Search Results

= Members only

Current search

113 results.

[1] 2 3

Download Two Apps and Text Me in the Morning: Physicians are Increasingly Prescribing mHealth Apps, but Privacy and Security Worries Remain

Author: AHIMA

Source: Journal of AHIMA

Publication Date: May 2014



While physicians are increasingly likely to pull out their prescription pad and say, in all earnestness, “There’s a new app for that,” recent research suggests the decision to do so is fraught. A survey of 1,500 physicians found that while 37 percent have prescribed an app, 42 percent ref....

The Healthcare Wall of Shame

Author: AHIMA

Source: Journal of AHIMA

Publication Date: November 2013


While stolen laptops and hacking of healthcare computer networks have dominated the headlines, healthcare privacy and security experts warn that covered entities are ignoring the risks posed by unsecured paper records.


In response to new additions to the Office for Civil Rights'....

Industry Awaits Phase 2 of HIPAA Audit Program

Author: Asmonga, Donald D.

Source: Journal of AHIMA

Publication Date: January 2015



The wait for the second round of mandated privacy and security audits from the Department of Health and Human Services’ (HHS) Office for Civil Rights (OCR) continues. OCR is currently working through final details for the revised audit plan as they await finalization of new technolog....

Securing Your IT Environment from the Inside Out

Author: Bakman, Alex

Source: In Confidence (newsletter)

Publication Date: September 02, 2001


IT security has been gaining in importance throughout the history of digital data, and industries are gradually regulating themselves or facing governmental compliance standards. The healthcare industry possesses some of the most critical data and network technology in that lives and patient....

Value of Digital Signatures

Author: Barnett, David H.

Source: In Confidence (newsletter)

Publication Date: March 02, 2002


This is the first article in a two-part series. Look for part two in the April issue of In Confidence.
As we move into the area of electronic health records, one problem is replacing written signatures with their electronic equivalent. Typing my name at the bottom of this document could....

E-Health and PKI Interoperability (Part 2)

Author: Barnett, David H.

Source: In Confidence (newsletter)

Publication Date: November 02, 2000


Part Two of a Two-Part Article
In the previous issue, we discussed the need for common Certificate Policies in healthcare, such as the ASTM E31 Model Policy. Agreement on practices and policies, as specified in the Certificate Policy and Certification Practice Statements, can expedite in....

E-Health and PKI Interoperability (Part 1)

Author: Barnett, David H.

Source: In Confidence (newsletter)

Publication Date: September 02, 2000


Part One of a Two-Part Article
Providing patient access to medical information and services over the Internet-often referred to as e-health-is an area of rapidly growing interest for many healthcare organizations today. One of the challenges for e-health is providing adequate and effecti....

Security @ the Edge

Author: Boroditsky, Marc

Source: In Confidence (newsletter)

Publication Date: November 02, 2000


With the pending impact of the Health Insurance Portability and Accountability Act (HIPAA) requirements and the high hopes for fully automated e-medical informatics, healthcare information professionals must gain an appreciation for the edge of their networks. More than ever before, the edge....

Evolving Role of the Privacy and Security Officer

Author: Bowen, Rita K.

Source: Journal of AHIMA

Publication Date: June 2015



Fifteen years ago, many individuals accepted the role of the privacy officer with a perception that it would be a role involving the education and training of individuals on HIPAA rules and regulations, developing policy, and responding to reported incidents. The security officer was focu....

Shifting from Reactive to Proactive HIPAA Audits

Author: Brinda, Danika

Source: Journal of AHIMA

Publication Date: January 2016



Stories about workforce members inappropriately accessing health information continue to plague the Department of Health and Human Services’ Data Breach Portal—which lists US provider data breaches that affect more than 500 individuals. Recently two data breaches reported on th....

DIY Privacy Risk Assessments

Author: Butler, Mary

Source: Journal of AHIMA - website

Publication Date: November 2015


The HIM Problem


Completing regular privacy risk assessments is one of the most proactive ways of preventing healthcare privacy breaches. However, finding helpful tools for these assessments is hard to come by.


The HIM Problem Solver: Sharon Lewis, MBA, RHIA, CHPS, CP....

Ensuring Remote Coding Compliance

Author: Comfort, Angie

Source: Journal of AHIMA - Coding Notes

Publication Date: April 2012


More and more HIM department managers are turning to remote coding. However, before implementing this staffing model, managers must answer several questions regarding the privacy and security of patient information, including:
What are the compliance risks?
How will privacy and secu....

Smart Cards May Make Security a Non-Issue

Author: Deike, Karen

Source: In Confidence (newsletter)

Publication Date: November 02, 2000


Smart cards have long held enormous potential for governments in managing healthcare information and delivering benefits to clients with more efficiency, less fraud, and greater customer satisfaction. But critical to gaining acceptance of the cards is the ability to assure clients that the in....

Handling Sensitive Information in an NHIN

Author: Dimick, Chris

Source: Journal of AHIMA

Publication Date: February 2008


The topic of sensitive health data and how to keep it private in the electronic age is one of the most complex issues facing the development of a nationwide, interoperable health information exchange network.

Physicians need accurate medical records to provide adequate care. Yet pati....

Untangling Privacy

Author: Dimick, Chris

Source: Journal of AHIMA

Publication Date: February 2009


Health IT won’t advance far without resolving the complex issue of privacy protections. Can a complicated situation be teased apart thread by thread?

The debate on privacy has become very public.

Privacy advocates, health IT advocates, providers, HIM professionals, fe....

CMS’s 2009 Security Assessment Process

Author: Dinh, Angela K.

Source: Journal of AHIMA

Publication Date: September 2009


In 2008 the Centers for Medicare and Medicaid Services (CMS) conducted 10 HIPAA security assessments in covered entities (CEs) nationwide. CMS’s stated purpose was not to identify flaws but to gain a true understanding of industry compliance with the HIPAA security rule.

CMS co....

Securing Portable Devices

Author: Dinh, Angela K.

Source: Journal of AHIMA

Publication Date: January 2009


Reports of data breaches involving portable devices last year ran the gamut from oversight to theft: a college of medicine professor gave away a personal computer containing protected health information, including photos of his patients, to friends; a flash drive containing Social Security num....

Is PKI the Solution to HIPAA Security?

Author: Dougherty, Michelle

Source: Journal of AHIMA

Publication Date: February 2001




Public key infrastructure (PKI) has been called the only technology currently available that will comply with the HIPAA proposed security rules. If you have heard of PKI but have yet to understand it, keep reading. This article will give you a nuts-and-bolts look at the technology a....

Privacy Holes in the 'Hidden Healthcare System': Students' PHI-laden Education Records that are Stored and Shared Electronically Don’t Have the Same Safeguards as most EHRs

Author: DuBravec, Daniel A; Daigle, Matt

Source: Journal of AHIMA

Publication Date: June 2015



With student safety and privacy an increasing parental concern, school administrators nationwide are sitting on a powder keg of potential backlash because of a gray area of student privacy protections that Julia Lear, senior advisor for the Center of Health and Health Care in Schools at G....

The Privacy and Security of Non-Traditional Occupational Health Services

Author: Dunn, Rose T; Odia, Godwin

Source: Journal of AHIMA

Publication Date: November 2013

The AHIMA Practice Brief The Privacy and Security of Occupational Health Records focuses on the privacy and security related responsibilities of a healthcare provider that offers occupational health services for other employers in its community. This article supplements that practice brief and focuses on those entities that are not healthcare providers, in the traditional sense of the term.

[1] 2 3