83 pages matching information systems in this book
Results 1-3 of 83
What people are saying - Write a review
We haven't found any reviews in the usual places.
Chapter Two The Need for Data Security Standards in Health Care
Chapter Three Data Security Technologies
11 other sections not shown
access control administrative algorithm applications ASTM audit trails authentication caregivers certification authority computer-based patient record confidential information CPRI cryptographic curity data security database defined digital signature disclose disclosure document e-mail electronic electronic patient records employees encryption ensure files firewall formation health care information health care organizations health care provider health data security health information trustee HEALTHCARE ENTITY hospital ical identify implementation information security manager information security program information systems integrity Internet Internet service provider intranet issues mation medical records ment National password patient data patient record systems payers person personal computers physicians procedures protected health information protected individual protocol public key requirements responsibility says Secretary security measures server smart card Social Security number specific standards subsection telemedicine Telephone number ternet tion transactions tronic UAB Hospital unauthorized user's vendors World Wide Web