Search Results

= Members only

Current search

113 results.

[1] 2 3

Automation for Privacy and Security Compliance

Author: McLendon, Kelly

Source: Journal of AHIMA

Publication Date: March 2012


There has been a lack of enforcement of the privacy and security rules ever since HIPAA's inception. As such the adoption of comprehensive HIPAA compliance programs has lagged behind EHR development and implementation.

This in turn has caused little funding to be budgeted by provide....

Beware the Dark Side of the Web

Author: Journal of AHIMA Staff

Source: Journal of AHIMA

Publication Date: May 2015


Unless they know exactly what to look for, most Internet users wouldn’t know that a “Dark Web” exists or what it is—let alone the potential for harm that can be done with it.


But the dark side of the web is out there, and its proprietors want your medical information.

....

CMS’s 2009 Security Assessment Process

Author: Dinh, Angela K.

Source: Journal of AHIMA

Publication Date: September 2009


In 2008 the Centers for Medicare and Medicaid Services (CMS) conducted 10 HIPAA security assessments in covered entities (CEs) nationwide. CMS’s stated purpose was not to identify flaws but to gain a true understanding of industry compliance with the HIPAA security rule.

CMS co....

Cybersecurity 101

Author: Lucci, Susan; Walsh, Tom

Source: Journal of AHIMA

Publication Date: November 2015



One of the most alarming statistics in the news, which is growing with intent and severity, is the prevalence of cyber-attacks, particularly in healthcare. It is an alarming trend that has gained a good deal of attention. For example, in July 2015, UCLA reported that up to 4.5 million pati....

DIY Privacy Risk Assessments

Author: Butler, Mary

Source: Journal of AHIMA - website

Publication Date: November 2015


The HIM Problem


Completing regular privacy risk assessments is one of the most proactive ways of preventing healthcare privacy breaches. However, finding helpful tools for these assessments is hard to come by.


The HIM Problem Solver: Sharon Lewis, MBA, RHIA, CHPS, CP....

Download Two Apps and Text Me in the Morning: Physicians are Increasingly Prescribing mHealth Apps, but Privacy and Security Worries Remain

Author: AHIMA

Source: Journal of AHIMA

Publication Date: May 2014



While physicians are increasingly likely to pull out their prescription pad and say, in all earnestness, “There’s a new app for that,” recent research suggests the decision to do so is fraught. A survey of 1,500 physicians found that while 37 percent have prescribed an app, 42 percent ref....

E-Health and PKI Interoperability (Part 1)

Author: Barnett, David H.

Source: In Confidence (newsletter)

Publication Date: September 02, 2000


Part One of a Two-Part Article
Providing patient access to medical information and services over the Internet-often referred to as e-health-is an area of rapidly growing interest for many healthcare organizations today. One of the challenges for e-health is providing adequate and effecti....

E-Health and PKI Interoperability (Part 2)

Author: Barnett, David H.

Source: In Confidence (newsletter)

Publication Date: November 02, 2000


Part Two of a Two-Part Article
In the previous issue, we discussed the need for common Certificate Policies in healthcare, such as the ASTM E31 Model Policy. Agreement on practices and policies, as specified in the Certificate Policy and Certification Practice Statements, can expedite in....

Ensuring Remote Coding Compliance

Author: Comfort, Angie

Source: Journal of AHIMA - Coding Notes

Publication Date: April 2012


More and more HIM department managers are turning to remote coding. However, before implementing this staffing model, managers must answer several questions regarding the privacy and security of patient information, including:
What are the compliance risks?
How will privacy and secu....

Evolving Role of the Privacy and Security Officer

Author: Bowen, Rita K.

Source: Journal of AHIMA

Publication Date: June 2015



Fifteen years ago, many individuals accepted the role of the privacy officer with a perception that it would be a role involving the education and training of individuals on HIPAA rules and regulations, developing policy, and responding to reported incidents. The security officer was focu....

Handling Sensitive Information in an NHIN

Author: Dimick, Chris

Source: Journal of AHIMA

Publication Date: February 2008


The topic of sensitive health data and how to keep it private in the electronic age is one of the most complex issues facing the development of a nationwide, interoperable health information exchange network.

Physicians need accurate medical records to provide adequate care. Yet pati....

Health Information Security: Revisiting the 80/20 Rule

Author: Kloss, Linda L

Source: Journal of AHIMA

Publication Date: February 2004


One of the most useful lessons I learned while working in healthcare quality improvement was the Pareto Principle, often referred to as the 80/20 rule. The concept is that in any endeavor, 20 percent of something is always responsible for 80 percent of the results.

This phenomenon i....

HIPAA Compliance for Clinician Texting

Author: Greene, Adam H

Source: Journal of AHIMA

Publication Date: April 2012



The HIPAA privacy and security rules need not act as an obstacle to efficient communications, but keeping texting compliant requires planning and diligence.

Text (or SMS) messaging has become nearly ubiquitous on mobile devices. According to one survey, approximately 72 perce....

HIPAA Security Overview - Retired

Author: Miaoulis, William M

Source: AHIMA practice brief

Publication Date: November 2013


Editor’s note: This update replaces the April 2004 and the November 2010 practice briefs titled “A HIPAA Security Overview.”


The HIPAA security rule has remained unchanged since its implementation more than a decade ago. However, the Health Information Technology for Economic a....

HITECH Security – A Practical Approach

Author: Rudloff, Rob

Source: AHIMA Convention

Publication Date: September 28, 2010


Background


HITECH has introduced new security requirements around HIPAA including new breach requirements and associated penalties. This paper addresses the information security and privacy requirements and provides practical solutions to address them. Many organizations already....

[1] 2 3