Search Results

= Members only

Current search

91 results.

[1] 2

Keep Out: Unsecured PHI Inside

Author: Journal of AHIMA Staff

Source: Journal of AHIMA

Publication Date: March 2017


Crumbling, decaying, and abandoned hospitals aren’t just physically dangerous examples of urban decrepitude—they also could be prime targets for medical identity thieves who know what they’re doing.


Take the case of Chicago, IL’s Edgewater Medical Center, a....

Information Asset Inventory for Information Governance - Retired

Author: Downing, Kathy; Fahy, Kristi; Foster, MeShawn; Hermann, Michelle; Meehan, Ann M.; Washington, Lydia; Woebkenberg, Jami

Source: AHIMA practice brief | Journal of AHIMA

Publication Date: February 2017


When an organization begins to implement an enterprise information governance (IG) program, one of the major initial tasks is to understand the scope and types of information in its possession. An inventory of an organization’s information is necessary in order to facilitate decision maki....

Evaluating the Information Governance Principles for Healthcare: Retention and Disposition

Author: Datskovsky, Galina; Hedges, Ron; Empel, Sofia; Washington, Lydia

Source: Journal of AHIMA

Publication Date: September 2015



Editor’s Note: This is the final installment in a series of four articles that discuss the eight Information Governance Principles for Healthcare™.


AHIMA’s Information Governance Principles for Healthcare™ (IGPHC) provide a framework for healthcare organizations to enhance....

Cloud Computing 101

Author: Dinh, Angela K.

Source: Journal of AHIMA

Publication Date: April 2011


In the past several years cloud computing has gained substantial recognition. However, it is still a relatively new concept for those in the healthcare industry.

Before adopting cloud-based services or applications, organizations need to understand how cloud computing works, the typ....

Using Clinical Photos in EHRs

Author: Wiedemann, Lou Ann

Source: Journal of AHIMA

Publication Date: April 2010



For most organizations, patient-identifiable source data include data from interpretations, summaries, or notes. These data are usually maintained within the originating department, separate from the HIM department and the health record, and sometimes in a different database. Examples incl....

Testing Health Record Banking

Author: Dimick, Chris

Source: Journal of AHIMA

Publication Date: May 2009


Washington State’s experiment in consumer-controlled health records has moved into a pilot phase, transforming the health record banking model from theory to testing. In March the Washington State Health Care Authority (HCA) announced the launch of three pilot sites that will try out the....

Taking Medical Records to the Bank

Author: Dimick, Chris

Source: Journal of AHIMA

Publication Date: May 2008


Banking health data like a financial transaction is the simplest solution to healthcare’s networking challenges says William Yasnoff, founder of the Health Record Banking Alliance.

There are a lot of plans for regional and, eventually, nationwide health information exchange, b....

Managing Source System Content in the EHR

Author: Nunn, Sandra L.

Source: Journal of AHIMA

Publication Date: March 2008


Many of today’s healthcare entities have hybrid medical records, and policies abound describing what parts of the record are still accessed in paper and what components are now fully electronic. Wherever healthcare organizations are in the race to create fully accessible and secure elect....

Health Record Banking: an Emerging PHR Model

Author: Wolter, Julie

Source: Journal of AHIMA

Publication Date: October 2007



Many patients have their personal health information scattered across various practitioners and settings. Personal health records (PHRs) can help patients keep track of all their medical information. There are many different PHR products and models available today.


Cu....

Primer on Encryption

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: June 2004


Encryption is an addressable implementation specification under HIPAA’s access control and transmission security standards. Many providers are grappling with just how to address these specifications:
Is there a difference between the two specifications, and if so, what is the diff....

HIM Professionals Key to Patient Safety

Author: Servais, Cheryl

Source: Journal of AHIMA

Publication Date: September 2003


In January 2003, the Joint Commission made 11 recommendations for patient safety. HIM professionals play critical and supporting roles in implementing these recommendations. This article will discuss some of the recommendations, with examples of their use in various aspects of an HIM departmen....

Implementing a Document Imaging System

Author: Myjer, D'Arcy; Madamba, Roderick

Source: Journal of AHIMA

Publication Date: October 2002


The benefits of a document imaging system are myriad once it's installed—it's the implementation that you need to prepare for. In this article, get a bird's eye view of one facility's implementation and the many lessons learned along the way.

Healthcare has been inching toward....

[1] 2