Search Results

= Members only

Current search

95 results.

[1] 2

10 Security Domains (2011 update)

Author: AHIMA

Source: AHIMA practice brief

Publication Date: July 2011

This is the original web version of the practice brief, published in the May 2012 Journal of AHIMA. This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.

2008 HIMSS Security Survey

Author:

Source: External web site

Publication Date: October 28, 2008

This report provides the results of a survey of IT and security professionals addressing security environments in healthcare organizations, including access to patient data, tracking and audit logs, network security, and medical identity theft.

2009 HIMSS Security Survey

Author: HIMSS

Source: External web site

Publication Date: November 03, 2009

This study addressed security enviroments, including access to patient data, access tracking and audit logs, and medical identity theft, as well as preparedness and approaches for meeting new privacy and security requirements contained in ARRA.

Access Audit Trails: En Route to Security

Author: Halpert, Aviva M.

Source: Journal of AHIMA

Publication Date: September 2000


An electronic access audit trail can be an effective security tool if the right conditions are in place. In this article, learn how to ensure that your organization has the right technology, procedures, mechanisms, and plans to implement an audit trail.
Working with healthcare informatio....

Changing Face of Public Health Reporting

Author: Dougherty, Michelle

Source: Journal of AHIMA

Publication Date: April 2002


In recent months, anthrax outbreaks and concern over bioterrorism threats have created a greater need for the US to have a system to monitor and report public health information in a timely manner. The Centers for Disease Control and Prevention (CDC) are developing standards for a new approach....

Cloud Computing 101

Author: Dinh, Angela K.

Source: Journal of AHIMA

Publication Date: April 2011


In the past several years cloud computing has gained substantial recognition. However, it is still a relatively new concept for those in the healthcare industry.

Before adopting cloud-based services or applications, organizations need to understand how cloud computing works, the typ....

Data Transmission: A World of Possibilities

Author: Smith, Deborah A.

Source: Journal of AHIMA

Publication Date: May 2001




In a landscape of regulation and consolidation, healthcare providers must find new, cost-effective ways to communicate sensitive data with partners. Observations, lab results, and admission-discharge-transfer data must be shared accurately, confidentially, and in a timely manner with....

Electronic Record, Electronic Security

Author: Hagland, Mark

Source: Journal of AHIMA

Publication Date: February 2004


New technologies are enhancing the ability to protect patient information. But there’s more to successful implementation than just what’s inside the box.

Melanie Schattauer, RHIA, Jack Obert, and their colleagues at Mercy St. John’s Health System in Springfield, M....

EMR ... CMR ... CPR ... G-CPR??

Author: Tadwalt, Bobbi

Source: Brief Encounter

Publication Date: October 02, 1999


Most of you have probably heard of the first few acronyms listed in the title; however, it is likely most of you have never heard of the G-CPR. Most people hadn't, until they attended the Multi-Specialty Group Educational Forum held in Baltimore, MD this past March. Robert M. Kolodner, MD, th....

Encryption Basics

Author: Stine, Kevin; Dang, Quynh

Source: Journal of AHIMA

Publication Date: May 2011


Healthcare and health IT professionals are entrusted with protecting the privacy and confidentiality of patient data. To provide this protection, these professionals frequently look to commonly accepted technologies and methodologies to safeguard the data while at rest and in transit. One tech....

Evaluating the Information Governance Principles for Healthcare: Integrity and Protection

Author: Datskovsky, Galina; Hedges, Ron; Empel, Sofia; Washington, Lydia

Source: Journal of AHIMA

Publication Date: April 2015



Editor’s note: This is the second in a series of four articles that discuss the eight Information Governance Principles for Healthcare.


AHIMA’s new Information Governance Principles for Healthcare (IGPHC) provides a framework for healthcare organizations to enhance their ab....

Following the Electronic Trail

Author:

Source: Journal of AHIMA

Publication Date: September 2000


How can you protect patient information while maintaining immediate access for qualified employees? HIM professionals across the country are taking leadership roles in developing and managing audit trails for computerized health information. Here are a few of their success storie....

Handling a Security Breach: Lessons Learned

Author: Dougherty, Michelle

Source: Journal of AHIMA

Publication Date: February 2002


Consider this: your facility just received a call from a reporter asking for a comment. He’s writing an article on a hacker who accessed your network, downloaded patient medical information, and distributed copies to the press.


If your facility experienced a security inci....

HIPAA and the EHR: Making Technical Safeguard Changes

Author: Fodor, Joseph

Source: Journal of AHIMA

Publication Date: January 2004


As electronic health records (EHRs) become more commonplace in healthcare, changes, adjustments, and improvements will be inevitable. When designing, implementing, upgrading, or remediating an EHR system, your organization’s implementation team should consider the impact of complying wit....

Information Governance for Offsite Data Security

Author: Saharia, Devendra

Source: Journal of AHIMA

Publication Date: April 2016



Disruptive technology can turn any industry on its head—virtually overnight. Just five years ago, summoning a taxi was an inefficient, time-consuming effort that often involved dialing up a dispatcher, who contacted a driver, who would then make their way to your location, perhaps in an h....

Information Security--A Database View

Author: Zender, Anne

Source: Journal of AHIMA

Publication Date: March 1998



HIM professionals agree that applying the principles of information security is important in a hospital setting. But as Sharon Johnson, RRA, knows, those principles can be applied in many situations--including settings under construction. Since spring 1997, Johnson has been ....

Information Security: It Takes a Community

Author: Hjort, Beth M.

Source: Journal of AHIMA

Publication Date: January 2001


The Health Insurance Portability and Accountability Act of 1996 (HIPAA) reinforces what HIM professionals have known for a long time: security training is a prudent and valuable mission for an organization to support. Besides the obvious need for compliance with this new federal mandate, it’s....

Internal Audit Model for Information Security

Author: Mead, Kevin

Source: In Confidence (newsletter)

Publication Date: July 02, 2000


Internal auditors are found within many organizations, and have traditionally concerned themselves with the protection of assets. In the past, this manifested itself by the placing of asset tags on furniture and equipment and verifying the presence of the asset each year. Recently, however, i....

Journal Q&A (2/00)

Author: AHIMA Professional Practice Team

Source: AHIMA Q and A

Publication Date: February 02, 2000

Q: What Internet security guidelines are available?
A: Initially, Medicare issued a statement that the Internet was not secure enough for transmission of sensitive data. However, the growing demand for transmittal of HCFA Privacy Act-protected data via the Internet resulted in HCFA's....

Moving Toward a Unified Information Security Program

Author: Ruano, Michael

Source: Journal of AHIMA

Publication Date: January 2003


Is your organization up to the challenge of creating a unified information security program?


A unified information security program has been all but mandated for healthcare organizations by the federal government. HIPAA requires that electronic, paper, and oral patient identif....

OASIS Cracks Down on Home Care

Author: Carpenter, Jennifer E.

Source: Journal of AHIMA

Publication Date: May 1999



January 25, 1999, brought the publication of the final rule on the assessment and use of the Outcomes and Assessment Information Set (OASIS) in the Federal Register. This rule requires that each patient receive a patient-specific, comprehensive assessment that identifies the patient'....

Online Records Serve Patients, Clinicians, and HIM

Author: Foster, Erica; Martin, Holly; Partin, Mary; Lockshaw, Jim; Fogelman, Adam; Folz-Murphy, Nancy; Harris, C Martin

Source: Journal of AHIMA

Publication Date: September 2003


Patients want online access to their health information but clinicians and HIM professionals don’t need any more work. The solution? An online medical record driven by the EHR. Here’s one organization’s success story.

If your own increasing Internet usage isn’t p....

Primer on Encryption

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: June 2004


Encryption is an addressable implementation specification under HIPAA’s access control and transmission security standards. Many providers are grappling with just how to address these specifications:
Is there a difference between the two specifications, and if so, what is the diff....

Protection of Personal Data -- The European View

Author: Mathews, Steve

Source: Journal of AHIMA

Publication Date: March 1998


A new series of laws are being passed to control the processing of personal information -- including medical information -- inside the European Commonwealth. The author gives an overview of the European view of personal information and examines the implications for healthcare professionals bo....

Safe at Home: Remote Coding Meets HIPAA

Author: Keough, Tim

Source: Journal of AHIMA

Publication Date: February 2004


Remote coding offers big benefits and unique security challenges. Here’s how one organization moves patient data securely across the Internet.

"Whatever, in connection with my professional practice, or not in connection with it, I see or hear, in the life of men, which ought....

Sample Information Security Program

Author: Ballam, Holly

Source: Journal of AHIMA

Publication Date: March 1999


Information Security Program
XYZ Hospital
Effective Date      
         ..............................................................................................................................

1. Poli....

[1] 2