95 results.
1 2 3 4 5 6 7 8 [9] 10
Data Transmission: A World of Possibilities
Author: Smith, Deborah A.
Source: Journal of AHIMA
Publication Date: May 2001
In a landscape of regulation and consolidation, healthcare providers must find new, cost-effective ways to communicate sensitive data with partners. Observations, lab results, and admission-discharge-transfer data must be shared accurately, confidentially, and in a timely manner with....
Systematic Approach Shortest Route to Security Incident...
Author: Sobel, David A.
Source: Journal of AHIMA
Publication Date: June 2001
The switchboard operator transferred the call to me on Monday morning. The woman introduced herself as "Laura Jensen" (name changed) and said that she had been seen in our ER on Saturday. She then told me that a "Dr. Sullivan" called to provide her with her....
Encryption Basics
Author: Stine, Kevin; Dang, Quynh
Source: Journal of AHIMA
Publication Date: May 2011
Healthcare and health IT professionals are entrusted with protecting the privacy and confidentiality of patient data. To provide this protection, these professionals frequently look to commonly accepted technologies and methodologies to safeguard the data while at rest and in transit. One tech....
EMR ... CMR ... CPR ... G-CPR??
Author: Tadwalt, Bobbi
Source: Brief Encounter
Publication Date: October 02, 1999
Most of you have probably heard of the first few acronyms listed in the title; however, it is likely most of you have never heard of the G-CPR. Most people hadn't, until they attended the Multi-Specialty Group Educational Forum held in Baltimore, MD this past March. Robert M. Kolodner, MD, th....
Health Insurance Reform: Security Standards; Final Rule
Author: U.S. Centers for Medicare & Medicaid Services
Source: Government (U.S.)
Publication Date: February 20, 2003
Audit Of Information Technology Security Included in Health Information Technology Standards
Author: U.S. Department of Health and Human Services. Office of the Inspector General
Source: Government (U.S.)
Publication Date: May 16, 2011
Documentation Goes Wireless: a Look at Mobile Healthcare Computing Devices
Author: Waegemann, C. Peter; Tessier, Claudia
Source: Journal of AHIMA
Publication Date: September 2002
Patient care information often suffers as it travels from handwritten notes, dictation, or the memory of the clinician to the medical record. Hand-held devices equipped with mobile healthcare applications can bring documentation to the point of care. In this article, learn how mobile healthcar....
Uniting Security Forces Against Risk
Author: Wagner, Lew
Source: Journal of AHIMA
Publication Date: June 2002
Threats to your facilitys physical and information security become more complex all the time. To create a truly effective security program, consider developing an integrated security program that encompasses both traditional and information technology protection. The result? A strong, st....
Security Risk Analysis and Management: An Overview (2013 update)
Author: Walsh, Tom
Source: AHIMA practice brief
Publication Date: November 2013
Editor’s note: This update replaces the January 2011 practice brief “Security Risk Analysis and Management: An Overview.”
Managing risks is an essential step in operating any business. It’s impossible to eliminate all threats; however, healthcare organizati....
Security Risk Analysis and Management: an Overview (2011 update)
Author: Walsh, Tom
Source: AHIMA practice brief
Publication Date: January 2011
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
1 2 3 4 5 6 7 8 [9] 10