Information Technology Reference
In-Depth Information
Brown, C. (2005). HIPAA Programs: Design and
implementation. Information Security Journal: A
Global Perspective, 14 (1), 10 - 20.
Moore, I. N., Leason, S. S., Miller, C., Qi, A.
A., Blackford, J. U., Zhou, C., & Hickson, G.
B. (2007). Confidentiality and Privacy in Health
Care from the Patient's Perspective: Does HIPAA
HELP? Journal of Law and Medicine , 17 (2),
215-272.
Fitzgerald, T. (2003). HIPAA Security Rule 101:
The Time to Act Is Now, Information Security
Journal: A Global Perspective, 12 (1), 43 - 53.
Nass, J. S., Levit, L. A., & Gostin, O. L. (Eds.).
(2009). Beyond the HIPAA Privacy
Fitzgerald, T. (2003). The HIPAA Final Rule:
What's Changed? Information Security Journal:
A Global Perspective, 12 (2), 50 - 59.
Retrieved 10/1/2011 http://www.accessscience.
com
Friedman, J. (2004). How Will HIPAA Affect
Your Consumer Health Information Services?
Journal of Hospital Librarianship , 4 (1), 45-51.
doi:10.1300/J186v04n01_04
Rule: Enhancing privacy, Improving health
through research . Washington, DC., USA: Na-
tional Academies Press (US).
Geffert, T. B. (2004). Incorporating HIPAA Se-
curity Requirements into an Enterprise Security
Program. Information Security Journal: A Global
Perspective, 13 (5), 21-28.
Scott, L. (2005). Location-based security. Access-
Science . McGraw-Hill Companies.
Stine, K., Scholl, M., Bowen, P., Hash, J., Smith,
C. D., Steinberg, D., & Johnson, L. A. (2008).
NIST Special Publication 800-66, Revision 1An
introductory resource guide for implementing the
Health Insurance Portability and Accountability
Act (HIPAA) security rule. NIST SP - 800-66-1
Gikas, C. (2010). A general comparison of FISMA,
HIPAA, ISO 27000 and PCI-DSS Standards. In-
formation Security Journal: A Global Perspective,
19 (3), 132 - 141
Godwin, T., & Reinhardt, A. B. (2007). Se-
cure mobile device use in healthcare guid-
ance from HIPAA and ISO17799. Informa-
tion Systems Management , 24 (4), 333-342.
doi:10.1080/10580530701586060
Wieland, J. B. (2010). Liability and the lab.
HIPAA: The new enforcement culture. MLO:
Medical Laboratory Observer , 42 (11), 42-42.
Wilson, J. (2006). Health Insurance Portability and
Accountability Act Privacy rule Causes ongoing
concerns among clinicians and researchers. Annals
of Internal Medicine , 145 (4), 313-316.
Gostin, L. O., & Nass, S. (2009). Reforming the
HIPAA Privacy Rule. JAMA: Journal of the Ameri-
can Medical Association , 301 (13), 1373-1375.
doi:10.1001/jama.2009.424
KEY TERMS AND DEFINITIONS
Halbert, R. (2010). HIPAA vs. EMRs. MLO:
Medical Laboratory Observer , 42 (12), 6-6.
HIPAA Compliance: To conform and adhere
to the privacy and security requirements and rules
imposed by the HIPAA privacy and security rule.
Covered Entity: Any organization or insti-
tution that regularly handles protected health
information (PHI). A few statutory exemptions
however, exist.
Harman, L. B. (2005). HIPAA: A Few Years Later.
Online Journal of Issues in Nursing , 10 (2), 95-110.
Kapushion, M. (2004). Hungry, hungry HIPAA:
When privacy regulations go too far.(Health Insur-
ance Portability and Accountability Act of 1996).
The Fordham Urban Law Journal , 31 (6), 1483.
Search WWH ::




Custom Search