<http://webisa.webdatacommons.org/prov/386845645> <http://www.w3.org/ns/prov#wasDerivedFrom> <http://webisa.webdatacommons.org/76373313> . <http://webisa.webdatacommons.org/prov/480195034> <http://www.w3.org/ns/prov#wasDerivedFrom> <http://webisa.webdatacommons.org/76373313> . <http://webisa.webdatacommons.org/76373313> <http://www.w3.org/ns/prov#wasQuotedFrom> <jdsupra.com> . <http://webisa.webdatacommons.org/76373313> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://www.w3.org/ns/prov#Entity> . <http://webisa.webdatacommons.org/76373313> <http://www.w3.org/ns/prov#value> "Another cybersecurity consideration is the recent application of the HIPAA Security Rule to companies that provide device-related services to HIPAA covered entities such as hospitals and physician offices." .