the E-card is still missing. The health card: two steps forward, one back?]. Höhl R MMW Fortschr Med; 2010 Sep; 152(38):10. PubMed ID: 20957780 [No Abstract] [Full Text] [Related]
17. Network, privacy revisited. Blumenthal eyes national policy for IT security. Conn J Mod Healthc; 2009 Nov; 39(44):12. PubMed ID: 20135784 [No Abstract] [Full Text] [Related]
18. Getting out of the compliance mindset: doing more with data security. Leading healthcare organizations have tackled the growing issue of data security through different technologies. Perna G Healthc Inform; 2013; 30(8):22-4. PubMed ID: 24490320 [No Abstract] [Full Text] [Related]
19. Personal health records: protecting behavioral health consumers' rights. Fetter MS Issues Ment Health Nurs; 2009 Nov; 30(11):720-2. PubMed ID: 19874102 [No Abstract] [Full Text] [Related]
20. Healthcare information technology. Issue brief. Lee A Issue Brief Health Policy Track Serv; 2012 Dec; ():1-56. PubMed ID: 23297451 [No Abstract] [Full Text] [Related] [Next] [New Search]