Institute: ONC | Component: 2 | Unit: 9 | Lecture: b | Slide: 21
Institute:Office of National Coordinator (ONC) Workforce Training Curriculum
Component:The Culture of Health Care
Unit:Privacy, Confidentiality, and Security
Lecture:Tools for protecting privacy and confidentiality
Slide content:Privacy, Confidentiality, and Security References Lecture b References Allan, A. (2005). Password aging can burden an already-weak authentication method . Stamford, CT: Gartner. American Health Information Management Association. (2003). Flow of patient health information inside and outside the healthcare industry. Retrieved from Bowe, Robin. (2013). Identity crisis: Organizations are implementing medical identity theft teams to combat rising incidents. Journal of AHIMA , 84 (1), 3842. California Health Care Foundation (CHCF). (2005). National consumer health privacy survey 2005. Oakland: CHCF. Retrieved from Committee on Maintaining Privacy and Security in Health Care Applications of the National Information Infrastructure . (1997). For the record: Protecting electronic health information . Washington, DC: National Academies Press. Retrieved from Daemen , J., & Rijmen , V. (2002). The design of Rijndael : AESThe advanced encryption standard . Berlin, Germany: Springer- Verlag . Herzig , T. (Ed.). (2010). Information security in healthcareManaging risk . Chicago, IL: Healthcare Information Management Systems Society. Joint NEMA/COCIR/JIRA Security and Privacy Committee (SPC). (2004). Break glass procedure: Granting emergency access to critical ePHI systems . Retrieved from security/break-glass-procedure-granting-emergency-access-critical-ephi-systems 21
Slide notes:No audio. 21