95 results.
1 2 3 [4] 5 6 7 8 9 10
Information Infrastructure Promises Better Healthcare, Lower Costs
Author: Marchibroda, Janet; Gerber, Ticia
Source: Journal of AHIMA
Publication Date: January 2003
What forces have propelled the need for a national health information infrastructure (NHII) into the spotlight? In the article, take a closer look at the origins of the NHII, the benefits it will yield, and the initiatives providing the strongest support.
The healthcare system in the US h....
What Is the Future of Electronic Patient Communication?
Author: Levitt, Randy
Source: In Confidence (newsletter)
Publication Date: July 02, 2001
The future for electronic transmission of healthcare information is clear-more data will be transmitted electronically, and more regulations will be applied to enforce security of that data. It is critical that affected organizations identify partners who understand the fundamental needs of t....
Safe at Home: Remote Coding Meets HIPAA
Author: Keough, Tim
Source: Journal of AHIMA
Publication Date: February 2004
Remote coding offers big benefits and unique security challenges. Here’s how one organization moves patient data securely across the Internet.
"Whatever, in connection with my professional practice, or not in connection with it, I see or hear, in the life of men, which ought....
Is Fingerprint Technology the Right Choice for Access Control?
Author: Katz, Neil A.
Source: In Confidence (newsletter)
Publication Date: October 02, 2002
After you determine that you want to use biometrics for your access control solution, the process has just begun. There are numerous issues to consider, including the type of biometric device you want to use, cost, ease of use, false negatives, false positives, reliability of the system, and....
Portable Computer Security (2000)
Author: Hughes, Gwen
Source: AHIMA practice brief
Publication Date: October 2000
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
E-Mail Security
Author: Hughes, Gwen
Source: AHIMA practice brief
Publication Date: February 2000
This practice brief has been retired. It is made available for historical purposes only.
Security Audits (2000)
Author: Hjort, Beth M.
Source: AHIMA practice brief
Publication Date: September 2000
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
Security Audits (2003 update)
Author: Hjort, Beth M.
Source: AHIMA practice brief
Publication Date: November 2003
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
Information Security: It Takes a Community
Author: Hjort, Beth M.
Source: Journal of AHIMA
Publication Date: January 2001
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) reinforces what HIM professionals have known for a long time: security training is a prudent and valuable mission for an organization to support. Besides the obvious need for compliance with this new federal mandate, it’s....
On the Line: Professional Practice Solutions (3/03)
Author: Hjort, Beth M.
Source: AHIMA Q and A | Journal of AHIMA
Publication Date: March 2003
Q: When is it appropriate to separate files for select types of medical records? What practice guidelines are available?
A: Circumstances, reasons, and applicable laws affect decisions to create separate medical record files within varying types of healthcare organizations. Org....
1 2 3 [4] 5 6 7 8 9 10