Search Results

= Members only

Current search

113 results.

[1] 2 3 4 5

Download Two Apps and Text Me in the Morning: Physicians are Increasingly Prescribing mHealth Apps, but Privacy and Security Worries Remain

Author: AHIMA

Source: Journal of AHIMA

Publication Date: May 2014



While physicians are increasingly likely to pull out their prescription pad and say, in all earnestness, “There’s a new app for that,” recent research suggests the decision to do so is fraught. A survey of 1,500 physicians found that while 37 percent have prescribed an app, 42 percent ref....

The Healthcare Wall of Shame

Author: AHIMA

Source: Journal of AHIMA

Publication Date: November 2013


While stolen laptops and hacking of healthcare computer networks have dominated the headlines, healthcare privacy and security experts warn that covered entities are ignoring the risks posed by unsecured paper records.


In response to new additions to the Office for Civil Rights'....

Industry Awaits Phase 2 of HIPAA Audit Program

Author: Asmonga, Donald D.

Source: Journal of AHIMA

Publication Date: January 2015



The wait for the second round of mandated privacy and security audits from the Department of Health and Human Services’ (HHS) Office for Civil Rights (OCR) continues. OCR is currently working through final details for the revised audit plan as they await finalization of new technolog....

Securing Your IT Environment from the Inside Out

Author: Bakman, Alex

Source: In Confidence (newsletter)

Publication Date: September 02, 2001


IT security has been gaining in importance throughout the history of digital data, and industries are gradually regulating themselves or facing governmental compliance standards. The healthcare industry possesses some of the most critical data and network technology in that lives and patient....

Value of Digital Signatures

Author: Barnett, David H.

Source: In Confidence (newsletter)

Publication Date: March 02, 2002


This is the first article in a two-part series. Look for part two in the April issue of In Confidence.
As we move into the area of electronic health records, one problem is replacing written signatures with their electronic equivalent. Typing my name at the bottom of this document could....

E-Health and PKI Interoperability (Part 2)

Author: Barnett, David H.

Source: In Confidence (newsletter)

Publication Date: November 02, 2000


Part Two of a Two-Part Article
In the previous issue, we discussed the need for common Certificate Policies in healthcare, such as the ASTM E31 Model Policy. Agreement on practices and policies, as specified in the Certificate Policy and Certification Practice Statements, can expedite in....

E-Health and PKI Interoperability (Part 1)

Author: Barnett, David H.

Source: In Confidence (newsletter)

Publication Date: September 02, 2000


Part One of a Two-Part Article
Providing patient access to medical information and services over the Internet-often referred to as e-health-is an area of rapidly growing interest for many healthcare organizations today. One of the challenges for e-health is providing adequate and effecti....

Security @ the Edge

Author: Boroditsky, Marc

Source: In Confidence (newsletter)

Publication Date: November 02, 2000


With the pending impact of the Health Insurance Portability and Accountability Act (HIPAA) requirements and the high hopes for fully automated e-medical informatics, healthcare information professionals must gain an appreciation for the edge of their networks. More than ever before, the edge....

Evolving Role of the Privacy and Security Officer

Author: Bowen, Rita K.

Source: Journal of AHIMA

Publication Date: June 2015



Fifteen years ago, many individuals accepted the role of the privacy officer with a perception that it would be a role involving the education and training of individuals on HIPAA rules and regulations, developing policy, and responding to reported incidents. The security officer was focu....

Shifting from Reactive to Proactive HIPAA Audits

Author: Brinda, Danika

Source: Journal of AHIMA

Publication Date: January 2016



Stories about workforce members inappropriately accessing health information continue to plague the Department of Health and Human Services’ Data Breach Portal—which lists US provider data breaches that affect more than 500 individuals. Recently two data breaches reported on th....

[1] 2 3 4 5