Search Results

= Members only

Current search

95 results.

[1] 2 3 4

Information Security--A Database View

Author: Zender, Anne

Source: Journal of AHIMA

Publication Date: March 1998



HIM professionals agree that applying the principles of information security is important in a hospital setting. But as Sharon Johnson, RRA, knows, those principles can be applied in many situations--including settings under construction. Since spring 1997, Johnson has been ....

Uniting Security Forces Against Risk

Author: Wagner, Lew

Source: Journal of AHIMA

Publication Date: June 2002


Threats to your facility’s physical and information security become more complex all the time. To create a truly effective security program, consider developing an integrated security program that encompasses both traditional and information technology protection. The result? A strong, st....

EMR ... CMR ... CPR ... G-CPR??

Author: Tadwalt, Bobbi

Source: Brief Encounter

Publication Date: October 02, 1999


Most of you have probably heard of the first few acronyms listed in the title; however, it is likely most of you have never heard of the G-CPR. Most people hadn't, until they attended the Multi-Specialty Group Educational Forum held in Baltimore, MD this past March. Robert M. Kolodner, MD, th....

Encryption Basics

Author: Stine, Kevin; Dang, Quynh

Source: Journal of AHIMA

Publication Date: May 2011


Healthcare and health IT professionals are entrusted with protecting the privacy and confidentiality of patient data. To provide this protection, these professionals frequently look to commonly accepted technologies and methodologies to safeguard the data while at rest and in transit. One tech....

Data Transmission: A World of Possibilities

Author: Smith, Deborah A.

Source: Journal of AHIMA

Publication Date: May 2001




In a landscape of regulation and consolidation, healthcare providers must find new, cost-effective ways to communicate sensitive data with partners. Observations, lab results, and admission-discharge-transfer data must be shared accurately, confidentially, and in a timely manner with....

Information Governance for Offsite Data Security

Author: Saharia, Devendra

Source: Journal of AHIMA

Publication Date: April 2016



Disruptive technology can turn any industry on its head—virtually overnight. Just five years ago, summoning a taxi was an inefficient, time-consuming effort that often involved dialing up a dispatcher, who contacted a driver, who would then make their way to your location, perhaps in an h....

Moving Toward a Unified Information Security Program

Author: Ruano, Michael

Source: Journal of AHIMA

Publication Date: January 2003


Is your organization up to the challenge of creating a unified information security program?


A unified information security program has been all but mandated for healthcare organizations by the federal government. HIPAA requires that electronic, paper, and oral patient identif....

[1] 2 3 4