1. Volonino L, Robinson SR (2004) Principles and practice of information security: Protecting computers from Hackers and Lawyers, Prentice Hall, Inc., Upper Saddle River, NJ
2. Schneider J, Mercuri RT (2004) The HIPAA-potamus in health care data security. Commun ACM 47(7)
3. Federal Register: Rules and Regulations. 65(160), August 2000
4. Workgroup for Electronic Data Interchange (WEDI) (2004) HIPAA Security White Papers
5. Workgroup for Electronic Data Interchange (WEDI) (2004) Security and Privacy Workgroup Introduction