Search Results

= Members only

Current search

95 results.

[1] 2

Information Security--A Database View

Author: Zender, Anne

Source: Journal of AHIMA

Publication Date: March 1998



HIM professionals agree that applying the principles of information security is important in a hospital setting. But as Sharon Johnson, RRA, knows, those principles can be applied in many situations--including settings under construction. Since spring 1997, Johnson has been ....

Uniting Security Forces Against Risk

Author: Wagner, Lew

Source: Journal of AHIMA

Publication Date: June 2002


Threats to your facility’s physical and information security become more complex all the time. To create a truly effective security program, consider developing an integrated security program that encompasses both traditional and information technology protection. The result? A strong, st....

EMR ... CMR ... CPR ... G-CPR??

Author: Tadwalt, Bobbi

Source: Brief Encounter

Publication Date: October 02, 1999


Most of you have probably heard of the first few acronyms listed in the title; however, it is likely most of you have never heard of the G-CPR. Most people hadn't, until they attended the Multi-Specialty Group Educational Forum held in Baltimore, MD this past March. Robert M. Kolodner, MD, th....

Encryption Basics

Author: Stine, Kevin; Dang, Quynh

Source: Journal of AHIMA

Publication Date: May 2011


Healthcare and health IT professionals are entrusted with protecting the privacy and confidentiality of patient data. To provide this protection, these professionals frequently look to commonly accepted technologies and methodologies to safeguard the data while at rest and in transit. One tech....

Data Transmission: A World of Possibilities

Author: Smith, Deborah A.

Source: Journal of AHIMA

Publication Date: May 2001




In a landscape of regulation and consolidation, healthcare providers must find new, cost-effective ways to communicate sensitive data with partners. Observations, lab results, and admission-discharge-transfer data must be shared accurately, confidentially, and in a timely manner with....

Information Governance for Offsite Data Security

Author: Saharia, Devendra

Source: Journal of AHIMA

Publication Date: April 2016



Disruptive technology can turn any industry on its head—virtually overnight. Just five years ago, summoning a taxi was an inefficient, time-consuming effort that often involved dialing up a dispatcher, who contacted a driver, who would then make their way to your location, perhaps in an h....

Moving Toward a Unified Information Security Program

Author: Ruano, Michael

Source: Journal of AHIMA

Publication Date: January 2003


Is your organization up to the challenge of creating a unified information security program?


A unified information security program has been all but mandated for healthcare organizations by the federal government. HIPAA requires that electronic, paper, and oral patient identif....

Internal Audit Model for Information Security

Author: Mead, Kevin

Source: In Confidence (newsletter)

Publication Date: July 02, 2000


Internal auditors are found within many organizations, and have traditionally concerned themselves with the protection of assets. In the past, this manifested itself by the placing of asset tags on furniture and equipment and verifying the presence of the asset each year. Recently, however, i....

Protection of Personal Data -- The European View

Author: Mathews, Steve

Source: Journal of AHIMA

Publication Date: March 1998


A new series of laws are being passed to control the processing of personal information -- including medical information -- inside the European Commonwealth. The author gives an overview of the European view of personal information and examines the implications for healthcare professionals bo....

Safe at Home: Remote Coding Meets HIPAA

Author: Keough, Tim

Source: Journal of AHIMA

Publication Date: February 2004


Remote coding offers big benefits and unique security challenges. Here’s how one organization moves patient data securely across the Internet.

"Whatever, in connection with my professional practice, or not in connection with it, I see or hear, in the life of men, which ought....

Information Security: It Takes a Community

Author: Hjort, Beth M.

Source: Journal of AHIMA

Publication Date: January 2001


The Health Insurance Portability and Accountability Act of 1996 (HIPAA) reinforces what HIM professionals have known for a long time: security training is a prudent and valuable mission for an organization to support. Besides the obvious need for compliance with this new federal mandate, it’s....

2009 HIMSS Security Survey

Author: HIMSS

Source: External web site

Publication Date: November 03, 2009

This study addressed security enviroments, including access to patient data, access tracking and audit logs, and medical identity theft, as well as preparedness and approaches for meeting new privacy and security requirements contained in ARRA.

Access Audit Trails: En Route to Security

Author: Halpert, Aviva M.

Source: Journal of AHIMA

Publication Date: September 2000


An electronic access audit trail can be an effective security tool if the right conditions are in place. In this article, learn how to ensure that your organization has the right technology, procedures, mechanisms, and plans to implement an audit trail.
Working with healthcare informatio....

Electronic Record, Electronic Security

Author: Hagland, Mark

Source: Journal of AHIMA

Publication Date: February 2004


New technologies are enhancing the ability to protect patient information. But there’s more to successful implementation than just what’s inside the box.

Melanie Schattauer, RHIA, Jack Obert, and their colleagues at Mercy St. John’s Health System in Springfield, M....

Online Records Serve Patients, Clinicians, and HIM

Author: Foster, Erica; Martin, Holly; Partin, Mary; Lockshaw, Jim; Fogelman, Adam; Folz-Murphy, Nancy; Harris, C Martin

Source: Journal of AHIMA

Publication Date: September 2003


Patients want online access to their health information but clinicians and HIM professionals don’t need any more work. The solution? An online medical record driven by the EHR. Here’s one organization’s success story.

If your own increasing Internet usage isn’t p....

HIPAA and the EHR: Making Technical Safeguard Changes

Author: Fodor, Joseph

Source: Journal of AHIMA

Publication Date: January 2004


As electronic health records (EHRs) become more commonplace in healthcare, changes, adjustments, and improvements will be inevitable. When designing, implementing, upgrading, or remediating an EHR system, your organization’s implementation team should consider the impact of complying wit....

[1] 2