31 results.
[1] 2 3 4
Internal Audit Model for Information Security
Author: Mead, Kevin
Source: In Confidence (newsletter)
Publication Date: July 02, 2000
Internal auditors are found within many organizations, and have traditionally concerned themselves with the protection of assets. In the past, this manifested itself by the placing of asset tags on furniture and equipment and verifying the presence of the asset each year. Recently, however, i....
Securing Your IT Environment from the Inside Out
Author: Bakman, Alex
Source: In Confidence (newsletter)
Publication Date: September 02, 2001
IT security has been gaining in importance throughout the history of digital data, and industries are gradually regulating themselves or facing governmental compliance standards. The healthcare industry possesses some of the most critical data and network technology in that lives and patient....
Developing a Framework for a Security Assessment
Author: Parisien, Darryl
Source: In Confidence (newsletter)
Publication Date: September 02, 2001
Is your organization taking the necessary actions to comply with the security regulations of HIPAA? Do you believe you have more time to comply? If you think you do, you might want to do a little more research. Take note that United States Code Title 42 Section 1320d-2 states:
Each pers....
Departmental Information Systems and HIPAA: Easing the Tension (part 1)
Author: Nulan, Craig A.
Source: In Confidence (newsletter)
Publication Date: May 02, 2002
This is the first article in a two-part series. Look for part two in the June issue of In Confidence.
Healthcare has an interesting quandary in the areas of HIPAA privacy and security compliance. First, there is the unarguable tension between minimum necessary information access and use....
Departmental Information Systems and HIPAA: Easing the Tension (part 2)
Author: Nulan, Craig A.
Source: In Confidence (newsletter)
Publication Date: June 02, 2002
Part two in a two-part series.
Part one of this article from the May 2002 issue of In Confidence focused on finding a balance between the needs of the information systems department and the requirements of HIPAA. The article offered tips on conducting an administrative certification as....
Exploring HIPAA's Security Domains: Access Control Systems
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: April 02, 2003
Part two in a 10-part series.
This article is the second of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. This second domain of access control systems covers topics that describe the reasoning, risk anal....
Security Risk Analysis and Management: an Overview
Author: Amatayakul, Margret
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: October 2003
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
Protecting Your Assets: Identifying and Securing Against Vulnerabilities
Author: Banzhof, Carl
Source: In Confidence (newsletter)
Publication Date: October 02, 2003
In the past year alone, more than 4,100 new network vulnerabilities were identified and reported, according to Computer Emergency Response Team Coordination Center statistics. Throughout the past eight years, this number has dramatically increased, and as a result, IT professionals have inher....
Globalization of Medical Transcription Industry Requires Proper Risk Analysis
Author: AHIMA
Source: AHIMA press release
Publication Date: October 30, 2003
AHIMA compiles list of top ten outsourcing questions for healthcare organizations
CHICAGO, October 30-US Healthcare organizations and their domestic transcription vendors are increasingly employing an international labor pool to meet the demand for transcription workloads. This gro....
Kick Starting the Security Risk Analysis
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: July 2004
Many covered entities are just now starting to approach the compliance aspects of the HIPAA security rule. Why discuss “compliance aspects” and not standards or controls, as we did when preparing for the privacy rule? Privacy and security are long-standing concepts to healthcare,....
[1] 2 3 4