Regarding the virtual seminar
Session 1: The Application of Mobile and Wireless Health: Best Practices for a Connected Health Environment with Claudia Tessier, RHIA and C. Peter Waegemann
Will the speakers identify how an organization can ensure the security of data transmitted via wireless devices?
A vendor may state it is secure, but how does an organization really verify the transmission security of the data?
May 11, 2010 3:41 PM
December 18, 2018 3:28 pm