95 results.
[1] 2 3 4 5 6 7 8 9 10
Information Security--A Database View
Author: Zender, Anne
Source: Journal of AHIMA
Publication Date: March 1998
HIM professionals agree that applying the principles of information security is important in a hospital setting. But as Sharon Johnson, RRA, knows, those principles can be applied in many situations--including settings under construction. Since spring 1997, Johnson has been ....
Swipe and Say 'Aaah': Managing Patient Health Data on Secure Smart Cards
Author: Zach, Henry
Source: Journal of AHIMA
Publication Date: June 2004
Sharing data electronically rather than verbally or on paper benefits healthcare by reducing medical errors, improving the quality of routine and emergency care, and lowering administrative costs. Capturing and transmitting information digitally also ensures patients and providers are able to....
Security Risk Analysis and Management: An Overview (2013 update)
Author: Walsh, Tom
Source: AHIMA practice brief
Publication Date: November 2013
Editor’s note: This update replaces the January 2011 practice brief “Security Risk Analysis and Management: An Overview.”
Managing risks is an essential step in operating any business. It’s impossible to eliminate all threats; however, healthcare organizati....
Security Risk Analysis and Management: an Overview (2011 update)
Author: Walsh, Tom
Source: AHIMA practice brief
Publication Date: January 2011
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
Uniting Security Forces Against Risk
Author: Wagner, Lew
Source: Journal of AHIMA
Publication Date: June 2002
Threats to your facilitys physical and information security become more complex all the time. To create a truly effective security program, consider developing an integrated security program that encompasses both traditional and information technology protection. The result? A strong, st....
Documentation Goes Wireless: a Look at Mobile Healthcare Computing Devices
Author: Waegemann, C. Peter; Tessier, Claudia
Source: Journal of AHIMA
Publication Date: September 2002
Patient care information often suffers as it travels from handwritten notes, dictation, or the memory of the clinician to the medical record. Hand-held devices equipped with mobile healthcare applications can bring documentation to the point of care. In this article, learn how mobile healthcar....
Audit Of Information Technology Security Included in Health Information Technology Standards
Author: U.S. Department of Health and Human Services. Office of the Inspector General
Source: Government (U.S.)
Publication Date: May 16, 2011
Health Insurance Reform: Security Standards; Final Rule
Author: U.S. Centers for Medicare & Medicaid Services
Source: Government (U.S.)
Publication Date: February 20, 2003
EMR ... CMR ... CPR ... G-CPR??
Author: Tadwalt, Bobbi
Source: Brief Encounter
Publication Date: October 02, 1999
Most of you have probably heard of the first few acronyms listed in the title; however, it is likely most of you have never heard of the G-CPR. Most people hadn't, until they attended the Multi-Specialty Group Educational Forum held in Baltimore, MD this past March. Robert M. Kolodner, MD, th....
Encryption Basics
Author: Stine, Kevin; Dang, Quynh
Source: Journal of AHIMA
Publication Date: May 2011
Healthcare and health IT professionals are entrusted with protecting the privacy and confidentiality of patient data. To provide this protection, these professionals frequently look to commonly accepted technologies and methodologies to safeguard the data while at rest and in transit. One tech....
[1] 2 3 4 5 6 7 8 9 10