151
|
Secure Teleassistance towards endless medical litigations: identification of liabilities through a protocol using Joint Watermarking-Encryption Evidences. Stud Health Technol Inform 2014; 205:745-749. [PMID: 25160286] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 06/03/2023]
Abstract
Teleassistance is defined by the help provided through a telemedicine network by a medical practitioner to one other medical practitioner faced to a difficult case. One of the main limiting factors of its development is the fear of the practitioners to be involved in a litigation. In such a situation, the main issue is to determine as quick and as certain as possible if the damage is in relation with the tort of negligence and the liabilities of each involved physician. After a brief summary of the legal context, we present a protocol combining joint watermarking-encryption and a third party to enforce exchange traceability and therefore to bring valuable electronic evidence in case of teleassistance litigations.
Collapse
|
152
|
Privacy and security issues take shape in 2014. MGMA CONNEXION 2014; 14:32-33. [PMID: 25167643] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/03/2023]
|
153
|
|
154
|
Physical security, HIPPA, and the HHS wall of shame. JOURNAL OF HEALTHCARE PROTECTION MANAGEMENT : PUBLICATION OF THE INTERNATIONAL ASSOCIATION FOR HOSPITAL SECURITY 2014; 30:85-90. [PMID: 24707760] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/03/2023]
Abstract
In this article, the author a healthcare IT expert, reveals what experts have discovered in analyzing HIPPA data breaches. Most are the result of theft or loss. She explains why this is so, and offers a solution--improved physical security.
Collapse
|
155
|
HIPAA risks for Florida dentists: Windows XP, copiers and mobile devices. TODAY'S FDA : OFFICIAL MONTHLY JOURNAL OF THE FLORIDA DENTAL ASSOCIATION 2014; 26:8-9. [PMID: 24707709] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/03/2023]
|
156
|
Privacy and Security in Mobile Health (mHealth) Research. Alcohol Res 2014; 36:143-52. [PMID: 26259009 PMCID: PMC4432854] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Download PDF] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/08/2022] Open
Abstract
Research on the use of mobile technologies for alcohol use problems is a developing field. Rapid technological advances in mobile health (or mHealth) research generate both opportunities and challenges, including how to create scalable systems capable of collecting unprecedented amounts of data and conducting interventions-some in real time-while at the same time protecting the privacy and safety of research participants. Although the research literature in this area is sparse, lessons can be borrowed from other communities, such as cybersecurity or Internet security, which offer many techniques to reduce the potential risk of data breaches or tampering in mHealth. More research into measures to minimize risk to privacy and security effectively in mHealth is needed. Even so, progress in mHealth research should not stop while the field waits for perfect solutions.
Collapse
|
157
|
Healthcare information technology. ISSUE BRIEF (HEALTH POLICY TRACKING SERVICE) 2013:1-61. [PMID: 24482885] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/03/2023]
|
158
|
Gains, challenges abound for healthcare info tech. MODERN HEALTHCARE 2013; Suppl:36. [PMID: 24600913] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/03/2023]
|
159
|
[Cardiac pacemaker as target of hackers? (interview by Dr. Beate Schumacher)]. MMW Fortschr Med 2013; 155:6. [PMID: 24482912 DOI: 10.1007/s15006-013-2410-y] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 06/03/2023]
|
160
|
Getting out of the compliance mindset: doing more with data security. Leading healthcare organizations have tackled the growing issue of data security through different technologies. HEALTHCARE INFORMATICS : THE BUSINESS MAGAZINE FOR INFORMATION AND COMMUNICATION SYSTEMS 2013; 30:22-24. [PMID: 24490320] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/03/2023]
|
161
|
DAKOTACARE update: what is a "business associate" agreement? HIPAA OMNIBUS rule--privacy and security changes. SOUTH DAKOTA MEDICINE : THE JOURNAL OF THE SOUTH DAKOTA STATE MEDICAL ASSOCIATION 2013; 66:432-433. [PMID: 24244988] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/02/2023]
|
162
|
|
163
|
[Current legal framework conditions for running and utilization of biobanks. Part 2: data protection and informed consent]. Chirurg 2013; 84:892-901. [PMID: 24005718 DOI: 10.1007/s00104-013-2607-8] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
Abstract
Informed consent of donors of biomaterials represents an essential pillar of legal conformity of business organizations even for biobanks. For the assessment of self-determination of donors and freedom of research for users of biobanks there is a general consensus on the necessity for a social and individual agreement for the participation of donors in research projects. However, demands are often made for which the legal implementation is at least contentious and can be considered as excessive and biased. In part 2 of this review series the current legal foundation of data protection and informed consent is summarized on the basis of normative and ethical principles. With respect to appropriation of data and biosamples it can be deduced that by conformation to corresponding framework conditions the informed consent of donors in particular can be constructed independent of the project.
Collapse
|
164
|
Advancing mobile computing: how one New Jersey group has moved forward. At the 15-physician Vanguard Medical Group in northeast New Jersey, PCMH participation helped spur a broader mobile strategy. HEALTHCARE INFORMATICS : THE BUSINESS MAGAZINE FOR INFORMATION AND COMMUNICATION SYSTEMS 2013; 30:22-23. [PMID: 24228281] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/02/2023]
|
165
|
Deadlines approaching for providers, nephrologists on HIPAA compliance. NEPHROLOGY NEWS & ISSUES 2013; 27:28-32. [PMID: 24266269] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/02/2023]
|
166
|
HIPAA: how to protect yourself and your practice. MEDICAL ECONOMICS 2013; 90:38-41. [PMID: 24730106] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/03/2023]
|
167
|
Privacy and information security risks in a technology platform for home-based chronic disease rehabilitation and education. BMC Med Inform Decis Mak 2013; 13:85. [PMID: 23937965 PMCID: PMC3751072 DOI: 10.1186/1472-6947-13-85] [Citation(s) in RCA: 19] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/09/2012] [Accepted: 07/23/2013] [Indexed: 01/13/2023] Open
Abstract
BACKGROUND Privacy and information security are important for all healthcare services, including home-based services. We have designed and implemented a prototype technology platform for providing home-based healthcare services. It supports a personal electronic health diary and enables secure and reliable communication and interaction with peers and healthcare personnel. The platform runs on a small computer with a dedicated remote control. It is connected to the patient's TV and to a broadband Internet. The platform has been tested with home-based rehabilitation and education programs for chronic obstructive pulmonary disease and diabetes. As part of our work, a risk assessment of privacy and security aspects has been performed, to reveal actual risks and to ensure adequate information security in this technical platform. METHODS Risk assessment was performed in an iterative manner during the development process. Thus, security solutions have been incorporated into the design from an early stage instead of being included as an add-on to a nearly completed system. We have adapted existing risk management methods to our own environment, thus creating our own method. Our method conforms to ISO's standard for information security risk management. RESULTS A total of approximately 50 threats and possible unwanted incidents were identified and analysed. Among the threats to the four information security aspects: confidentiality, integrity, availability, and quality; confidentiality threats were identified as most serious, with one threat given an unacceptable level of High risk. This is because health-related personal information is regarded as sensitive. Availability threats were analysed as low risk, as the aim of the home programmes is to provide education and rehabilitation services; not for use in acute situations or for continuous health monitoring. CONCLUSIONS Most of the identified threats are applicable for healthcare services intended for patients or citizens in their own homes. Confidentiality risks in home are different from in a more controlled environment such as a hospital; and electronic equipment located in private homes and communicating via Internet, is more exposed to unauthorised access. By implementing the proposed measures, it has been possible to design a home-based service which ensures the necessary level of information security and privacy.
Collapse
|
168
|
HIPAA changes effective Sept. 23. MGMA CONNEXION 2013; 13:13-14. [PMID: 24000574] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/02/2023]
|
169
|
|
170
|
|
171
|
WellPoint takes a hit. Massive medical record breach case to cost insurer $1.7 million. MODERN HEALTHCARE 2013; 43:4. [PMID: 24044226] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/02/2023]
|
172
|
How HIPAA final rules affect health information technology vendors. THE JOURNAL OF MEDICAL PRACTICE MANAGEMENT : MPM 2013; 29:56-58. [PMID: 24044202] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/02/2023]
|
173
|
In reply. Med J Aust 2013; 198:531. [PMID: 23725259 DOI: 10.5694/mja13.10175] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/09/2012] [Accepted: 03/15/2013] [Indexed: 11/17/2022]
|
174
|
New HIPAA rules: dentists to face more stringent notification and reporting requirements. JOURNAL - OKLAHOMA DENTAL ASSOCIATION 2013; 104:34-39. [PMID: 23821890] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/02/2023]
|
175
|
|
176
|
Ethical and legal implications of whole genome and whole exome sequencing in African populations. BMC Med Ethics 2013; 14:21. [PMID: 23714101 PMCID: PMC3668248 DOI: 10.1186/1472-6939-14-21] [Citation(s) in RCA: 43] [Impact Index Per Article: 3.9] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/24/2013] [Accepted: 05/20/2013] [Indexed: 12/23/2022] Open
Abstract
BACKGROUND Rapid advances in high throughput genomic technologies and next generation sequencing are making medical genomic research more readily accessible and affordable, including the sequencing of patient and control whole genomes and exomes in order to elucidate genetic factors underlying disease. Over the next five years, the Human Heredity and Health in Africa (H3Africa) Initiative, funded by the Wellcome Trust (United Kingdom) and the National Institutes of Health (United States of America), will contribute greatly towards sequencing of numerous African samples for biomedical research. DISCUSSION Funding agencies and journals often require submission of genomic data from research participants to databases that allow open or controlled data access for all investigators. Access to such genotype-phenotype and pedigree data, however, needs careful control in order to prevent identification of individuals or families. This is particularly the case in Africa, where many researchers and their patients are inexperienced in the ethical issues accompanying whole genome and exome research; and where an historical unidirectional flow of samples and data out of Africa has created a sense of exploitation and distrust. In the current study, we analysed the implications of the anticipated surge of next generation sequencing data in Africa and the subsequent data sharing concepts on the protection of privacy of research subjects. We performed a retrospective analysis of the informed consent process for the continent and the rest-of-the-world and examined relevant legislation, both current and proposed. We investigated the following issues: (i) informed consent, including guidelines for performing culturally-sensitive next generation sequencing research in Africa and availability of suitable informed consent documents; (ii) data security and subject privacy whilst practicing data sharing; (iii) conveying the implications of such concepts to research participants in resource limited settings. SUMMARY We conclude that, in order to meet the unique requirements of performing next generation sequencing-related research in African populations, novel approaches to the informed consent process are required. This will help to avoid infringement of privacy of individual subjects as well as to ensure that informed consent adheres to acceptable data protection levels with regard to use and transfer of such information.
Collapse
|
177
|
Mobile devices and protecting patient data. MICHIGAN MEDICINE 2013; 112:17. [PMID: 23914713] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/02/2023]
|
178
|
Maintaining compliance in a 21st century dental practice: electronic communications and HIPAA compliance. PENNSYLVANIA DENTAL JOURNAL 2013; 80:28-33. [PMID: 23930395] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/02/2023]
|
179
|
You can help set expectations on electronic health records liability. MEDICAL ECONOMICS 2013; 90:21. [PMID: 24066432] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/02/2023]
|
180
|
HIPAA mighty and flawed. JOURNAL OF AHIMA 2013; 84:30-31. [PMID: 23781601] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/02/2023]
|
181
|
New privacy and security omnibus rule released. MGMA CONNEXION 2013; 13:18-21. [PMID: 23720859] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/02/2023]
|
182
|
The data protection and medical device frameworks - obstacles to the deployment of mHealth across Europe? EUROPEAN JOURNAL OF HEALTH LAW 2013; 20:185-204. [PMID: 23772463 DOI: 10.1163/15718093-12341267] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/02/2023]
Abstract
This article examines the receptivity of the current EU legal regime towards innovative mHealth technologies and their deployment on a pan-European basis. At present, a coherent legal strategy towards the development of mHealth technologies does not exist. The deployment of such technologies is influenced in an uncoordinated way by various disparate European legislative initiatives. This article focuses on problems that may be encountered by mHealth platforms through application of the Medical Device and Data Protection Frameworks. Theses frameworks are analysed in this article through the lens of a pan-European deployment of mHealth technologies. The aim throughout is to look for potential problems for the deployment of such technologies posed by these frameworks and, where possible, to suggest improvements.
Collapse
|
183
|
|
184
|
[Carelessness when university and county process sensitive personal information]. LAKARTIDNINGEN 2013; 110:566-567. [PMID: 23596851] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/02/2023]
|
185
|
Take steps to get ready for a HIPAA audit. MEDICAL ECONOMICS 2013; 90:61. [PMID: 23944018] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/02/2023]
|
186
|
[Virtual accounting documents. Digitally into a tax pitfall?]. MMW Fortschr Med 2013; 155:12. [PMID: 23614182 DOI: 10.1007/s15006-013-0203-y] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 06/02/2023]
|
187
|
Understanding health care providers' reluctance to adopt a national electronic patient record: an empirical and legal analysis. MEDICINE AND LAW 2013; 32:13-31. [PMID: 23781762] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/02/2023]
Abstract
BACKGROUND Several countries are implementing a national electronic patient record (n-EPR). Despite the assumed positive effects of n-EPRs on the efficiency, continuity, safety and quality of care, their overall adoption remains low and meets resistance from involved parties. The implementation of the Dutch n-EPR also raised considerable controversy, which eventually caused the Dutch government to stop its contribution to the national infrastructure. AIM To explain Dutch health care providers' reluctance in adopting the n-EPR, we investigated their perceptions of problems associated with the n-EPR and their legal position regarding then-EPR. We hereby aim to provide suggestions about approaches that could promote successful implementation. METHODS The study consisted of two parts. The empirical part of the study was conducted in three health care settings: acute care, diabetes care, and ambulatory mental health care. Two health care organisations were included per setting. Between January and June 2010, 17 stakeholders working in these organisations were interviewed to investigate health care providers' perceptions of problems associated with the n-EPR. In the legal part of the study, legal documents were analysed to study health care providers' legal position regarding the n-EPR and any associated problems. RESULTS The respondents expressed concerns about the confidentiality and safety of information exchange and the reliability and quality of patient data in the n-EPR, and indicated that their liability in case of medical errors was not sufficiently clear. The perceived problems could partly be attributed to legal uncertainties. CONCLUSIONS It is recommended to start the implementation of an n-EPR in limited geographical areas. This will allow health care providers to experience benefits of electronic information exchange before being asked to participate in information exchange at a larger scale. The problems that health care providers perceive in the n-EPR should be minimised. Legislation underlying the n-EPR should provide sufficient clarity about health care professionals' responsibilities and liabilities.
Collapse
|
188
|
Meaningful use: the next step. THE JOURNAL OF THE ARKANSAS MEDICAL SOCIETY 2013; 109:204-205. [PMID: 23540095] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/02/2023]
|
189
|
Identifying the most vulnerable devices to HIPAA compliance. HEALTH MANAGEMENT TECHNOLOGY 2013; 34:28. [PMID: 23469473] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/01/2023]
|
190
|
Securing PHI: Experts comment on the HIPAA Security Rule and discuss solutions designed to help ensure the integrity of protected health information (PHI). HEALTH MANAGEMENT TECHNOLOGY 2013; 34:18-20. [PMID: 23469471] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/01/2023]
|
191
|
2012-2013 National Health Law Moot Court Competition: best brief. THE JOURNAL OF LEGAL MEDICINE 2013; 34:357-391. [PMID: 24328515 DOI: 10.1080/01947648.2013.859952] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/03/2023]
|
192
|
The law of unintended (financial) consequences: the expansion of HIPAA business associate liability. JOURNAL OF HEALTH CARE FINANCE 2013; 39:28-35. [PMID: 24003759] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/02/2023]
Abstract
The recent Omnibus Rule published by the Department of Health and Human Services greatly expanded liability for breaches of health information privacy and security under the HIPAA statute and regulations. This expansion could have dire financial consequences for the health care industry. The Rule expanded the definition of business associates to include subcontractors of business associates and made covered entities and business associates liable for breaches of the entities who perform a service for them involving the use of individually identifiable health information under the federal common law of agency. Thus, if a covered entity or its "do wnstream" business associate breaches security or privacy, the covered entity or "upstream" business associate may face HIPAA's civil money penalties or a lawsuit. Financial managers need to be aware of these changes both to protect against the greater liability and to plan for the compliance costs inherent in effectively, if not legally, making business associates into covered entities.
Collapse
|
193
|
2012-2013 National Health Law Moot Court Competition problem. THE JOURNAL OF LEGAL MEDICINE 2013; 34:341-356. [PMID: 24328514 DOI: 10.1080/01947648.2013.859949] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/03/2023]
|
194
|
Final HIPAA regulations require action by covered entities and business associates. BENEFITS QUARTERLY 2013; 29:61-62. [PMID: 23943959] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/02/2023]
|
195
|
Into the breach: introduction to the 2012-2013 National Health Law Moot Court Competition problem. THE JOURNAL OF LEGAL MEDICINE 2013; 34:337-339. [PMID: 24328513 DOI: 10.1080/01947648.2013.859919] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/03/2023]
|
196
|
Interoperable electronic health care record: a case for adoption of a national standard to stem the ongoing health care crisis. THE JOURNAL OF LEGAL MEDICINE 2013; 34:55-90. [PMID: 23550983 DOI: 10.1080/01947648.2013.768153] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/02/2023]
|
197
|
Healthcare information technology. Issue brief. ISSUE BRIEF (HEALTH POLICY TRACKING SERVICE) 2012:1-56. [PMID: 23297451] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/01/2023]
|
198
|
Data protection, patient records and the law. JOURNAL OF THE IRISH DENTAL ASSOCIATION 2012; 58:322-323. [PMID: 23420973] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/01/2023]
|
199
|
Digital danger. Security experts are working to thwart a potentially devastating cyberattack. Sci Am 2012; 307:14. [PMID: 23230787] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 06/01/2023]
|
200
|
HIPAA: privacy, security and the consequences of a breach for dialysis providers. NEPHROLOGY NEWS & ISSUES 2012; 26:36-8, 40, 42 passim. [PMID: 23427719] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/01/2023]
|