2013 IEEE Integrated STEM Education Conference (ISEC) 2013
DOI: 10.1109/isecon.2013.6525225
|View full text |Cite
|
Sign up to set email alerts
|

Anytime, anywhere, anyone instruction: A tool for life-long learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2015
2015

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 2 publications
0
1
0
Order By: Relevance
“…The HIPAA Privacy Rule, the HIPAA Security Rule, and the ARRA (American Recovery and Reinvestment Act) and the companion Health Information Technology for Economic and Clinical Health Act (HITECH) mandate strict protections for access, authentication, storage, auditing, and transmittal of medical records, including medical images. The regulations require covered entities to put in place numerous administrative, physical, and technical security safeguards, such as: i) logs and audit tracking of all disclosure of patient PHI (Protected Health Information) for a minimum of three years, ii) signed agreements with business associates stating they will comply with HIPAA provisions, iii) full data encryption and transmission security, iv) backup and disaster recovery plans, including data archives and off-site storage, v) employee training, vi) comprehensive security risk assessment, and so on [26].…”
Section: Openemr: a Case Studymentioning
confidence: 99%
“…The HIPAA Privacy Rule, the HIPAA Security Rule, and the ARRA (American Recovery and Reinvestment Act) and the companion Health Information Technology for Economic and Clinical Health Act (HITECH) mandate strict protections for access, authentication, storage, auditing, and transmittal of medical records, including medical images. The regulations require covered entities to put in place numerous administrative, physical, and technical security safeguards, such as: i) logs and audit tracking of all disclosure of patient PHI (Protected Health Information) for a minimum of three years, ii) signed agreements with business associates stating they will comply with HIPAA provisions, iii) full data encryption and transmission security, iv) backup and disaster recovery plans, including data archives and off-site storage, v) employee training, vi) comprehensive security risk assessment, and so on [26].…”
Section: Openemr: a Case Studymentioning
confidence: 99%