Journal Article
Review
Add like
Add dislike
Add to saved papers

Business process design. Securing computerized health information files.

1. With technological advances, nurses in the workplace are challenged to continue the protection of confidential health records. 2. The security of health records can be viewed in three distinct categories: securing files from outside intrusion, maintaining the internal data security, and providing for recovery from disasterous events. 3. Common techniques for securing data include authenication, electronic firewalls, and data encryption.

Full text links

We have located links that may give you full text access.
Can't access the paper?
Try logging in through your university/institutional subscription. For a smoother one-click institutional access experience, please use our mobile app.

Related Resources

For the best experience, use the Read mobile app

Mobile app image

Get seemless 1-tap access through your institution/university

For the best experience, use the Read mobile app

All material on this website is protected by copyright, Copyright © 1994-2024 by WebMD LLC.
This website also contains material copyrighted by 3rd parties.

By using this service, you agree to our terms of use and privacy policy.

Your Privacy Choices Toggle icon

You can now claim free CME credits for this literature searchClaim now

Get seemless 1-tap access through your institution/university

For the best experience, use the Read mobile app