132 results.
1 2 3 [4] 5 6
Understanding the HIE Landscape
Author: AHIMA
Source: AHIMA practice brief
Publication Date: September 2010
HITECH Security – A Practical Approach
Author: Rudloff, Rob
Source: AHIMA Convention
Publication Date: September 28, 2010
Developing an HIM Centric Privacy & IT Security Approach in Healthcare
Author: Cothran, Carey L.; Kost-Woodrow, Beth
Source: AHIMA Convention
Publication Date: September 28, 2010
Data Security Compliance in IT Asset Disposition
Author: Adam, Chris
Source: AHIMA Convention
Publication Date: September 28, 2010
Cybersecurity Insurance: Considering Coverage for Data Breaches
Author: Herrin, Barry S.; Jones, Frankie T
Source: Journal of AHIMA
Publication Date: January 2011
Swiped, Not Hacked: After a Year of Reporting, Theft Remains Main Cause of Breach
Author: AHIMA
Source: Journal of AHIMA
Publication Date: February 2011
Low-Tech Threats in a High-Tech World
Author: Rollins, Genna
Source: Journal of AHIMA - website
Publication Date: April 2011
Managing Data Breaches: A View from the Trenches
Author: Edelstein, Scott A; Poulson, Mary
Source: AHIMA Convention
Publication Date: October 02, 2011
Little Breaches: OCR Releases First “Small Breach” Data
Author: Heubusch, Kevin
Source: Journal of AHIMA
Publication Date: October 2011
Sanction Guidelines for Privacy and Security Violations. Appendix A: Sample Privacy and Security Violation Severity Determination Document (2011 update)
Author: AHIMA
Source: AHIMA practice brief attachment
Publication Date: October 2011
Sanction Guidelines for Privacy and Security Violations (2011 update)
Author: AHIMA
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: October 2011
Keeping Compliant: Managing Rising Risk in Physician Practices
Author: Brocato, Lori; Emery, Steven; McDavid, Jan P
Source: Journal of AHIMA
Publication Date: November 2011
Keeping It Private: Staying Compliant with the HIPAA Privacy and Security Rules
Author: Tomes, Jonathan P.
Source: Journal of AHIMA
Publication Date: March 2012
Automation for Privacy and Security Compliance
Author: McLendon, Kelly
Source: Journal of AHIMA
Publication Date: March 2012
The New Privacy Officer
Author: Dimick, Chris
Source: Journal of AHIMA
Publication Date: April 2012
Identity Crisis: Organizations are Implementing Medical Identity Theft Teams to Combat Rising Incidents
Author: Bowe, Robin
Source: Journal of AHIMA
Publication Date: January 2013
Breach Notification Triggers Receive Update
Author: Bowen, Rita K.
Source: Journal of AHIMA - website
Publication Date: April 2013
The Omnibus Arrives: OCR Issues HITECH-HIPAA Final Privacy Rule
Author: Rode, Dan
Source: Journal of AHIMA
Publication Date: April 2013
When to Send a Breach Notification: New HIPAA Rules Revise “Harm” Standard
Author: Warner, Diana
Source: Journal of AHIMA
Publication Date: April 2013
HIPAA Changes Call for Revising BA Agreements
Author: McDavid, Jan P
Source: Journal of AHIMA
Publication Date: May 2013
Performing a Breach Risk Assessment - Retired
Author: AHIMA
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: September 2013
Adapting BA Practices to Meet the Omnibus Rule
Author: McSteen, Thomas
Source: Journal of AHIMA
Publication Date: September 2013
Sanction Guidelines for Privacy and Security Violations (2013 update) - Retired
Author: AHIMA
Source: AHIMA practice brief
Publication Date: October 2013
The Healthcare Wall of Shame
Author: AHIMA
Source: Journal of AHIMA
Publication Date: November 2013
Guidelines for a Compliant Business Associate Agreement - Retired
Author: AHIMA
Source: AHIMA practice brief
Publication Date: November 2013
1 2 3 [4] 5 6