These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


PUBMED FOR HANDHELDS

Journal Abstract Search


1549 related items for PubMed ID: 12858596

  • 1. EMR confidentiality and information security.
    Kurtz G.
    J Healthc Inf Manag; 2003; 17(3):41-8. PubMed ID: 12858596
    [Abstract] [Full Text] [Related]

  • 2. The first steps toward security.
    Goedert J.
    Health Data Manag; 2001 Jul; 9(7):26-32, 34. PubMed ID: 11464723
    [No Abstract] [Full Text] [Related]

  • 3. Too much of a good thing? CIOs strive to increase security while decreasing the 'obstacles' between users and data.
    Gillespie G.
    Health Data Manag; 2001 Sep; 9(9):42-6, 48-50. PubMed ID: 11565145
    [No Abstract] [Full Text] [Related]

  • 4. Final HIPAA security regulations: a review.
    Garner JC.
    Manag Care Q; 2003 Sep; 11(3):15-27. PubMed ID: 14983648
    [Abstract] [Full Text] [Related]

  • 5. Can chief security officers protect data from prying eyes?
    Siwicki B.
    Health Data Manag; 1998 Oct; 6(10):54-6, 58, 60 passim. PubMed ID: 10185885
    [Abstract] [Full Text] [Related]

  • 6. Information technologies need to protect patient confidentiality.
    Pendrak RF, Ericson RP.
    Healthc Financ Manage; 1998 Oct; 52(10):66-8. PubMed ID: 10187618
    [Abstract] [Full Text] [Related]

  • 7.
    ; . PubMed ID:
    [No Abstract] [Full Text] [Related]

  • 8. HIPAA: the critical role of identity and access management.
    Stanton J.
    J Healthc Inf Manag; 2004 Oct; 18(2):38-43. PubMed ID: 15162717
    [Abstract] [Full Text] [Related]

  • 9. HIPAA impacting patient medical information.
    Regan J, Smith L.
    Tenn Med; 2009 May; 102(5):41-2. PubMed ID: 19456029
    [No Abstract] [Full Text] [Related]

  • 10. Down the beaten HIPAA path.
    Goedert J.
    Health Data Manag; 2004 Feb; 12(2):64-6, 68, 70. PubMed ID: 14971100
    [No Abstract] [Full Text] [Related]

  • 11. Standards for privacy of individually identifiable health information. HIPAA implementation.
    Kans Nurse; 2002 Jan; 77(1):10-1. PubMed ID: 16381381
    [No Abstract] [Full Text] [Related]

  • 12. The future of card technology in health care.
    Kelly B.
    Health Data Manag; 2002 May; 10(5):64-8. PubMed ID: 12017105
    [No Abstract] [Full Text] [Related]

  • 13.
    ; . PubMed ID:
    [No Abstract] [Full Text] [Related]

  • 14.
    ; . PubMed ID:
    [No Abstract] [Full Text] [Related]

  • 15. Recognizing and reducing risks: HIPAA privacy and security enforcement.
    Wachler AB, Fehn AK.
    Mich Health Hosp; 2003 May; 39(6):32-3. PubMed ID: 14628331
    [Abstract] [Full Text] [Related]

  • 16. Eye on info. Controlling information access. Providers contend with balancing act.
    Morrissey J.
    Mod Healthc; 2001 Aug 20; 31(34):24-7. PubMed ID: 11534239
    [No Abstract] [Full Text] [Related]

  • 17.
    ; . PubMed ID:
    [No Abstract] [Full Text] [Related]

  • 18.
    ; . PubMed ID:
    [No Abstract] [Full Text] [Related]

  • 19. Prevention of HIPAA security breaches.
    Fesko H, McGuigan P.
    Health Care Law Mon; 2007 May 20; ():3-9. PubMed ID: 17590913
    [No Abstract] [Full Text] [Related]

  • 20. HIPAA's here. How to comply with new rules that govern protected health information.
    Kibbe DC.
    Nurs Manage; 2001 Apr 20; 32(4):32-4. PubMed ID: 15103852
    [Abstract] [Full Text] [Related]


    Page: [Next] [New Search]
    of 78.