Search Results

= Members only

Current search

113 results.

1 [2] 3 4 5

Making Your Data Warehouse HIPAA Compliant

Author: Reinke, Brian

Source: In Confidence (newsletter)

Publication Date: July 02, 2002


Now a proven technology, data warehousing is entering into widespread use. Detailed patient records of many organizations are now being electronically archived using data warehousing. The goal of using this computer technology is to retain information for years so it can be used for various m....

Information Security—An Overview (2014 update)

Author: Miaoulis, William M

Source: AHIMA practice brief

Publication Date: January 2014

This practice brief provides an overview of information security, including some of the background and basic concepts involved in securing the privacy of health information. Included are key roles and responsibilities as well as a list of specific policies and procedures that should be considered when developing an organizational security program. References, a checklist, and assistance in developing policies and procedure are also provided to assist readers in the actual development of a security program.

HIPAA Security Overview - Retired

Author: Miaoulis, William M

Source: AHIMA practice brief

Publication Date: November 2013


Editor’s note: This update replaces the April 2004 and the November 2010 practice briefs titled “A HIPAA Security Overview.”


The HIPAA security rule has remained unchanged since its implementation more than a decade ago. However, the Health Information Technology for Economic a....

Automation for Privacy and Security Compliance

Author: McLendon, Kelly

Source: Journal of AHIMA

Publication Date: March 2012


There has been a lack of enforcement of the privacy and security rules ever since HIPAA's inception. As such the adoption of comprehensive HIPAA compliance programs has lagged behind EHR development and implementation.

This in turn has caused little funding to be budgeted by provide....

Cybersecurity 101

Author: Lucci, Susan; Walsh, Tom

Source: Journal of AHIMA

Publication Date: November 2015



One of the most alarming statistics in the news, which is growing with intent and severity, is the prevalence of cyber-attacks, particularly in healthcare. It is an alarming trend that has gained a good deal of attention. For example, in July 2015, UCLA reported that up to 4.5 million pati....

Power of PKI in Healthcare

Author: Lovorn, Jan

Source: In Confidence (newsletter)

Publication Date: April 02, 2002


Increasingly, segregated healthcare players have adopted labor-saving technology to become or stay competitive in the healthcare marketplace. However, the real efficiencies will be found in a universal effort to integrate these independent delivery systems across an organization or communities....

Where to Begin with Cyber Defense

Author: Lewis, Sharon; McDonald, Kevin B

Source: Journal of AHIMA

Publication Date: April 2015



As data is made more readily available through a growing number of public and private channels, understanding the risks is critical. Patients expect organizations to take the steps required to protect their sensitive and personal information as it is being produced, processed, shared, and....

Renewing HIM's Commitment to Privacy and Security

Author: Kloss, Linda L

Source: Journal of AHIMA

Publication Date: November 2007


If the thousands of pages of analysis from the RTI reports on privacy and security practices could be boiled down to just one phrase it would be “we’ve only just begun.” As reported in articles throughout this issue, the RTI research confirms that privacy and security regulat....

Health Information Security: Revisiting the 80/20 Rule

Author: Kloss, Linda L

Source: Journal of AHIMA

Publication Date: February 2004


One of the most useful lessons I learned while working in healthcare quality improvement was the Pareto Principle, often referred to as the 80/20 rule. The concept is that in any endeavor, 20 percent of something is always responsible for 80 percent of the results.

This phenomenon i....

1 [2] 3 4 5