85 pages matching health data security in this book
Results 1-3 of 85
What people are saying - Write a review
We haven't found any reviews in the usual places.
Chapter Two The Need for Data Security Standards in Health Care
Chapter Three Data Security Technologies
11 other sections not shown
access control administrative algorithm applications ASTM audit trails authentication caregivers certification authority computer-based patient record confidential information CPRI cryptographic curity database defined digital signatures disclose disclosure document e-mail electronic electronic patient records employees encryption ensure Facsimile number files firewall formation health care information health care organizations health care provider health data security health information trustee HEALTHCARE ENTITY hospital ical identify implementation information security manager information security program information systems integrity Internet Internet service provider intranet issues mation medical records ment National organization's password patient data patient record systems payers person personal computers physicians procedures protected health information protected individual protocol public key requirements responsibility says Secretary security measures server smart card Social Security number specific standards subsection telemedicine Telephone number ternet tion transactions tronic UAB Hospital unauthorized user's vendors World Wide Web