Search Results

= Members only

Current search

95 results.

[1] 2

Information Governance for Offsite Data Security

Author: Saharia, Devendra

Source: Journal of AHIMA

Publication Date: April 2016



Disruptive technology can turn any industry on its head—virtually overnight. Just five years ago, summoning a taxi was an inefficient, time-consuming effort that often involved dialing up a dispatcher, who contacted a driver, who would then make their way to your location, perhaps in an h....

Tips for Preventing and Responding to a Ransomware Attack

Author: Butler, Mary

Source: Journal of AHIMA - website

Publication Date: April 01, 2016

As predicted, 2016 is proving to be the year of ransomware, with multiple reported incidents making news as we approach April. As they become startlingly more common, it’s important that HIM professionals be aware of how preventable they are, says Tom Walsh, CISSP, founder and managing partner of tw-Security. Just as with other types of data breaches, ransomware attacks are the result of human intervention—that’s also where they end.

Evaluating the Information Governance Principles for Healthcare: Integrity and Protection

Author: Datskovsky, Galina; Hedges, Ron; Empel, Sofia; Washington, Lydia

Source: Journal of AHIMA

Publication Date: April 2015



Editor’s note: This is the second in a series of four articles that discuss the eight Information Governance Principles for Healthcare.


AHIMA’s new Information Governance Principles for Healthcare (IGPHC) provides a framework for healthcare organizations to enhance their ab....

The 10 Security Domains (Updated 2013) - Retired

Author: AHIMA

Source: AHIMA practice brief

Publication Date: October 2013


Editor's note: This update supersedes the February 2004, February 2010, and May 2012 practice briefs "The 10 Security Domains."


In today's healthcare environment, HIM professionals must understand basic information security principles to fully protect the privacy of information. T....

The New Privacy Officer

Author: Dimick, Chris

Source: Journal of AHIMA

Publication Date: April 2012



It has been a decade since the first privacy officers took their jobs in response to the HIPAA privacy rule. A slew of changes since then have added more responsibility, required more skills, and demanded more time of them than anyone could have imagined.

When Nancy Davis, R....

10 Security Domains (2011 update)

Author: AHIMA

Source: AHIMA practice brief

Publication Date: July 2011

This is the original web version of the practice brief, published in the May 2012 Journal of AHIMA. This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.

Encryption Basics

Author: Stine, Kevin; Dang, Quynh

Source: Journal of AHIMA

Publication Date: May 2011


Healthcare and health IT professionals are entrusted with protecting the privacy and confidentiality of patient data. To provide this protection, these professionals frequently look to commonly accepted technologies and methodologies to safeguard the data while at rest and in transit. One tech....

Cloud Computing 101

Author: Dinh, Angela K.

Source: Journal of AHIMA

Publication Date: April 2011


In the past several years cloud computing has gained substantial recognition. However, it is still a relatively new concept for those in the healthcare industry.

Before adopting cloud-based services or applications, organizations need to understand how cloud computing works, the typ....

2009 HIMSS Security Survey

Author: HIMSS

Source: External web site

Publication Date: November 03, 2009

This study addressed security enviroments, including access to patient data, access tracking and audit logs, and medical identity theft, as well as preparedness and approaches for meeting new privacy and security requirements contained in ARRA.

2008 HIMSS Security Survey

Author:

Source: External web site

Publication Date: October 28, 2008

This report provides the results of a survey of IT and security professionals addressing security environments in healthcare organizations, including access to patient data, tracking and audit logs, network security, and medical identity theft.

Updated Toolkit for Security Strategies

Author: Cooper, Ted

Source: Journal of AHIMA

Publication Date: July 2004


The first version of the Computer-based Patient Record Institute (CPRI) toolkit “Managing Information Security in Health Care” was published on the Web in May 1999 in response to the proposed HIPAA security and electronic signature standard of October 1998. The toolkit is intended....

Primer on Encryption

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: June 2004


Encryption is an addressable implementation specification under HIPAA’s access control and transmission security standards. Many providers are grappling with just how to address these specifications:
Is there a difference between the two specifications, and if so, what is the diff....

Electronic Record, Electronic Security

Author: Hagland, Mark

Source: Journal of AHIMA

Publication Date: February 2004


New technologies are enhancing the ability to protect patient information. But there’s more to successful implementation than just what’s inside the box.

Melanie Schattauer, RHIA, Jack Obert, and their colleagues at Mercy St. John’s Health System in Springfield, M....

Safe at Home: Remote Coding Meets HIPAA

Author: Keough, Tim

Source: Journal of AHIMA

Publication Date: February 2004


Remote coding offers big benefits and unique security challenges. Here’s how one organization moves patient data securely across the Internet.

"Whatever, in connection with my professional practice, or not in connection with it, I see or hear, in the life of men, which ought....

HIPAA and the EHR: Making Technical Safeguard Changes

Author: Fodor, Joseph

Source: Journal of AHIMA

Publication Date: January 2004


As electronic health records (EHRs) become more commonplace in healthcare, changes, adjustments, and improvements will be inevitable. When designing, implementing, upgrading, or remediating an EHR system, your organization’s implementation team should consider the impact of complying wit....

Online Records Serve Patients, Clinicians, and HIM

Author: Foster, Erica; Martin, Holly; Partin, Mary; Lockshaw, Jim; Fogelman, Adam; Folz-Murphy, Nancy; Harris, C Martin

Source: Journal of AHIMA

Publication Date: September 2003


Patients want online access to their health information but clinicians and HIM professionals don’t need any more work. The solution? An online medical record driven by the EHR. Here’s one organization’s success story.

If your own increasing Internet usage isn’t p....

[1] 2