Institute: ONC | Component: 2 | Unit: 9 | Lecture: b | Slide: 22
Institute:Office of National Coordinator (ONC) Workforce Training Curriculum
Component:The Culture of Health Care
Unit:Privacy, Confidentiality, and Security
Lecture:Tools for protecting privacy and confidentiality
Slide content:Privacy, Confidentiality, and Security References Lecture b Continued McNabb, J., & Rhodes, H. B. (2014). Combating the privacy crime that can KILL. Journal of AHIMA , 85 (4), 2629. National Academies Press (1997). For the record protecting electronic health information. Retrieved from https://www.nap.edu/read/5595/chapter/2#4 National Institute for Standards and Technology (NIST). (2015). Secure hash standard . Gaithersburg, MD: National Institute for Standards and Technology. Retrieved from http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf National Institute of Standards and Technology (NIST). (2014). Cryptographic toolkit. Retrieved from http://csrc.nist.gov/groups/ST/toolkit National Institute of Standards and Technology (NIST). (2014). Framework for improving critical infrastructure cybersecurity . Retrieved from http://www.nist.gov/cyberframework/upload/ cybersecurity-framework-021214.pdf Office of the National Coordinator for Health Information Technology (ONC) & Office for Civil Rights (OCR) . (2015). Guide to privacy and security of electronic health information . Retrieved from https://www.healthit.gov/sites/default/files/pdf/privacy/privacy-and-security-guide.pdf Pabrai , A. (2008, January 23). The single sign-on solution. H&HNs Most Wired Magazine . Ponemon Institute. (2015). Fifth annual benchmark study on privacy and security of healthcare data. Retrieved from https://www2.idexpertscorp.com/fifth-annual-ponemon-study-on-privacy-security-incidents-of-healthcare-data 22
Slide notes:No audio. 22