September 2011
Clinical Trials Administrator;Sep2011, Vol. 9 Issue 9, p108
A quiz concerning the articles published in the September 2011 issue of Clinical Trials Administrator is presented.


Related Articles

  • HHS: expand Common Rule privacy protection.  // Clinical Trials Administrator;Sep2011, Vol. 9 Issue 9, p99 

    The article discusses the Common Rule by U.S. Department of Health and Human Services (HHS), which has suggested changes to human subjects research protections, and main change is to create mandatory data security and information protection standards for certain information. And to improve the...

  • Nurses, do you BYOD?  // Reflections on Nursing Leadership;2014 2nd Quarter, Vol. 40 Issue 2, p1 

    No abstract available.

  • Encryption Basics. Stine, Kevin; Quynh Dang // Journal of AHIMA;May2011, Vol. 82 Issue 5, p44 

    The article offers information on encryption which is considered as a mechanism that would guard electronic protected health information. It states that electronic health records' (her) standards criteria indicated that EHRS should decrypt and encrypt a particular information so that it can...

  • Life's a Breach: What Constitutes a Breach under the HIPAA HiTech Breach Notification Requirements.  // Venulex Legal Summaries;2009 Q3, Special section p1 

    The article explains when a breach that occurred needs the required notification under the Breach Regulations covered by the U.S. Health Insurance Portability and Accountability Act (HIPAA). It says that a breach which requires notification occurs when there is a disclosure of unsecured...

  • Do healthcare data belong in the cloud? LEVINE, BRIAN A.; GOLDSCHLAG, DAN // Contemporary OB/GYN;Jul2014, Vol. 59 Issue 7, p34 

    The article discusses healthcare date and a partnership between Amazon.com, an electronic commerce company, and the administration of U.S. President Barack Obama for hosting components of HealthCare.gov, a health insurance website. Topics include the statement of HowStuffWorks, a commercial...

  • TAKE STEPS TO ENSURE MOBILE DEVICE SECURITY. Glover, Gary // For the Record (Great Valley Publishing Company, Inc.);Dec2013, Vol. 25 Issue 16, p8 

    The article discusses ways health care providers can protect and secure health information while using a mobile device. Topics include the need to configure mobile devices such as smartphones and tablet computers for only health care office use, the imperative to eliminate storing sensitive...

  • CNE QUESTIONS.  // Healthcare Risk Management;Mar2013, Vol. 35 Issue 3, p36 

    A quiz concerning healthcare risk management is presented.

  • HIPAA rules stay in place during disaster - Address privacy and security issues in plans.  // Hospital Access Management;Aug2012 Supplement, p1 

    In this article, Tracy A. Clark, director of health information management at Mercy Hospital of Joplin (MO), explains how the hospital staff ensured continued data security after a deadly tornado hit the community in 2011. A message was put on the website and in the local medial to return the...

  • OMG! How many of our hard drives are out there?  // Healthcare Risk Management;Oct2013, Vol. 35 Issue 10, p118 

    The article reports on the security risk associated with hard drives containing protected health information (PHI) that were sent outside the facility.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics