Institute: ONC | Component: 2 | Unit: 9 | Lecture: b | Slide: 21
Institute:Office of National Coordinator (ONC) Workforce Training Curriculum
Component:The Culture of Health Care
Unit:Privacy, Confidentiality, and Security
Lecture:Tools for protecting privacy and confidentiality
Slide content:Privacy, Confidentiality, and Security References Lecture b References Allan, A. (2005). Password aging can burden an already-weak authentication method . Stamford, CT: Gartner. American Health Information Management Association. (2003). Flow of patient health information inside and outside the healthcare industry. Retrieved from http://library.ahima.org/PdfView?oid=22958 Bowe, Robin. (2013). Identity crisis: Organizations are implementing medical identity theft teams to combat rising incidents. Journal of AHIMA , 84 (1), 3842. California Health Care Foundation (CHCF). (2005). National consumer health privacy survey 2005. Oakland: CHCF. Retrieved from http://www.chcf.org/topics/view.cfm?itemID=115694 Committee on Maintaining Privacy and Security in Health Care Applications of the National Information Infrastructure . (1997). For the record: Protecting electronic health information . Washington, DC: National Academies Press. Retrieved from http://www.nap.edu/catalog/5595/for-the-record-protecting-electronic-health-information Daemen , J., & Rijmen , V. (2002). The design of Rijndael : AESThe advanced encryption standard . Berlin, Germany: Springer- Verlag . Herzig , T. (Ed.). (2010). Information security in healthcareManaging risk . Chicago, IL: Healthcare Information Management Systems Society. Joint NEMA/COCIR/JIRA Security and Privacy Committee (SPC). (2004). Break glass procedure: Granting emergency access to critical ePHI systems . Retrieved from http://hipaa.yale.edu/ security/break-glass-procedure-granting-emergency-access-critical-ephi-systems 21
Slide notes:No audio. 21