Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

searching for Protected health information 30 found (60 total)

alternate case: protected health information

Health technology (5,789 words) [view diff] exact match in snippet view article find links to article

privacy. According to the HIPAA Security Rule, it ensures that protected health information has three characteristics: confidentiality, availability, and
Medical data breach (1,562 words) [view diff] exact match in snippet view article find links to article
half a million individuals, and 10 breaches of the personal and protected health information of more than 1 million individuals. In February 2015 an NPR report
Consent management (251 words) [view diff] exact match in snippet view article find links to article
consent directives to determine who will have access to their protected health information (PHI), for what purpose and under what circumstances. Consent
De-identification (2,040 words) [view diff] exact match in snippet view article find links to article
the likelihood that a person could be identified from their protected health information. This method requires that a person with appropriate knowledge
Health marketing (1,457 words) [view diff] exact match in snippet view article find links to article
Rule", which provides important controls over whether and how protected health information is used and disclosed for marketing purposes. The Privacy Rule
Cryptovirology (1,453 words) [view diff] exact match in snippet view article find links to article
Ransomware and HIPAA. The fact sheet states that when electronic protected health information is encrypted by ransomware, a breach has occurred, and the attack
Health Information Technology for Economic and Clinical Health Act (2,425 words) [view diff] exact match in snippet view article find links to article
records (PHR) and related entities if a breach of unsecured protected health information (PHI) occurs. On April 27, 2009, the Department of Health and
Project Nightingale (820 words) [view diff] exact match in snippet view article find links to article
the report in a blog post, saying all employees with access to protected health information went through medical ethics training and were approved by Ascension
Scholarly communication (1,935 words) [view diff] exact match in snippet view article find links to article
be realistically deduced by either direct or indirect means. Protected health information includes individually identifiable health information transmitted
X.500 (2,133 words) [view diff] case mismatch in snippet view article find links to article
incorrect serial numbers. Some projects designed to exchange PHI, protected Health Information (which is considered to be highly HIPAA sensitive) may obtain
Personal health record (5,281 words) [view diff] exact match in snippet view article find links to article
is how the technology could threaten the privacy of patient's protected health information (PHI). Network computer break-ins are becoming more common, thus
Internal medicine (6,854 words) [view diff] exact match in snippet view article find links to article
breaches and inappropriate and/or unauthorized disclosure of protected health information. Withholding information from a patient is typically seen as
Humana (2,789 words) [view diff] exact match in snippet view article find links to article
Humana announced it would be using mobileStorm to transmit protected health information to patients. In March 2015, Humana announced the sale of Concentra
Patient Safety and Quality Improvement Act (1,668 words) [view diff] exact match in snippet view article find links to article
researchers conducting certain types of research projects. If protected health information is involved, the HIPAA privacy and security rules also apply
Picture archiving and communication system (3,638 words) [view diff] exact match in snippet view article find links to article
copies at multiple locations. As PACS data can be considered protected health information (PHI), regulations may apply, most notably HIPAA and HIPAA Hi-Tech
Third-party management (981 words) [view diff] case mismatch in snippet view article find links to article
There are regulations around the saving and storing of PHI, Protected Health Information which can be even more valuable than credit card information
Wearable computer (6,559 words) [view diff] case mismatch in snippet view article find links to article
devices are not under any Federal laws, but regulatory law like Protected Health Information (PHI) is the subject to regulation which is handled by the Office
Electronic health record (11,931 words) [view diff] exact match in snippet view article find links to article
law which exempts unintentional acquisition, access, or use of protected health information and inadvertent disclosure under a good faith belief. ASC X12
Internet security awareness (2,635 words) [view diff] exact match in snippet view article find links to article
disclosure, including personally identifiable information (PII), protected health information (PHI), intellectual property (IP), and other sensitive information
Medical device hijack (1,991 words) [view diff] exact match in snippet view article find links to article
risk to patient data such as credit card information and other protected health information. Because of the vast breadth of interconnection between medical
Electronic health records in the United States (8,371 words) [view diff] case mismatch in snippet view article find links to article
information in electronic medical records is referred to as Protected Health Information (PHI) and its management is addressed under the Health Insurance
IT risk (7,340 words) [view diff] exact match in snippet view article find links to article
security procedures to assure the confidentiality of electronic protected health information. These aspects have been further outlined in a set of Security
Ohio Automated Rx Reporting System (1,361 words) [view diff] case mismatch in snippet view article find links to article
document will be attached to the e-mail and will not contain any Protected Health Information (PHI). Receipt of paper forms will be provided via fax. Data
List of executive actions by Bill Clinton (129 words) [view diff] case mismatch in snippet view article find links to article
Organization 2000-12-07 348 13181 To Protect the Privacy of Protected Health Information in Oversight Investigations 2000-12-20 349 13182 Adjustments
Computer-aided auscultation (2,502 words) [view diff] exact match in snippet view article find links to article
stored in the process. If the stored data classifies as PHI (protected health information), a system hosting such data must be compliant with country-specific
Patient check-in (2,180 words) [view diff] case mismatch in snippet view article find links to article
centers thought about collecting, sharing, and knowingly exposing Protected Health Information (PHI). In addition, computers started to evolve making it more
Privacy in education (7,583 words) [view diff] exact match in snippet view article find links to article
identifiable like health plans and health care. The act “defined protected health information so as to exclude individually identifiable health information
Data sanitization (5,292 words) [view diff] case mismatch in snippet view article find links to article
business, military secrets and proprietary data losses, PHI (Protected Health Information), PII (Personally Identifiable Information), and many articles
Privacy and the US government (5,159 words) [view diff] exact match in snippet view article find links to article
Administrative Simplification, is the Privacy Rule which ensures that protected health information (PHI) remains protected. The Health Information Technology for
Empowering Patients First Act (6,393 words) [view diff] exact match in snippet view article find links to article
but must disclose to the plan sponsor or administrator that protected health information is being withheld and why it is being withheld. Insurers are