Search Results

= Members only

Current search

95 results.

1 [2]

Handling a Security Breach: Lessons Learned

Author: Dougherty, Michelle

Source: Journal of AHIMA

Publication Date: February 2002


Consider this: your facility just received a call from a reporter asking for a comment. He’s writing an article on a hacker who accessed your network, downloaded patient medical information, and distributed copies to the press.


If your facility experienced a security inci....

Changing Face of Public Health Reporting

Author: Dougherty, Michelle

Source: Journal of AHIMA

Publication Date: April 2002


In recent months, anthrax outbreaks and concern over bioterrorism threats have created a greater need for the US to have a system to monitor and report public health information in a timely manner. The Centers for Disease Control and Prevention (CDC) are developing standards for a new approach....

Cloud Computing 101

Author: Dinh, Angela K.

Source: Journal of AHIMA

Publication Date: April 2011


In the past several years cloud computing has gained substantial recognition. However, it is still a relatively new concept for those in the healthcare industry.

Before adopting cloud-based services or applications, organizations need to understand how cloud computing works, the typ....

The New Privacy Officer

Author: Dimick, Chris

Source: Journal of AHIMA

Publication Date: April 2012



It has been a decade since the first privacy officers took their jobs in response to the HIPAA privacy rule. A slew of changes since then have added more responsibility, required more skills, and demanded more time of them than anyone could have imagined.

When Nancy Davis, R....

Evaluating the Information Governance Principles for Healthcare: Integrity and Protection

Author: Datskovsky, Galina; Hedges, Ron; Empel, Sofia; Washington, Lydia

Source: Journal of AHIMA

Publication Date: April 2015



Editor’s note: This is the second in a series of four articles that discuss the eight Information Governance Principles for Healthcare.


AHIMA’s new Information Governance Principles for Healthcare (IGPHC) provides a framework for healthcare organizations to enhance their ab....

Updated Toolkit for Security Strategies

Author: Cooper, Ted

Source: Journal of AHIMA

Publication Date: July 2004


The first version of the Computer-based Patient Record Institute (CPRI) toolkit “Managing Information Security in Health Care” was published on the Web in May 1999 in response to the proposed HIPAA security and electronic signature standard of October 1998. The toolkit is intended....

OASIS Cracks Down on Home Care

Author: Carpenter, Jennifer E.

Source: Journal of AHIMA

Publication Date: May 1999



January 25, 1999, brought the publication of the final rule on the assessment and use of the Outcomes and Assessment Information Set (OASIS) in the Federal Register. This rule requires that each patient receive a patient-specific, comprehensive assessment that identifies the patient'....

Tips for Preventing and Responding to a Ransomware Attack

Author: Butler, Mary

Source: Journal of AHIMA - website

Publication Date: April 01, 2016

As predicted, 2016 is proving to be the year of ransomware, with multiple reported incidents making news as we approach April. As they become startlingly more common, it’s important that HIM professionals be aware of how preventable they are, says Tom Walsh, CISSP, founder and managing partner of tw-Security. Just as with other types of data breaches, ransomware attacks are the result of human intervention—that’s also where they end.

Sample Information Security Program

Author: Ballam, Holly

Source: Journal of AHIMA

Publication Date: March 1999


Information Security Program
XYZ Hospital
Effective Date      
         ..............................................................................................................................

1. Poli....

Primer on Encryption

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: June 2004


Encryption is an addressable implementation specification under HIPAA’s access control and transmission security standards. Many providers are grappling with just how to address these specifications:
Is there a difference between the two specifications, and if so, what is the diff....

Journal Q&A (2/00)

Author: AHIMA Professional Practice Team

Source: AHIMA Q and A

Publication Date: February 02, 2000

Q: What Internet security guidelines are available?
A: Initially, Medicare issued a statement that the Internet was not secure enough for transmission of sensitive data. However, the growing demand for transmittal of HCFA Privacy Act-protected data via the Internet resulted in HCFA's....

The 10 Security Domains (Updated 2013) - Retired

Author: AHIMA

Source: AHIMA practice brief

Publication Date: October 2013


Editor's note: This update supersedes the February 2004, February 2010, and May 2012 practice briefs "The 10 Security Domains."


In today's healthcare environment, HIM professionals must understand basic information security principles to fully protect the privacy of information. T....

10 Security Domains (2011 update)

Author: AHIMA

Source: AHIMA practice brief

Publication Date: July 2011

This is the original web version of the practice brief, published in the May 2012 Journal of AHIMA. This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.

2008 HIMSS Security Survey

Author:

Source: External web site

Publication Date: October 28, 2008

This report provides the results of a survey of IT and security professionals addressing security environments in healthcare organizations, including access to patient data, tracking and audit logs, network security, and medical identity theft.

Following the Electronic Trail

Author:

Source: Journal of AHIMA

Publication Date: September 2000


How can you protect patient information while maintaining immediate access for qualified employees? HIM professionals across the country are taking leadership roles in developing and managing audit trails for computerized health information. Here are a few of their success storie....

1 [2]