95 results.
1 2 [3] 4 5 6 7 8 9 10
Sample Information Security Program
Author: Ballam, Holly
Source: Journal of AHIMA
Publication Date: March 1999
Information Security Program
XYZ Hospital
Effective Date
..............................................................................................................................
1. Poli....
Information Security: an Overview
Author: Brandt, Mary D.
Source: AHIMA practice brief
Publication Date: June 1996
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
"Need to Know" Access: Meeting HIPAA's Minimum Necessary Requirements
Author: Brandt, Mary D.
Source: In Confidence (newsletter)
Publication Date: February 02, 2002
Since the final HIPAA privacy regulations were published, there’s been a lot of discussion about “minimum necessary” requirements. Under the regulations, healthcare providers and payers must make reasonable efforts to limit the use or disclosure of protected health information to the minimum....
At Close Range: Protecting Privacy Through Proximity Access Control
Author: Brostoff, George
Source: In Confidence (newsletter)
Publication Date: May 02, 2000
What if a healthcare workstation could automatically recognize who was requesting access to its information and resources? What if users could be positively identified by simply approaching the workstation, or if workstations “knew” when authorized employees walked away, instantly closing con....
Provider-Patient E-Mail Security (2003 update)
Author: Burrington-Brown, Jill; Hughes, Gwen
Source: AHIMA practice brief
Publication Date: June 2003
Editor's note: The following information replaces information contained in the February 2000 "E-mail Security" Practice Brief.
E-mail communication has become "as common as the fax machine in business settings."1 In fact, the American Medical Association reports t....
Tips for Preventing and Responding to a Ransomware Attack
Author: Butler, Mary
Source: Journal of AHIMA - website
Publication Date: April 01, 2016
As predicted, 2016 is proving to be the year of ransomware, with multiple reported incidents making news as we approach April. As they become startlingly more common, it’s important that HIM professionals be aware of how preventable they are, says Tom Walsh, CISSP, founder and managing partner of tw-Security. Just as with other types of data breaches, ransomware attacks are the result of human intervention—that’s also where they end.
Exploring Encryption and Standards in Release of Information
Author: Butler, Mary
Source: Journal of AHIMA - website
Publication Date: January 2016
The HIM Problem
As providers and business associates bring themselves into compliance with the HITECH-HIPAA Final Rule, encrypting data in transmission and at rest can pose a challenge. Two ROI experts discuss encryption and the use of standards in privacy and security.....
Privacy, Security, and the Regional Health Information Organization
Author: California HealthCare Foundation
Source: External web site
Publication Date: June 02, 2007
Information Security: a Checklist for Healthcare Professionals (2000)
Author: Carpenter, Jennifer E.
Source: AHIMA practice brief
Publication Date: January 2000
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
OASIS Cracks Down on Home Care
Author: Carpenter, Jennifer E.
Source: Journal of AHIMA
Publication Date: May 1999
January 25, 1999, brought the publication of the final rule on the assessment and use of the Outcomes and Assessment Information Set (OASIS) in the Federal Register. This rule requires that each patient receive a patient-specific, comprehensive assessment that identifies the patient'....
1 2 [3] 4 5 6 7 8 9 10