These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

129 related articles for article (PubMed ID: 31546251)

  • 1. Types of Information Compromised in Breaches of Protected Health Information.
    Jiang JX; Bai G
    Ann Intern Med; 2020 Jan; 172(2):159-160. PubMed ID: 31546251
    [No Abstract]   [Full Text] [Related]  

  • 2. How to prevent cyber-virus damage to your practice.
    Rashbaum KN
    Med Econ; 2012 Feb; 89(4):58-60. PubMed ID: 24417011
    [No Abstract]   [Full Text] [Related]  

  • 3. Final HIPAA security regulations: a review.
    Garner JC
    Manag Care Q; 2003; 11(3):15-27. PubMed ID: 14983648
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Managing external reviewer requests in the EHR.
    Wiedemann LA
    J AHIMA; 2011 Mar; 82(3):40-1. PubMed ID: 21413518
    [No Abstract]   [Full Text] [Related]  

  • 5. Physical security, HIPPA, and the HHS wall of shame.
    Sage A
    J Healthc Prot Manage; 2014; 30(1):85-90. PubMed ID: 24707760
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Encryption and the loss of patient data.
    Miller AR; Tucker CE
    J Policy Anal Manage; 2011; 30(3):534-56. PubMed ID: 21774164
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Be prepared for breaches of protected patient information.
    Sorensen D
    Med Econ; 2013 Mar; 90(6):40. PubMed ID: 24066443
    [No Abstract]   [Full Text] [Related]  

  • 8. EMR confidentiality and information security.
    Kurtz G
    J Healthc Inf Manag; 2003; 17(3):41-8. PubMed ID: 12858596
    [TBL] [Abstract][Full Text] [Related]  

  • 9. You can help set expectations on electronic health records liability.
    Ownby G
    Med Econ; 2013 Apr; 90(8):21. PubMed ID: 24066432
    [No Abstract]   [Full Text] [Related]  

  • 10. Evaluation of Causes of Protected Health Information Breaches.
    Jiang JX; Bai G
    JAMA Intern Med; 2019 Feb; 179(2):265-267. PubMed ID: 30453327
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Trends and characteristics of protected health information breaches in the United States.
    Hossain MM; Hong YA
    AMIA Annu Symp Proc; 2019; 2019():1081-1090. PubMed ID: 32308905
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Sanction guidelines for privacy and security breaches.
    Demster B; Halpert A; Hjort B; Thomas-Lloyd A
    J AHIMA; 2009 May; 80(5):57-62. PubMed ID: 19507787
    [No Abstract]   [Full Text] [Related]  

  • 13. Warding Off Cyber Threats to Health Care.
    Laws J
    Occup Health Saf; 2016 Dec; 85(12):4. PubMed ID: 30289224
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Keeping an eye on business associates.
    Goedert J
    Health Data Manag; 2011 Nov; 19(11):40-3. PubMed ID: 22145263
    [No Abstract]   [Full Text] [Related]  

  • 15. Privacy and security for electronic health records.
    Sharpe VA
    Hastings Cent Rep; 2005; 35(6):49. PubMed ID: 16396204
    [No Abstract]   [Full Text] [Related]  

  • 16. HHS tweaking HIPAA. Rule would boost patients' rights, bans sale of data.
    Conn J
    Mod Healthc; 2010 Jul; 40(28):4. PubMed ID: 20666029
    [No Abstract]   [Full Text] [Related]  

  • 17. Privacy architecture and e-consent. What the future holds.
    Connor K
    J AHIMA; 2007 Jun; 78(6):64-5, 70. PubMed ID: 17619483
    [No Abstract]   [Full Text] [Related]  

  • 18. Policies and procedures for a legal EHR.
    Quinsey CA
    J AHIMA; 2007 Apr; 78(4):62-3. PubMed ID: 17455848
    [No Abstract]   [Full Text] [Related]  

  • 19. Hacking health care.
    McNeal M
    Mark Health Serv; 2014; 34(3):16-21. PubMed ID: 25322641
    [No Abstract]   [Full Text] [Related]  

  • 20. The rules are out. A middle ground has been successfully achieved.
    Hellerstein D
    Health Manag Technol; 2001 Feb; 22(2):8, 10. PubMed ID: 11225346
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 7.