-
1
-
-
84856873220
-
-
url=http%3A%2F%2Fhealthit.hhs.gov%2Fportal%2Fserver.pt%2Fgateway%2FPTARGS_0_11113_911059_0_0_18%2FFederal%2520Privacy%2520Laws%2520Table%25202%252026%252010%2520Final.pdf&rct=j&q=summary%20of%20selected%20federal%20laws%20and%20regulations%20addressing%20confidentiality%20privacy%20and%20security&ei=Vjd2Tse-NMTIsQLQ_YiMBQ&usg=AFQjCNHKb0_zqpjEY4_aP3D2xjj4gPPDKQ&sig2=6fMD5C3Kz_5GIDsOnNE_cw Summary of Selected Federal Laws and Regulations Addressing Confidentiality, Privacy and Security, AccessedSeptember 18, 2011
-
Summary of Selected Federal Laws and Regulations Addressing Confidentiality, Privacy and Security. Available at http://www.google.com/url?sa=t&source=web&cd=1&ved=0CCUQFjAA&url=http%3A%2F%2Fhealthit.hhs.gov%2Fportal%2Fserver.pt%2Fgateway%2FPTARGS_0_11113_911059_0_0_18%2FFederal%2520Privacy%2520Laws%2520Table%25202%252026%252010%2520Final.pdf&rct=j&q=summary%20of%20selected%20federal%20laws%20and%20regulations%20addressing%20confidentiality%20privacy%20and%20security&ei=Vjd2Tse-NMTIsQLQ_YiMBQ&usg=AFQjCNHKb0_zqpjEY4_aP3D2xjj4gPPDKQ&sig2=6fMD5C3Kz_5GIDsOnNE_cw. AccessedSeptember 18, 2011
-
-
-
-
2
-
-
84856937293
-
-
Health Information Privacy, Accessed November 29, 2010
-
Health Information Privacy. Available at http://www.hhs.gov/ocr/privacy. Accessed November 29, 2010
-
-
-
-
4
-
-
84856935629
-
-
Summary of the HIPAA Security Rule, Accessed November 29, 2010
-
Summary of the HIPAA Security Rule. Available at http://www.hhs.gov/ocr/privacy/hipaa/understanding/srsummary.html. Accessed November 29, 2010
-
-
-
-
5
-
-
84856873223
-
-
45 C.F.R. § 164.506, 510, 512, 514(e)
-
45 C.F.R. § 164.506, 510, 512, 514(e) (2002)
-
(2002)
-
-
-
6
-
-
84856873222
-
-
45 C.F.R. § 160.103
-
45 C.F.R. § 160.103 (2002)
-
(2002)
-
-
-
7
-
-
84856810734
-
-
Office for Civil Rights, Washington, DC: Department of Health and Human Services, Accessed October 19, 2011
-
Office for Civil Rights. Personal Health Records and the HIPAA Privacy Rule. Washington, DC: Department of Health and Human Services. Available at http://www.hhs.gov/ocr/privacy/hipaa/administrative/privacyrule/index.html. Accessed October 19, 2011
-
Personal Health Records and The HIPAA Privacy Rule
-
-
-
8
-
-
84856873224
-
-
Secretary Leavitt announces new principles, tools to protect privacy, encourage more effective use of patient information to improve care, December 15, 2008, Accessed October 19,2011
-
Secretary Leavitt announces new principles, tools to protect privacy, encourage more effective use of patient information to improve care, December 15, 2008. Available at http://www.hhs.gov/news/press/2008pres/12/20081215a.html. Accessed October 19,2011
-
-
-
-
9
-
-
74549207114
-
-
U.S. Department of Health and Human Services, Accessed October 19, 2011
-
U.S. Department of Health and Human Services. Health Information Privacy Summary of the HIPAA Security Rule. Available at http://www.hhs.gov/ocr/privacy/hipaa/understanding/srsummary.html. Accessed October 19, 2011
-
Health Information Privacy Summary of the HIPAA Security Rule
-
-
-
10
-
-
84856820458
-
-
The Health IT Privacy and Security Toolkit, Accessed September 16, 2011
-
The Health IT Privacy and Security Toolkit. Available at http://healthit.hhs.gov/portal/server.pt/community/healthit_hhs_gov_privacy_security_framework/1173. Accessed September 16, 2011
-
-
-
-
11
-
-
84856937290
-
-
Security Standards: Technical Safeguards, Accessed November 29, 2010
-
Security Standards: Technical Safeguards. Available at http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/techsafeguards.pdf. Accessed November 29, 2010
-
-
-
-
12
-
-
77954912144
-
Healthcare identifiers legislation: A whiff of fourberie
-
Mendelson D: Healthcare identifiers legislation: a whiff of fourberie. J Law Med 17:660-76, 2010
-
(2010)
J Law Med
, vol.17
, pp. 660-676
-
-
Mendelson, D.1
-
13
-
-
33846936304
-
Evaluating common deidentification heuristics for personal health information
-
El Emam K, Jabbouri S, Sams S, et al: Evaluating common deidentification heuristics for personal health information. J Med Internet Res 8:e28, 2006
-
(2006)
J Med Internet Res
, vol.8
-
-
El-Emam, K.1
Jabbouri, S.2
Sams, S.3
-
14
-
-
58849089978
-
Safeguarding patient privacy in electronic healthcare in the USA: The legal view
-
Walsh D, Passerini K, Varshney U, et al: Safeguarding patient privacy in electronic healthcare in the USA: the legal view. Int J Electron Healthc 4:311-326, 2008
-
(2008)
Int J Electron Healthc
, vol.4
, pp. 311-326
-
-
Walsh, D.1
Passerini, K.2
Varshney, U.3
-
15
-
-
43049154856
-
Ethics in public health research: Privacy and public health at risk: Public health confidentiality in the digital age
-
Myers J, Frieden TR, Bherwani KM, et al: Ethics in public health research: privacy and public health at risk: public health confidentiality in the digital age. Am J Public Health 98:793-801, 2008
-
(2008)
Am J Public Health
, vol.98
, pp. 793-801
-
-
Myers, J.1
Frieden, T.R.2
Bherwani, K.M.3
-
16
-
-
77149125906
-
Still seeking the legal EHR: The push for electronic records increases, the record management questions remain
-
Dougherty M, Washington L: Still seeking the legal EHR: the push for electronic records increases, the record management questions remain. J AHIMA 81:42-45, 2010
-
(2010)
J AHIMA
, vol.81
, pp. 42-45
-
-
Dougherty, M.1
Washington, L.2
-
17
-
-
39049176144
-
High standards: A decade after the law went into effect, there is still debate about the pros and cons of the HIPAA privacy and electronic transaction regulations
-
Edlin M, Johns S: High standards: a decade after the law went into effect, there is still debate about the pros and cons of the HIPAA privacy and electronic transaction regulations. AHIP Cover 47: 26-29, 2006
-
(2006)
AHIP Cover
, vol.47
, pp. 26-29
-
-
Edlin, M.1
Johns, S.2
-
18
-
-
77950988935
-
Health information exchange: Participation by Minnesota primary care practices
-
Fontaine P, Zink T, Boyle RG, et al: Health information exchange: participation by Minnesota primary care practices. Arch Intern Med 170:622-629, 2010
-
(2010)
Arch Intern Med
, vol.170
, pp. 622-629
-
-
Fontaine, P.1
Zink, T.2
Boyle, R.G.3
-
19
-
-
77950344426
-
Focus on electronic health records. 'HIPAA2' legislation means more delicate handling of data
-
May M: Focus on electronic health records. 'HIPAA2' legislation means more delicate handling of data. Nat Med 16:250, 2010
-
(2010)
Nat Med
, vol.16
, pp. 250
-
-
May, M.1
-
20
-
-
52649105433
-
Access and privacy rights using web security standards to increase patient empowerment
-
Falcao-Reis F, Costa-Pereira A, Correia ME: Access and privacy rights using web security standards to increase patient empowerment. Stud Health Technol Inform 137:275-285, 2008
-
(2008)
Stud Health Technol Inform
, vol.137
, pp. 275-285
-
-
Falcao-Reis, F.1
Costa-Pereira, A.2
Correia, M.E.3
-
21
-
-
84856937292
-
-
Nine Smartphone Apps, Accessed November 29, 2010
-
Nine Smartphone Apps. Available at http://www.medscape.com/viewarticle/729536. Accessed November 29, 2010
-
-
-
-
22
-
-
84856935631
-
-
Official Google response about HIPAA, Accessed November 29, 2010
-
Official Google response about HIPAA. Available at http://www.google.com/intl/en-US/health/hipaa.html. Accessed November 29, 2010
-
-
-
-
23
-
-
84856836383
-
-
The Office of the National Coordinator for Health Information technology, Accessed November 29, 2010
-
The Office of the National Coordinator for Health Information technology. Available at http://healthit.hhs.gov/portal/server.pt?open=512&objID=1175&parentname=CommunityPage&parentid=10&mode=2&in_hi_userid=10732&cached=true. Accessed November 29, 2010
-
-
-
-
24
-
-
84856836382
-
-
Guidance on the use of email containing PHI, Accessed October 19, 2011
-
Guidance on the use of email containing PHI. Available at http://hipaa.yale.edu/guidance/index.html. Accessed October 19, 2011
-
-
-
-
25
-
-
41549111715
-
To HIPAA, a son: Assessing the technical, conceptual, and legal frameworks for patient safety information
-
Perry N, Chester T: To HIPAA, a son: assessing the technical, conceptual, and legal frameworks for patient safety information, in Regulating for Patient Safety: The Law's Response to Medical Errors. Widener Law Rev 12:134, 2006
-
(2006)
Regulating For Patient Safety: The Law's Response to Medical Errors. Widener Law Rev
, vol.12
, pp. 134
-
-
Perry, N.1
Chester, T.2
-
26
-
-
84856935633
-
-
Goldman v. United States, 316 U.S
-
Goldman v. United States, 316 U.S. 129 (1942)
-
(1942)
, pp. 129
-
-
-
27
-
-
84856937297
-
-
Katz v. United States, 389 U.S
-
Katz v. United States, 389 U.S. 347 (1967)
-
(1967)
, pp. 347
-
-
-
28
-
-
84856937295
-
-
Kyllo v. United States, 533 U.S
-
Kyllo v. United States, 533 U.S. 27 (2001)
-
(2001)
, pp. 27
-
-
-
29
-
-
84856935632
-
-
Acosta v. Byrum, 638 S.E.2d 246 (N.C. Ct. App. 2006)
-
Acosta v. Byrum, 638 S.E.2d 246 (N.C. Ct. App. 2006)
-
-
-
-
30
-
-
84856935630
-
-
Connecticut v. Health Net, Inc., 383 F.3d 1258 (11th Cir. 2004)
-
Connecticut v. Health Net, Inc., 383 F.3d 1258 (11th Cir. 2004)
-
-
-
-
31
-
-
2442608797
-
The impact of fear of HIPAA violation on patient care
-
Touchet B, Drummond S, Yates WR: The impact of fear of HIPAA violation on patient care. Psychiatr Serv 55:575- 576, 2004
-
(2004)
Psychiatr Serv
, vol.55
, pp. 575-576
-
-
Touchet, B.1
Drummond, S.2
Yates, W.R.3
-
32
-
-
84856836384
-
-
url=http%3A%2F%2Fhealthit.hhs.gov%2Fportal%2Fserver.pt%2Fgateway%2FPTARGS_0_10731_848086_0_0_18%2FSmallPracticeSecurityGuide-1.pdf&ei=LNb7TOeWI8WclgfkvfyLBQ&usg=AFQjCNGeum6QplgMF7F5X1VBgeZWJ-s6Hw&sig2=hcC-zn2Guc_K4X68VM_WeQ Washington, DC: U.S. Department of Health and Human Services, Undated, Accessed November 29, 2010
-
Reassessing Your Security Practices in a Health IT Environment: A Guide for Small Health Care Practices. Washington, DC: U.S. Department of Health and Human Services. Undated. Available at http://www.google.com/url?sa=t&source=web&cd=1&ved=0CBYQFjAA&url=http%3A%2F%2Fhealthit.hhs.gov%2Fportal%2Fserver.pt%2Fgateway%2FPTARGS_0_10731_848086_0_0_18%2FSmallPracticeSecurityGuide-1.pdf&ei=LNb7TOeWI8WclgfkvfyLBQ&usg=AFQjCNGeum6QplgMF7F5X1VBgeZWJ-s6Hw&sig2=hcC-zn2Guc_K4X68VM_WeQ. Accessed November 29, 2010
-
Reassessing Your Security Practices in a Health IT Environment: A Guide for Small Health Care Practices
-
-
-
33
-
-
84856820460
-
-
HIPAA Procedure 5039, Accessed November 29, 2010
-
HIPAA Procedure 5039. De-identification and limited data set procedures. Available at http://www.yale.edu/ppdev/Procedures/hipaa/5039/5039PR1.pdf. Accessed November 29, 2010
-
De-identification and Limited Data Set Procedures
-
-
-
34
-
-
84856937301
-
-
Vicare, Accessed November 29, 2010
-
Vicare. Available at http://www.openmedsoftware.org/wiki/8._HIPAA_de-identification. Accessed November 29, 2010
-
-
-
-
35
-
-
70649096124
-
The psychiatric medical record, HIPAA, and the use of electronic medical records
-
Houston M: The psychiatric medical record, HIPAA, and the use of electronic medical records. Child Adolesc Psychiatr ClinNAm 19:107-114, 2010
-
(2010)
Child Adolesc Psychiatr ClinNAm
, vol.19
, pp. 107-114
-
-
Houston, M.1
-
36
-
-
33947621113
-
Securing electronc health records without impeding the flow of information
-
Agrawal R, Johnson C: Securing electronc health records without impeding the flow of information. Int J Med Inform 76:471-479, 2007
-
(2007)
Int J Med Inform
, vol.76
, pp. 471-479
-
-
Agrawal, R.1
Johnson, C.2
|