Search Results

= Members only

Current search

337 results.

[1] 2 3 4

ARRA FAQs

Author: Wiedemann, Lou Ann

Source: Journal of AHIMA

Publication Date: September 2009



On February 17, 2009, President Barack Obama implemented sweeping healthcare legislation when he signed the American Recovery and Reinvestment Act of 2009 into law. ARRA includes many privacy, security, work force, and health IT provisions that will have a major impact on the healthcare in....

Using CDI to Meet Federal Quality Measures

Author: Wiedemann, Lou Ann

Source: Journal of AHIMA

Publication Date: January 2013



Clinical documentation is the foundation of every health record, specifically outlining the reasons for treatment and the quality of care provided to the patient. The lack of consistent and standard clinical content within the health record has been an ongoing challenge to health informati....

Understanding Patient Access and Amendments

Author: Wiedemann, Lou Ann

Source: AHIMA Convention

Publication Date: October 02, 2011


The Health Information Portability and Accountability Act (HIPAA, 45 CFR, section 164.524 and 164.526) and subsequent privacy rule revisions under the Health Information Technology for Economic and Clinical Health (HITECH) Act changed how covered entities approach a patient’s right to ac....

CDI Programs Support Meeting Meaningful Use

Author: Wiedemann, Lou Ann

Source: Journal of AHIMA

Publication Date: July 2013



Information quality, better access to health information, and greater information exchange are in store for eligible providers, eligible hospitals, and critical access hospitals expecting to attest to stage 2 of the Centers for Medicare and Medicaid Services’ (CMS) “meaningful....

Prepare Now for Meaningful Use Attestation and Compliance Audits

Author: Warner, Diana

Source: Journal of AHIMA

Publication Date: March 2014

A warning issued in 2013 by the Centers for Medicare and Medicaid Services (CMS) has come to pass. “Meaningful use” Electronic Health Record (EHR) Incentive Program audits have begun. The College of Healthcare Information Management Executives (CHIME) reported that out of their 1,400 member organizations, almost 100 received audit notices in October 2013, totaling six percent of membership. In order to protect incentive payments earned through the meaningful use program, organizations need to be prepared for every audit contingency and know exactly what to expect. Organizations also need to avoid common mistakes that could lead to an audit and follow best practices for staying compliant to meaningful use standards.

Workflow for Breach Notification

Author: Walsh, Tom

Source: Journal of AHIMA

Publication Date: April 2010


Federal regulations that took effect in September 2009 require HIPAA covered entities and their business associates to notify individuals if their protected health information (PHI) was accessed or disclosed in an unauthorized manner or by unauthorized individuals. Certain exemptions apply, su....

Payout: Reviewing Meaningful Use Payments

Author: Viola, Allison F.; Rode, Dan

Source: Journal of AHIMA

Publication Date: October 2010


CMS will pay meaningful use bonuses through three programs: Medicare Fee for Service (FFS), Medicare Advantage (MA), and Medicaid programs.
FFS Payments to Providers

For eligible professionals (EPs), understanding the payment system is especially important, because they must ch....

Metadata and Meaningful Use

Author: Viola, Allison F.; Mookencherry, Shefali

Source: Journal of AHIMA

Publication Date: February 2012




The healthcare industry will find out soon if ONC intends to include metadata requirements in stage 2 of the meaningful use program. Many feel it is too soon. But given metadata's potential to support health information exchange, the expanded and standardized use of metadata tagging....

Details of Stage 2 Meaningful Use

Author: Viola, Allison F.

Source: Journal of AHIMA

Publication Date: June 2012


The release of STAGE 2 of the meaningful use program introduced adjustments that increased the challenges providers must overcome to meet the program requirements laid out by the Centers for Medicare and Medicaid Services (CMS). Stage 2 maintains the same core-menu structure and slightly incre....

Information Exchange Receives a Big Push in Meaningful Use, Stage 2: New Requirements Encourage Further Integration With EHRs

Author: Viola, Allison F.

Source: Journal of AHIMA

Publication Date: June 2012


As outlined within the HITECH Act of 2009, in order for providers to become meaningful users of electronic health records (EHRs), their use must, "in accordance with law and standards applicable to the exchange of information… improve the quality of health care, such as promoting care coordina....

Meaningful Use Stage 2 Ramps Up Record Access

Author: Viola, Allison F.

Source: Journal of AHIMA

Publication Date: October 2012


The Centers for Medicare and Medicaid Services (CMS) and the Office of the National Coordinator for Health Information Technology (ONC) have certainly put a new spin to the old saying “things happen in threes.” During late August, CMS issued the final rule for the stage 2 “meaningful use” Elec....

Meaningful Use of Patient-Generated Data in EHRs

Author: Van Doornik, William

Source: Journal of AHIMA

Publication Date: October 2013



There is growing interest within the healthcare payer community to promote patient engagement through various means, including the integration of patient-generated data into clinical care documentation and quality measures. This is evident in the suggestions for stage 3 "meaningful use" EH....

Certification Guidance for EHR Technology Developers Serving Health Care Providers Ineligible for Medicare and Medicaid EHR Incentive Payments

Author: U.S. Office of the National Coordinator for Health Information Technology

Source: Government (U.S.) | U.S. Office of the National Coordinator for HIT

Publication Date: September 2013

This guidance is meant to serve as a building block for federal agencies and stakeholders to use as they work with different communities to achieve interoperable electronic health information exchange.

Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification Rules Under the Health Information Technology for Economic and Clinical Health Act and the Genetic Information Nondiscrimination Act; Other Modifications to the HIPAA Rules; Final Rule

Author: U.S. Office for Civil Rights

Source: U.S. Department of Health & Human Services | U.S. Office for Civil Rights

Publication Date: January 2013

Rule modifies HIPAA by implementing statutory amendments under HITECH to strengthen the privacy and security protection for individuals’ health information; modifies the Breach Notification Rule under the HITECH Act, modifes the HIPAA Privacy Rule to strengthen the privacy protections for genetic information and makes certain other modifications to the HIPAA Privacy, Security, Breach Notification, and Enforcement Rules (the HIPAA Rules) to improve their workability and effectiveness and to increase flexibility for and decrease burden on regulated entities.

Guidance Specifying the Technologies and Methodologies That Render Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals for Purposes of the Breach Notification Requirements ... [of ARRA]

Author: U.S. Department of Health and Human Services. Office of the Secretary

Source: Government (U.S.)

Publication Date: April 27, 2009

[Federal Register: April 27, 2009 (Volume 74, Number 79)] [Rules and Regulations] [Page 19006-19010] From the Federal Register Online via GPO Access [wais.access.gpo.gov] [DOCID:fr27ap09-11] ======================================================================= ------------------------------------....

Journey through Meaningful Use at a Large Academic Medical Center: Lessons of Leadership, Administration, and Technical Implementation

Author: Unger, Melissa D; Aldrich, Alison M; Hefner, Jennifer L; Rizer, Milisa K

Source: Perspectives in Health Information Management

Publication Date: October 2014


Abstract


Successfully reporting meaningful use of electronic health records to the Centers for Medicare and Medicaid Services can be a challenging process, particularly for healthcare organizations with large numbers of eligible professionals. This case report describes a successf....

EHR Usability on Mobile Devices

Author: Sandefer, Ryan; Brinda, Danika; Wapola, Janelle; Maki, Shirley Eichenwald; Marc, David

Source: Educational Perspectives in Health Informatics and Information Management

Publication Date: July 2013


Abstract


Currently, minimal requirements exist for assessing the usability of electronic health record (EHR) systems. Usability requirements are especially lacking for the increasing use of mobile devices to access EHRs. Therefore, the authors investigated the usability of three c....

Taking a Stand on Sanctions

Author: Rulon, Vera

Source: Journal of AHIMA - website

Publication Date: April 2009


The Journal of AHIMA kicks off our Health Information Privacy and Security Week series with a post from AHIMA president Vera Rulon, MS, RHIT, CCS, FAHIMA. Rulon is director of strategy and communications in the chief medical office of Pfizer, Inc.

So I get this communication that my c....

HITECH Security – A Practical Approach

Author: Rudloff, Rob

Source: AHIMA Convention

Publication Date: September 28, 2010


Background


HITECH has introduced new security requirements around HIPAA including new breach requirements and associated penalties. This paper addresses the information security and privacy requirements and provides practical solutions to address them. Many organizations already....

HITECH Frequently Asked Privacy, Security Questions: part 2

Author: Rose, Angela Dinh; Greene, Adam H

Source: Journal of AHIMA

Publication Date: February 2014

The final HITECH-HIPAA Omnibus Rule was released in January 2013 and expanded some of HIPAA’s original requirements involving its privacy, security, and enforcement components. The Omnibus also finalized the Breach Interim Final Rule as well as the Genetic Information Nondiscrimination Act (GINA).

The following are some commonly asked questions about the HITECH Omnibus Rule implementation and compliance requirements, specifically regarding the rule’s areas addressing business associates, breaches, and GINA.

HITECH Frequently Asked Privacy, Security Questions: Part 3

Author: Rose, Angela Dinh; Greene, Adam H

Source: Journal of AHIMA | AHIMA Q and A

Publication Date: March 2014

This article concludes a three-part series discussing the most commonly asked questions regarding compliance requirements surrounding the final HITECH Omnibus Rule, released in January 2013. It highlights the updated requirements and provides answers to questions regarding decedent protected health information (PHI), the release of immunization records to schools, and the enhanced request for restrictions requirements.

What to Expect When Phase 2 HIPAA Audits Begin

Author: Rose, Angela Dinh

Source: Journal of AHIMA

Publication Date: June 2016



The HITECH Omnibus Rule mandated that the US Department of Health and Human Services (HHS) conduct periodic audits on the privacy and security compliance of covered entities and business associates. It was during the Office for Civil Rights (OCR) update session on March 21, 2016 at the 20....

ARRA and the HIM Workforce

Author: Rollins, Genna

Source: Journal of AHIMA

Publication Date: October 2009




The success of health IT will hinge on how well it is planned and managed. Provisions in the stimulus bill that promote professional support and fund training offer exceptional opportunities to HIM programs, individuals, and the profession.



For years AHIMA and col....

Summer Reading: Skimming the New ARRA-HITECH Regulations

Author: Rode, Dan

Source: Journal of AHIMA

Publication Date: September 2010


In July the Department of Health and Human Services (HHS) ended the waiting game for the HITECH privacy and security regulations, the meaningful use final rule, and the final rule on standards and certification.

HIM professionals and their organizations, anxious to familiarize thems....

[1] 2 3 4