Search Results

= Members only

Current search

95 results.

1 2 3 4 5 6 [7] 8 9 10

Handling a Security Breach: Lessons Learned

Author: Dougherty, Michelle

Source: Journal of AHIMA

Publication Date: February 2002


Consider this: your facility just received a call from a reporter asking for a comment. He’s writing an article on a hacker who accessed your network, downloaded patient medical information, and distributed copies to the press.


If your facility experienced a security inci....

Data Transmission: A World of Possibilities

Author: Smith, Deborah A.

Source: Journal of AHIMA

Publication Date: May 2001




In a landscape of regulation and consolidation, healthcare providers must find new, cost-effective ways to communicate sensitive data with partners. Observations, lab results, and admission-discharge-transfer data must be shared accurately, confidentially, and in a timely manner with....

Information Security: It Takes a Community

Author: Hjort, Beth M.

Source: Journal of AHIMA

Publication Date: January 2001


The Health Insurance Portability and Accountability Act of 1996 (HIPAA) reinforces what HIM professionals have known for a long time: security training is a prudent and valuable mission for an organization to support. Besides the obvious need for compliance with this new federal mandate, it’s....

1 2 3 4 5 6 [7] 8 9 10