Search Results

= Members only

Current search

113 results.

[1] 2

Smart Cards for Healthcare: a Follow-up Visit

Author: Ross, Bruce

Source: In Confidence (newsletter)

Publication Date: March 02, 2000


Smart cards are a peculiar subject when it comes to healthcare in the United States. They are viewed as everything from an up-andcoming product to an inscrutable and hard to integrate backwater technology. Today, all that is rapidly changing. As shown by its adoption by Microsoft, Sun Micro,....

E-Health and PKI Interoperability (Part 1)

Author: Barnett, David H.

Source: In Confidence (newsletter)

Publication Date: September 02, 2000


Part One of a Two-Part Article
Providing patient access to medical information and services over the Internet-often referred to as e-health-is an area of rapidly growing interest for many healthcare organizations today. One of the challenges for e-health is providing adequate and effecti....

Smart Cards May Make Security a Non-Issue

Author: Deike, Karen

Source: In Confidence (newsletter)

Publication Date: November 02, 2000


Smart cards have long held enormous potential for governments in managing healthcare information and delivering benefits to clients with more efficiency, less fraud, and greater customer satisfaction. But critical to gaining acceptance of the cards is the ability to assure clients that the in....

Security @ the Edge

Author: Boroditsky, Marc

Source: In Confidence (newsletter)

Publication Date: November 02, 2000


With the pending impact of the Health Insurance Portability and Accountability Act (HIPAA) requirements and the high hopes for fully automated e-medical informatics, healthcare information professionals must gain an appreciation for the edge of their networks. More than ever before, the edge....

E-Health and PKI Interoperability (Part 2)

Author: Barnett, David H.

Source: In Confidence (newsletter)

Publication Date: November 02, 2000


Part Two of a Two-Part Article
In the previous issue, we discussed the need for common Certificate Policies in healthcare, such as the ASTM E31 Model Policy. Agreement on practices and policies, as specified in the Certificate Policy and Certification Practice Statements, can expedite in....

Is PKI the Solution to HIPAA Security?

Author: Dougherty, Michelle

Source: Journal of AHIMA

Publication Date: February 2001




Public key infrastructure (PKI) has been called the only technology currently available that will comply with the HIPAA proposed security rules. If you have heard of PKI but have yet to understand it, keep reading. This article will give you a nuts-and-bolts look at the technology a....

Securing Your IT Environment from the Inside Out

Author: Bakman, Alex

Source: In Confidence (newsletter)

Publication Date: September 02, 2001


IT security has been gaining in importance throughout the history of digital data, and industries are gradually regulating themselves or facing governmental compliance standards. The healthcare industry possesses some of the most critical data and network technology in that lives and patient....

Value of Digital Signatures

Author: Barnett, David H.

Source: In Confidence (newsletter)

Publication Date: March 02, 2002


This is the first article in a two-part series. Look for part two in the April issue of In Confidence.
As we move into the area of electronic health records, one problem is replacing written signatures with their electronic equivalent. Typing my name at the bottom of this document could....

Power of PKI in Healthcare

Author: Lovorn, Jan

Source: In Confidence (newsletter)

Publication Date: April 02, 2002


Increasingly, segregated healthcare players have adopted labor-saving technology to become or stay competitive in the healthcare marketplace. However, the real efficiencies will be found in a universal effort to integrate these independent delivery systems across an organization or communities....

Making Your Data Warehouse HIPAA Compliant

Author: Reinke, Brian

Source: In Confidence (newsletter)

Publication Date: July 02, 2002


Now a proven technology, data warehousing is entering into widespread use. Detailed patient records of many organizations are now being electronically archived using data warehousing. The goal of using this computer technology is to retain information for years so it can be used for various m....

Security and HIPAA: Protecting Your Operations

Author: Ruano, Michael

Source: In Confidence (newsletter)

Publication Date: August 02, 2003


Part six in a 10-part series.
This article is the sixth of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. The information security domain of operations security includes the topics of controls, protections, monitoring,....

Health Information Security: Revisiting the 80/20 Rule

Author: Kloss, Linda L

Source: Journal of AHIMA

Publication Date: February 2004


One of the most useful lessons I learned while working in healthcare quality improvement was the Pareto Principle, often referred to as the 80/20 rule. The concept is that in any endeavor, 20 percent of something is always responsible for 80 percent of the results.

This phenomenon i....

Renewing HIM's Commitment to Privacy and Security

Author: Kloss, Linda L

Source: Journal of AHIMA

Publication Date: November 2007


If the thousands of pages of analysis from the RTI reports on privacy and security practices could be boiled down to just one phrase it would be “we’ve only just begun.” As reported in articles throughout this issue, the RTI research confirms that privacy and security regulat....

Handling Sensitive Information in an NHIN

Author: Dimick, Chris

Source: Journal of AHIMA

Publication Date: February 2008


The topic of sensitive health data and how to keep it private in the electronic age is one of the most complex issues facing the development of a nationwide, interoperable health information exchange network.

Physicians need accurate medical records to provide adequate care. Yet pati....

Securing Portable Devices

Author: Dinh, Angela K.

Source: Journal of AHIMA

Publication Date: January 2009


Reports of data breaches involving portable devices last year ran the gamut from oversight to theft: a college of medicine professor gave away a personal computer containing protected health information, including photos of his patients, to friends; a flash drive containing Social Security num....

Untangling Privacy

Author: Dimick, Chris

Source: Journal of AHIMA

Publication Date: February 2009


Health IT won’t advance far without resolving the complex issue of privacy protections. Can a complicated situation be teased apart thread by thread?

The debate on privacy has become very public.

Privacy advocates, health IT advocates, providers, HIM professionals, fe....

CMS’s 2009 Security Assessment Process

Author: Dinh, Angela K.

Source: Journal of AHIMA

Publication Date: September 2009


In 2008 the Centers for Medicare and Medicaid Services (CMS) conducted 10 HIPAA security assessments in covered entities (CEs) nationwide. CMS’s stated purpose was not to identify flaws but to gain a true understanding of industry compliance with the HIPAA security rule.

CMS co....

HITECH Security – A Practical Approach

Author: Rudloff, Rob

Source: AHIMA Convention

Publication Date: September 28, 2010


Background


HITECH has introduced new security requirements around HIPAA including new breach requirements and associated penalties. This paper addresses the information security and privacy requirements and provides practical solutions to address them. Many organizations already....

Automation for Privacy and Security Compliance

Author: McLendon, Kelly

Source: Journal of AHIMA

Publication Date: March 2012


There has been a lack of enforcement of the privacy and security rules ever since HIPAA's inception. As such the adoption of comprehensive HIPAA compliance programs has lagged behind EHR development and implementation.

This in turn has caused little funding to be budgeted by provide....

Ensuring Remote Coding Compliance

Author: Comfort, Angie

Source: Journal of AHIMA - Coding Notes

Publication Date: April 2012


More and more HIM department managers are turning to remote coding. However, before implementing this staffing model, managers must answer several questions regarding the privacy and security of patient information, including:
What are the compliance risks?
How will privacy and secu....

HIPAA Compliance for Clinician Texting

Author: Greene, Adam H

Source: Journal of AHIMA

Publication Date: April 2012



The HIPAA privacy and security rules need not act as an obstacle to efficient communications, but keeping texting compliant requires planning and diligence.

Text (or SMS) messaging has become nearly ubiquitous on mobile devices. According to one survey, approximately 72 perce....

The Healthcare Wall of Shame

Author: AHIMA

Source: Journal of AHIMA

Publication Date: November 2013


While stolen laptops and hacking of healthcare computer networks have dominated the headlines, healthcare privacy and security experts warn that covered entities are ignoring the risks posed by unsecured paper records.


In response to new additions to the Office for Civil Rights'....

HIPAA Security Overview - Retired

Author: Miaoulis, William M

Source: AHIMA practice brief

Publication Date: November 2013


Editor’s note: This update replaces the April 2004 and the November 2010 practice briefs titled “A HIPAA Security Overview.”


The HIPAA security rule has remained unchanged since its implementation more than a decade ago. However, the Health Information Technology for Economic a....

The Privacy and Security of Non-Traditional Occupational Health Services

Author: Dunn, Rose T; Odia, Godwin

Source: Journal of AHIMA

Publication Date: November 2013

The AHIMA Practice Brief The Privacy and Security of Occupational Health Records focuses on the privacy and security related responsibilities of a healthcare provider that offers occupational health services for other employers in its community. This article supplements that practice brief and focuses on those entities that are not healthcare providers, in the traditional sense of the term.

Information Security—An Overview (2014 update)

Author: Miaoulis, William M

Source: AHIMA practice brief

Publication Date: January 2014

This practice brief provides an overview of information security, including some of the background and basic concepts involved in securing the privacy of health information. Included are key roles and responsibilities as well as a list of specific policies and procedures that should be considered when developing an organizational security program. References, a checklist, and assistance in developing policies and procedure are also provided to assist readers in the actual development of a security program.

Privacy and Security Audits of Electronic Health Information (2014 update)

Author: Walsh, Tom; Miaoulis, William M

Source: AHIMA practice brief | Journal of AHIMA

Publication Date: March 2014

In a perfect world, access controls alone would ensure the privacy and security of electronic protected health information (ePHI). However, the complexities of today’s healthcare environment make it extremely challenging to limit access to the minimum information necessary that members of the workforce require in order to perform their jobs.

Download Two Apps and Text Me in the Morning: Physicians are Increasingly Prescribing mHealth Apps, but Privacy and Security Worries Remain

Author: AHIMA

Source: Journal of AHIMA

Publication Date: May 2014



While physicians are increasingly likely to pull out their prescription pad and say, in all earnestness, “There’s a new app for that,” recent research suggests the decision to do so is fraught. A survey of 1,500 physicians found that while 37 percent have prescribed an app, 42 percent ref....

Industry Awaits Phase 2 of HIPAA Audit Program

Author: Asmonga, Donald D.

Source: Journal of AHIMA

Publication Date: January 2015



The wait for the second round of mandated privacy and security audits from the Department of Health and Human Services’ (HHS) Office for Civil Rights (OCR) continues. OCR is currently working through final details for the revised audit plan as they await finalization of new technolog....

Where to Begin with Cyber Defense

Author: Lewis, Sharon; McDonald, Kevin B

Source: Journal of AHIMA

Publication Date: April 2015



As data is made more readily available through a growing number of public and private channels, understanding the risks is critical. Patients expect organizations to take the steps required to protect their sensitive and personal information as it is being produced, processed, shared, and....

[1] 2