<http://webisa.webdatacommons.org/prov/386845645>	<http://www.w3.org/ns/prov#wasDerivedFrom>	<http://webisa.webdatacommons.org/76373313> .
<http://webisa.webdatacommons.org/prov/480195034>	<http://www.w3.org/ns/prov#wasDerivedFrom>	<http://webisa.webdatacommons.org/76373313> .
<http://webisa.webdatacommons.org/76373313>	<http://www.w3.org/ns/prov#wasQuotedFrom>	<jdsupra.com> .
<http://webisa.webdatacommons.org/76373313>	<http://www.w3.org/1999/02/22-rdf-syntax-ns#type>	<http://www.w3.org/ns/prov#Entity> .
<http://webisa.webdatacommons.org/76373313>	<http://www.w3.org/ns/prov#value>	"Another cybersecurity consideration is the recent application of the HIPAA Security Rule to companies that provide device-related services to HIPAA covered entities such as hospitals and physician offices." .