UNMC

Results: 1055



#Item
291Computing / Backup / Health Insurance Portability and Accountability Act / Information security / Network management / USB flash drive / Remote administration / Windows Vista / Proprietary software / Data security / Security / Computer security

Information Security Procedure Information Technology Services Effective Date: January 21, 2003 Last Reviewed Date: [removed], [removed]2007; [removed]; [removed], [removed]

Add to Reading List

Source URL: www.unmc.edu

Language: English - Date: 2013-11-21 12:26:33
292Healthcare reform in the United States / Medicare / Presidency of Lyndon B. Johnson / United States / Health maintenance organization / Humana / PacifiCare Health Systems / Health insurance / Federal Employees Health Benefits Program / Managed care / Healthcare in the United States / Health

Nebraska Medicare Advantage Trends Presented to the AARP Medicare Forum November 30, 2007 Keith J. Mueller, Ph.D.

Add to Reading List

Source URL: www.unmc.edu

Language: English - Date: 2009-08-04 16:22:57
293British television / Click / Television in the United Kingdom

How to register for access to the CMS Open Payments (Sunshine Act) system: A step by step guide for physicians Created and shared by Duke University Phase 1: EIDM New User Registration Go to Website: https://portal.cms.

Add to Reading List

Source URL: www.unmc.edu

Language: English - Date: 2014-08-19 10:59:34
294Nebraska Medical Center / Tissue plasminogen activator / Thrombolysis / Acute care / Medicine / Health / Stroke

An Assessment of Stroke Treatment in Nebraska Hospitals

Add to Reading List

Source URL: www.unmc.edu

Language: English - Date: 2009-08-04 16:18:22
295Dentistry / Assistive technology / Telehealth / Nebraska Medical Center / Dental degree / Outline of dentistry and oral health / Interprofessional education / Health / Medicine / Education

Training Conference Friday, June 7, 2013 Great Plains Room East Campus Union

Add to Reading List

Source URL: www.unmc.edu

Language: English - Date: 2014-11-11 13:24:36
296Data privacy / Data security / Computer network security / Health Insurance Portability and Accountability Act / Privacy law / Data breach / Privacy / Internet privacy / Government procurement in the United States / Computer security / Security / Ethics

Patient Notification of Breach of Unsecured PHI System Administrators & Information Custodians August 2009

Add to Reading List

Source URL: www.unmc.edu

Language: English - Date: 2012-05-22 11:06:35
297Health / Online chat / Data privacy / Health Insurance Portability and Accountability Act / Privacy law / Health informatics / Protected health information / Electronic health record / Information security / Computer-mediated communication / Computing / Email

Information Technology Services Effective Date: [removed]Reviewed Dates: [removed]; [removed]; [removed]; [removed]; [removed]; [removed]; [removed]Electronic Communication of Protected Health Information (PHI)

Add to Reading List

Source URL: www.unmc.edu

Language: English - Date: 2013-09-24 17:09:12
298Research / Science

Student Information Sheet 8th Grade Regional Health Science Meets It is easy to do a science project….this is all it takes. 1. Select a Topic Select a topic you are interested in and

Add to Reading List

Source URL: www.unmc.edu

Language: English - Date: 2013-11-15 12:57:14
299System administration / Active Directory / Windows / Password / Superuser / Help desk / User / Password fatigue / Microsoft Windows / System software / Computing

Information Technology Services Information Security Procedure Effective Date: January 29, 2013 Reviewed Dates: [removed], [removed]Active Directory (AD) Access & Control Procedures: User Accounts

Add to Reading List

Source URL: www.unmc.edu

Language: English - Date: 2013-08-02 17:21:42
300Health Insurance Portability and Accountability Act / Privacy law / Access control / Password / Law / Computer security / Security / Data privacy

Department Access Control for Information Technology Resources The Access Control for Information Technology Resources ITS security procedures defines information custodians as the individuals responsible for specifying

Add to Reading List

Source URL: www.unmc.edu

Language: English - Date: 2014-04-30 12:24:24
UPDATE