Search Results

= Members only

Current search

95 results.

1 2 3 4 5 6 7 [8] 9 10

Following the Electronic Trail

Author:

Source: Journal of AHIMA

Publication Date: September 2000


How can you protect patient information while maintaining immediate access for qualified employees? HIM professionals across the country are taking leadership roles in developing and managing audit trails for computerized health information. Here are a few of their success storie....

Access Audit Trails: En Route to Security

Author: Halpert, Aviva M.

Source: Journal of AHIMA

Publication Date: September 2000


An electronic access audit trail can be an effective security tool if the right conditions are in place. In this article, learn how to ensure that your organization has the right technology, procedures, mechanisms, and plans to implement an audit trail.
Working with healthcare informatio....

Internal Audit Model for Information Security

Author: Mead, Kevin

Source: In Confidence (newsletter)

Publication Date: July 02, 2000


Internal auditors are found within many organizations, and have traditionally concerned themselves with the protection of assets. In the past, this manifested itself by the placing of asset tags on furniture and equipment and verifying the presence of the asset each year. Recently, however, i....

Journal Q&A (2/00)

Author: AHIMA Professional Practice Team

Source: AHIMA Q and A

Publication Date: February 02, 2000

Q: What Internet security guidelines are available?
A: Initially, Medicare issued a statement that the Internet was not secure enough for transmission of sensitive data. However, the growing demand for transmittal of HCFA Privacy Act-protected data via the Internet resulted in HCFA's....

1 2 3 4 5 6 7 [8] 9 10