{"title":"处理传入验证的新方法。","authors":"Anthony Luizzo, Bill Roy, Philip Luizzo","doi":"","DOIUrl":null,"url":null,"abstract":"<p><p>Outside requests for data on current or former employees are handled in different ways by healthcare organizations and present considerable liability risks if a corporate policy for handling such risks is not in place. In this article, the authors present a strategy for responsible handling of sensitive information.</p>","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"32 2","pages":"95-99"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A new approach to handling incoming verifications.\",\"authors\":\"Anthony Luizzo, Bill Roy, Philip Luizzo\",\"doi\":\"\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p><p>Outside requests for data on current or former employees are handled in different ways by healthcare organizations and present considerable liability risks if a corporate policy for handling such risks is not in place. In this article, the authors present a strategy for responsible handling of sensitive information.</p>\",\"PeriodicalId\":73772,\"journal\":{\"name\":\"Journal of healthcare protection management : publication of the International Association for Hospital Security\",\"volume\":\"32 2\",\"pages\":\"95-99\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of healthcare protection management : publication of the International Association for Hospital Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of healthcare protection management : publication of the International Association for Hospital Security","FirstCategoryId":"1085","ListUrlMain":"","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A new approach to handling incoming verifications.
Outside requests for data on current or former employees are handled in different ways by healthcare organizations and present considerable liability risks if a corporate policy for handling such risks is not in place. In this article, the authors present a strategy for responsible handling of sensitive information.