| D007324 |
Institutional Management Teams |
Administrator-selected management groups who are responsible for making decisions pertaining to the provision of integrated direction for various institutional functions. |
Management Teams, Institutional,Institutional Management Team,Management Team, Institutional,Team, Institutional Management,Teams, Institutional Management |
|
| D010414 |
Pennsylvania |
State bounded on the north by New York and Lake Erie, on the east by Delaware and New Jersey, on the south by Delaware and Maryland, and on the west by Ohio and West Virginia. |
|
|
| D003199 |
Computer Systems |
Systems composed of a computer or computers, peripheral equipment, such as disks, printers, and terminals, and telecommunications capabilities. |
Computer Architecture,Computer System,Computer Systems Development,Computer Systems Evaluation,Computer Systems Organization,Real Time System,Real-Time Systems,Organization, Computer Systems,Architecture, Computer,Architectures, Computer,Computer Architectures,Computer Systems Evaluations,Development, Computer Systems,Evaluation, Computer Systems,Evaluations, Computer Systems,Real Time Systems,Real-Time System,System, Computer,System, Real Time,System, Real-Time,Systems, Computer,Systems, Real Time,Systems, Real-Time,Time System, Real,Time Systems, Real |
|
| D003219 |
Confidentiality |
The privacy of information and its protection against unauthorized disclosure. |
Patient Data Privacy,Privacy of Patient Data,Privileged Communication,Confidential Information,Secrecy,Communication, Privileged,Communications, Privileged,Data Privacy, Patient,Information, Confidential,Privacy, Patient Data,Privileged Communications |
|
| D006751 |
Hospital Information Systems |
Integrated, computer-assisted systems designed to store, manipulate, and retrieve information concerned with the administrative and clinical aspects of providing medical services within the hospital. |
Multi-Hospital Information Systems,Information System, Hospital,Information System, Multihospital,Information Systems, Hospital,Information Systems, Multihospital,Multihospital Information Systems,Hospital Information System,Information System, Multi-Hospital,Information Systems, Multi-Hospital,Multi Hospital Information Systems,Multi-Hospital Information System,Multihospital Information System |
|
| D012637 |
Security Measures |
Regulations to assure protection of property and equipment. |
National Security,Measure, Security,Measures, Security,Security Measure,Security, National |
|
| D014481 |
United States |
A country in NORTH AMERICA between CANADA and MEXICO. |
|
|
| D016134 |
Organizational Policy |
A course or method of action selected, usually by an organization, institution, university, society, etc., from among alternatives to guide and determine present and future decisions and positions on matters of public interest or social concern. It does not include internal policy relating to organization and administration within the corporate body, for which ORGANIZATION AND ADMINISTRATION is available. |
Institutional Policy,Institutional Policies,Organizational Policies,Policies, Institutional,Policies, Organizational,Policy, Institutional,Policy, Organizational |
|
| D016347 |
Medical Records Systems, Computerized |
Computer-based systems for input, storage, display, retrieval, and printing of information contained in a patient's medical record. |
Automated Medical Records Systems,Computerized Medical Records Systems,Automated Medical Record System,Automated Medical Record Systems,Automated Medical Records System,Computerized Medical Record System,Computerized Medical Record Systems,Computerized Medical Records System,Computerized Patient Medical Records,Medical Record System, Automated,Medical Record System, Computerized,Medical Record Systems, Automated,Medical Record Systems, Computerized,Medical Records System, Automated,Medical Records System, Computerized,Medical Records Systems, Automated |
|
| D016494 |
Computer Security |
Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data. |
Computer Viruses,Data Protection,Data Security,Compromising of Data,Computer Hackers,Computer Worms,Cyber Security,Cybersecurity,Data Encryption,Information Protection,Computer Hacker,Computer Virus,Computer Worm,Data Compromising,Data Encryptions,Encryption, Data,Encryptions, Data,Hacker, Computer,Hackers, Computer,Protection, Data,Protection, Information,Security, Computer,Security, Cyber,Security, Data,Virus, Computer,Viruses, Computer,Worm, Computer,Worms, Computer |
|