Codify By AAPC
1
COMPLIANCE: 4 STRATEGIES TO HELP YOU GRANT ROLE-BASED ACCESS
2
CASE STUDY: LEVEL YOUR ROLE-BASED ACCESS PLAYING FIELD IN 3 EASY STEPS
3
TECHNOLOGY: GET INVOLVED IN THE MOVE TOWARD INDUSTRY-WIDE EMR ADOPTION
4
SECURITY STRATEGIES: HOW TO KEEP YOUR OUTDATED HARDWARE FROM LEAKING PHI
5
SAMPLE POLICY: AVOID DETOURS ON THE WAY TO ROLE-BASED ACCESS
6
TECH TIP: 5 COMMON METHODS TO GIVE STORED PHI THE BOOT
7
HEALTH INFORMATION NEWS: KEEP PHI OFF THE INFORMATION HIGHWAY
8
CONFERENCES: Conference Calendar Corner
9
READER QUESTIONS: FTP WON'T TKO YOUR SECURITY RULE COMPLIANCE