Sorry, we do not have enough data to show an influence graph for this author.
- Full text PDF available (1)
In response to the HIPAA privacy and security rules, organizations are taking steps to set up and clean up access controls, and explore possible changes to audit controls and termination procedures. They are facing the practical issues of implementing security policies that are compliant, efficient to administer, and not disruptive to users. Organizations… (More)