Search Results

= Members only

Current search

113 results.

1 2 [3] 4 5

Beware the Dark Side of the Web

Author: Journal of AHIMA Staff

Source: Journal of AHIMA

Publication Date: May 2015


Unless they know exactly what to look for, most Internet users wouldn’t know that a “Dark Web” exists or what it is—let alone the potential for harm that can be done with it.


But the dark side of the web is out there, and its proprietors want your medical information.

....

HIPAA Compliance for Clinician Texting

Author: Greene, Adam H

Source: Journal of AHIMA

Publication Date: April 2012



The HIPAA privacy and security rules need not act as an obstacle to efficient communications, but keeping texting compliant requires planning and diligence.

Text (or SMS) messaging has become nearly ubiquitous on mobile devices. According to one survey, approximately 72 perce....

The Privacy and Security of Non-Traditional Occupational Health Services

Author: Dunn, Rose T; Odia, Godwin

Source: Journal of AHIMA

Publication Date: November 2013

The AHIMA Practice Brief The Privacy and Security of Occupational Health Records focuses on the privacy and security related responsibilities of a healthcare provider that offers occupational health services for other employers in its community. This article supplements that practice brief and focuses on those entities that are not healthcare providers, in the traditional sense of the term.

Privacy Holes in the 'Hidden Healthcare System': Students' PHI-laden Education Records that are Stored and Shared Electronically Don’t Have the Same Safeguards as most EHRs

Author: DuBravec, Daniel A; Daigle, Matt

Source: Journal of AHIMA

Publication Date: June 2015



With student safety and privacy an increasing parental concern, school administrators nationwide are sitting on a powder keg of potential backlash because of a gray area of student privacy protections that Julia Lear, senior advisor for the Center of Health and Health Care in Schools at G....

Is PKI the Solution to HIPAA Security?

Author: Dougherty, Michelle

Source: Journal of AHIMA

Publication Date: February 2001




Public key infrastructure (PKI) has been called the only technology currently available that will comply with the HIPAA proposed security rules. If you have heard of PKI but have yet to understand it, keep reading. This article will give you a nuts-and-bolts look at the technology a....

CMS’s 2009 Security Assessment Process

Author: Dinh, Angela K.

Source: Journal of AHIMA

Publication Date: September 2009


In 2008 the Centers for Medicare and Medicaid Services (CMS) conducted 10 HIPAA security assessments in covered entities (CEs) nationwide. CMS’s stated purpose was not to identify flaws but to gain a true understanding of industry compliance with the HIPAA security rule.

CMS co....

Securing Portable Devices

Author: Dinh, Angela K.

Source: Journal of AHIMA

Publication Date: January 2009


Reports of data breaches involving portable devices last year ran the gamut from oversight to theft: a college of medicine professor gave away a personal computer containing protected health information, including photos of his patients, to friends; a flash drive containing Social Security num....

Handling Sensitive Information in an NHIN

Author: Dimick, Chris

Source: Journal of AHIMA

Publication Date: February 2008


The topic of sensitive health data and how to keep it private in the electronic age is one of the most complex issues facing the development of a nationwide, interoperable health information exchange network.

Physicians need accurate medical records to provide adequate care. Yet pati....

Untangling Privacy

Author: Dimick, Chris

Source: Journal of AHIMA

Publication Date: February 2009


Health IT won’t advance far without resolving the complex issue of privacy protections. Can a complicated situation be teased apart thread by thread?

The debate on privacy has become very public.

Privacy advocates, health IT advocates, providers, HIM professionals, fe....

1 2 [3] 4 5