Books on the topic 'Computer security Medical records Data protection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Computer security Medical records Data protection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Eric, Johnson M., and SpringerLink (Online service), eds. The Economics of Financial and Medical Identity Theft. Boston, MA: Springer US, 2012.
Find full textJ, Schanz Stephen, Wilson Petra, Essential Drugs and Technology Program (Pan American Health Organization), Pan American Sanitary Bureau, and World Health Organization, eds. The regulation of privacy and data protection in the use of electronic health information: An international perspective and reference source on regulatory and legal issues related to person-identifiable health databases. Washington, D.C: Essential Drugs and Technology Program, Division of Health Systems and Services Development, Pan American Health Organization, Pan American Sanitary Bureau, Regional Office of the World Health Organization, 2001.
Find full textUnited States. Congress. Senate. Committee on Homeland Security and Governmental Affairs. Subcommittee on Oversight of Government Management, the Federal Workforce, and the District of Columbia. State of federal privacy and data security law: Lagging behind the times? : hearing before the Oversight of Government Management, the Federal Workforce, and the District of Columbia Subcommittee of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Twelfth Congress, second session, July 31, 2012. Washington: U.S. Government Printing Office, 2012.
Find full textThe definitive guide to complying with the HIPAA/HITECH privacy and security rules. Boca Raton, FL: CRC Press, 2013.
Find full textPrivacy, confidentiality, and health research. Cambridge: Cambridge University Press, 2012.
Find full textAssociation, Ontario Hospital. Guidelines for managing privacy, data protection and security for Ontario hospitals. Toronto: Ontario Hospital Association, 2003.
Find full textE-health, privacy, and security law. 2nd ed. [Chicago]: American Bar Association Health Law Section, 2011.
Find full textFernald, Frances. HIPAA security compliance guide. Washington, D.C. (1100 17th St., NW, Suite 300, Washington 20036): Atlantic Information Services, 2003.
Find full textE-health, privacy, and security law, second edition: 2012 supplement. [Chicago, IL]: American Bar Association Health Law Section, 2012.
Find full textP, Mortenson Kenneth, ed. Health care privacy and security. [Eagan, MN.]: West Thomson Reuters, 2013.
Find full textRoger, Stull, Rodrigues R. J, Hernandez Antonio, and Pan American Health Organization, eds. Cybercrime, cyberterrorism, and cyberwarfare: Critical issues in data protection for health services information systems. Washington, D.C: Technology and Health Services Delivery, Health Services Organization Unit (THS/OS), Pan American Health Organization, 2003.
Find full textAssociation, American Medical, ed. Handbook for HIPAA-HITECH security. 2nd ed. [Chicago, Ill.]: American Medical Association, 2013.
Find full textShoniregun, Charles A. Electronic Healthcare Information Security. Boston, MA: Springer Science+Business Media, LLC, 2010.
Find full textBallon, Ian C. The complete state security breach notification compliance handbook. [Eagan, Minn.]: West, 2009.
Find full textMunir, Abu Bakar. Privacy and data protection: A comparative analysis with special reference to the Malaysian proposed law. Petaling Jaya, Selangor, Malaysia: Sweet & Maxwell Asia, 2002.
Find full textInstitute, Pennsylvania Bar. The final HITECH regs: Dramatic impact on HIPAA privacy, security & breach notification requirements. Mechanicsburg, Pennsylvania: Pennsylvania Bar Institute, 2013.
Find full textChristine, Hertzog, ed. Data privacy for the smart grid. Boca Raton: CRC Press, Taylor & Francis Group, 2015.
Find full textDian nao chu li ge ren zi liao bao hu fa jie shi hui bian: Computer-processed personal data protection law. Taibei Shi: Fa wu bu, 2010.
Find full textPanetta, Rocco. Libera circolazione e protezione dei dati personali. Milano: Giuffrè, 2006.
Find full textPalazzi, Pablo Andrés, Yves Poullet, Horacio Fernández Delpech, and María Verónica Pérez Asinari. Derecho a la intimidad y protección de datos personales. Buenos Aires: Heliasta, 2009.
Find full textBerghella, Fulvio. Guida pratica alle misure di sicurezza e ai controlli per la privacy: Gli adempimenti per le banche e le finanziarie. Roma]: Bancaria, 2000.
Find full textBerghella, Fulvio. Guida pratica alle nuove misure di sicurezza per la privacy: La protezione dei dati personali e le soluzioni organizzative per la sicurezza nel nuovo codice sulla privacy. Roma: Bancaria, 2003.
Find full textQi, Luo. Parallel and Distributed Computing and Networks: International Conference, PDCN 2010, Chongqing, China, December 13-14, 2010. Revised Selected Papers. Berlin, Heidelberg: Springer-Verlag GmbH Berlin Heidelberg, 2011.
Find full textPötzl, Norbert F. Total unter Kontrolle: Computerausweis, Volkszählung, Verkabelung. Reinbek bei Hamburg: Rowohlt, 1985.
Find full textIndia, Export-Import Bank of. Health Insurance Portability and Accountability Act. Mumbai: Export-Import Bank of India, 2002.
Find full textSchneider, Jochen, Marcus Helfrich, and Nikolaus Forgó. Betrieblicher Datenschutz: Rechtshandbuch. München: C.H. Beck, 2014.
Find full textPraxishandbuch Datenschutz im Unternehmen: Gestaltungsmöglichkeiten und Strategien für Unternehmen. Berlin: De Gruyter, 2014.
Find full textUnited States. Congress. Senate. Committee on Commerce, Science, and Transportation. The need for privacy protections: Perspectives from the administration and the Federal Trade Commission : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Twelfth Congress, second session, May 9, 2012. Washington: U.S. Government Printing Office, 2013.
Find full textUnited States. Congress. House. Committee on Oversight and Government Reform. Subcommittee on Government Management, Organization, and Procurement., ed. Federal IT security: The future of FISMA : joint hearing before Subcommittee on Information Policy, Census, and National Archives and the Subcommittee on Government Management, Organization, and Procurement of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Tenth Congress, first session, June 7, 2007. Washington: U.S. G.P.O., 2007.
Find full textUnited States. Congress. House. Committee on Oversight and Government Reform. Subcommittee on Information Policy, Census, and National Archives. Federal IT security: A review of H.R. 4791 : joint hearing before the Subcommittee on Information Policy, Census, and National Archives and the Subcommittee on Government Management, Organization, and Procurement of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Tenth Congress, second session, on H.R. 4791 to amend title 44, United States Code, to strengthen requirements for ensuring the effectiveness of information security controls over information resources that support federal operations and assets, and for other purposes, February 14, 2008. Washington: U.S. G.P.O., 2008.
Find full textUnited States. Congress. House. Committee on Oversight and Government Reform. Subcommittee on Government Management, Organization, and Procurement., ed. Federal IT security: A review of H.R. 4791 : joint hearing before the Subcommittee on Information Policy, Census, and National Archives and the Subcommittee on Government Management, Organization, and Procurement of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Tenth Congress, second session, on H.R. 4791 to amend title 44, United States Code, to strengthen requirements for ensuring the effectiveness of information security controls over information resources that support federal operations and assets, and for other purposes, February 14, 2008. Washington: U.S. G.P.O., 2008.
Find full textUnited States. Congress. House. Committee on Energy and Commerce. Subcommittee on Oversight and Investigations. How secure is private medical information?: A review of computer security at the Health Care Financing Administration and its Medicare contractors : hearing before ... 107th Congress, 1st session, May 23, 2001. Washington, DC: U.S. G.P.O., 2001.
Find full textUnited, States Congress House Committee on Government Operations Government Information Justice and Agriculture Subcommittee. Computer Matching and Privacy Protection Amendments of 1990: Hearing before the Government Information, Justice, and Agriculture Subcommittee of the Committee on Government Operations, House of Representatives, One Hundred First Congress, second session, on H.R. 5450 ... September 11, 1990. Washington: U.S. G.P.O., 1991.
Find full textManagement, United States Congress Senate Committee on Governmental Affairs Subcommittee on Oversight of Government. Computer Matching and Privacy Protection Act of 1986: Hearing before the Subcommittee on Oversight of Government Management of the Committee on Governmental Affairs, United States Senate, Ninety-ninth Congress, second session, on S. 2756 ... September 16, 1986. Washington: U.S. G.P.O., 1986.
Find full textWoodward, Jeannette A. What every librarian should know about electronic privacy. Westport, Conn: Libraries Unlimited, 2007.
Find full textUnited States. Congress. House. Committee on Veterans' Affairs. The U.S. Department of Veterans Affairs information technology reorganization: How far has VA come? : hearing before the Committee on Veterans' Affairs, U.S. House of Representatives, One Hundred Tenth Congress, first session, September 26, 2007. Washington: U.S. G.P.O., 2008.
Find full textInvestigations, United States Congress House Committee on Energy and Commerce Subcommittee on Oversight and. How secure is private medical information?: A review of computer security at the Health Care Financing Administration and its Medicare contractors : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Seventh Congress, first session, May 23, 2001. Washington: U.S. G.P.O., 2001.
Find full textR, Dinkins Charles, ed. HIPAA in daily practice. [S.l.]: Kerlak Enterprises, 2003.
Find full textUnited States. General Accounting Office. Accounting and Information Management Division. Information security: Software change controls at the Department of Interior. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.
Find full textUnited States. General Accounting Office. Accounting and Information Management Division. Information security: Software change controls at the Department of the Treasury. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.
Find full textDivision, United States General Accounting Office Accounting and Information Management. Information security: Software change controls at the Office of Personnel Management. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.
Find full textUnited States. General Accounting Office. Accounting and Information Management Division. Information security: Software change controls at the National Aeronautics and Space Administration. Washington, D.C. (P.O. Box 37050, Washington 20013): The Office, 2000.
Find full textUnited States. General Accounting Office. Accounting and Information Management Division. Information security: Software change controls at the Department of Health and Human Services. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.
Find full textDivision, United States General Accounting Office Accounting and Information Management. Information security: Software change controls at the Department of Housing and Urban Development. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.
Find full textAnthony, Maeder, and Martin-Sanchez Fernando J, eds. Health Informatics: Building a healthcare future through trusted information ; selected papers from the 20th Australian National Health Informatics Conference (HIC 2012). Amsterdam: IOS Press Inc., 2012.
Find full textProtecting your library's digital sources: The essential guide to planning and preservation. Chicago: American Library Association, 2004.
Find full textCamp, L. Jean, and M. Eric Johnson. The Economics of Financial and Medical Identity Theft. Springer, 2014.
Find full textState agency information systems: Reviewing the Kansas Health Policy Authority's management of those systems. Topeka, Kan: Legislative Division of Post Audit, 2008.
Find full text