Protected computer

Results: 695



#Item
471Internet / Health Insurance Portability and Accountability Act / Email / Computer-mediated communication / Computing

TITLE: COMMUNICATING PROTECTED HEALTH INFORMATION VIA ELECTRONIC MAIL (EMAIL) AT COLUMBIA UNIVERSITY MEDICAL CENTER

Add to Reading List

Source URL: cumc.columbia.edu

Language: English - Date: 2012-11-28 13:15:26
472Privacy law / Security / Law / Computer security / Privacy / Data security / Protected health information / Nebraska Medical Center / Medical privacy / Ethics / Data privacy / Health Insurance Portability and Accountability Act

Microsoft Word - HITECH Final Rule Poster.docx

Add to Reading List

Source URL: www.unmc.edu

Language: English - Date: 2013-03-07 12:17:37
473Cybercrime / Crimes / Computer network security / Protected computer / Mail and wire fraud / Information technology audit / United States Code / Racket / Identity theft / Computer law / Criminal law / Law

. Cybercrime: A Sketch of 18 U.S.C[removed]and Related Federal Criminal Laws Charles Doyle Senior Specialist in American Public Law

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2011-03-17 18:54:58
474Data privacy / Health Insurance Portability and Accountability Act / Privacy law / Computer security / Data security / Protected health information / Chief privacy officer / Privacy / Medical record / Ethics / Health / Security

Microsoft Word[removed]GHP.doc

Add to Reading List

Source URL: hipaa.yale.edu

Language: English - Date: 2013-12-13 11:07:01
475Criminal law / Computer Fraud and Abuse Act / Legal aspects of computing / Patriot Act / United States Code / Computer crime / Computer fraud / Protected computer / National Information Infrastructure Protection Act / Computer law / Law / Information technology audit

Order Code[removed]CRS Report for Congress Received through the CRS Web Cybercrime: An Overview of the Federal

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2005-09-02 14:32:28
476SCADA / Telemetry / Penetration test / Network security / Cyberwarfare / Idaho National Laboratory / Department of Defense Cyber Crime Center / Technology / Computer network security / Industrial automation

Cyber Security Network analysis and cyber security lab Introduction In today’s environment, it is essential to assure that networks are protected against the increasing frequency of malicious viruses, worms, hackers, a

Add to Reading List

Source URL: www.dis.anl.gov

Language: English - Date: 2010-12-02 17:55:09
477Law / Health / Protected health information / Privacy / Computer security / Data security / Data privacy / Health Insurance Portability and Accountability Act / Privacy law

HIPAA-P02 Minimum Necessary Policy FULL POLICY CONTENTS Scope Policy Statement

Add to Reading List

Source URL: www.iub.edu

Language: English - Date: 2014-09-07 01:12:42
478Ethics / Computing / Data privacy / Health Insurance Portability and Accountability Act / Privacy law / Information security / Data breach / Protected health information / Password / Security / Data security / Computer security

Microsoft Word - HITECH EMAIL Breach Notification Requirements.docx

Add to Reading List

Source URL: cumc.columbia.edu

Language: English - Date: 2010-07-30 13:38:58
479Computing / Technology / Wireless / IEEE 802.11 / Wireless security / Extensible Authentication Protocol / IEEE 802.1X / Wi-Fi Protected Access / Wireless LAN / Wireless networking / Computer network security / Cryptographic protocols

Microsoft Word - NPS-CS[removed]doc

Add to Reading List

Source URL: edocs.nps.edu

Language: English - Date: 2005-11-07 13:33:50
480Authorization / Law / Computer security / Privacy / Privacy law / Data privacy / Health Insurance Portability and Accountability Act

CHAPTER 8 AUTHORIZATION FOR USE AND DISCLOSURE OF PROTECTED HEALTH INFORMATION

Add to Reading List

Source URL: www.mass.gov

Language: English - Date: 2013-08-30 23:09:53
UPDATE