Search Results

= Members only

Current search

31 results.

[1] 2 3 4

Kick Starting the Security Risk Analysis

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: July 2004


Many covered entities are just now starting to approach the compliance aspects of the HIPAA security rule. Why discuss “compliance aspects” and not standards or controls, as we did when preparing for the privacy rule? Privacy and security are long-standing concepts to healthcare,....

Industry Awaits Phase 2 of HIPAA Audit Program

Author: Asmonga, Donald D.

Source: Journal of AHIMA

Publication Date: January 2015



The wait for the second round of mandated privacy and security audits from the Department of Health and Human Services’ (HHS) Office for Civil Rights (OCR) continues. OCR is currently working through final details for the revised audit plan as they await finalization of new technolog....

Securing Your IT Environment from the Inside Out

Author: Bakman, Alex

Source: In Confidence (newsletter)

Publication Date: September 02, 2001


IT security has been gaining in importance throughout the history of digital data, and industries are gradually regulating themselves or facing governmental compliance standards. The healthcare industry possesses some of the most critical data and network technology in that lives and patient....

Securing Portable Devices

Author: Dinh, Angela K.

Source: Journal of AHIMA

Publication Date: January 2009


Reports of data breaches involving portable devices last year ran the gamut from oversight to theft: a college of medicine professor gave away a personal computer containing protected health information, including photos of his patients, to friends; a flash drive containing Social Security num....

[1] 2 3 4