Search Results

= Members only

Current search

95 results.

1 2 3 [4] 5 6 7 8 9 10

Handling a Security Breach: Lessons Learned

Author: Dougherty, Michelle

Source: Journal of AHIMA

Publication Date: February 2002


Consider this: your facility just received a call from a reporter asking for a comment. He’s writing an article on a hacker who accessed your network, downloaded patient medical information, and distributed copies to the press.


If your facility experienced a security inci....

HIPAA and the EHR: Making Technical Safeguard Changes

Author: Fodor, Joseph

Source: Journal of AHIMA

Publication Date: January 2004


As electronic health records (EHRs) become more commonplace in healthcare, changes, adjustments, and improvements will be inevitable. When designing, implementing, upgrading, or remediating an EHR system, your organization’s implementation team should consider the impact of complying wit....

Information Governance for Offsite Data Security

Author: Saharia, Devendra

Source: Journal of AHIMA

Publication Date: April 2016



Disruptive technology can turn any industry on its head—virtually overnight. Just five years ago, summoning a taxi was an inefficient, time-consuming effort that often involved dialing up a dispatcher, who contacted a driver, who would then make their way to your location, perhaps in an h....

1 2 3 [4] 5 6 7 8 9 10