Search Results

= Members only

Current search

132 results.

[1] 2 3 4 5 6

Information Governance for Offsite Data Security

Author: Saharia, Devendra

Source: Journal of AHIMA

Publication Date: April 2016



Disruptive technology can turn any industry on its head—virtually overnight. Just five years ago, summoning a taxi was an inefficient, time-consuming effort that often involved dialing up a dispatcher, who contacted a driver, who would then make their way to your location, perhaps in an h....

Shifting from Reactive to Proactive HIPAA Audits

Author: Brinda, Danika

Source: Journal of AHIMA

Publication Date: January 2016



Stories about workforce members inappropriately accessing health information continue to plague the Department of Health and Human Services’ Data Breach Portal—which lists US provider data breaches that affect more than 500 individuals. Recently two data breaches reported on th....

Cybersecurity 101

Author: Lucci, Susan; Walsh, Tom

Source: Journal of AHIMA

Publication Date: November 2015



One of the most alarming statistics in the news, which is growing with intent and severity, is the prevalence of cyber-attacks, particularly in healthcare. It is an alarming trend that has gained a good deal of attention. For example, in July 2015, UCLA reported that up to 4.5 million pati....

Beware the Dark Side of the Web

Author: Journal of AHIMA Staff

Source: Journal of AHIMA

Publication Date: May 2015


Unless they know exactly what to look for, most Internet users wouldn’t know that a “Dark Web” exists or what it is—let alone the potential for harm that can be done with it.


But the dark side of the web is out there, and its proprietors want your medical information.

....

Clearing the HIPAA Cobwebs: New ONC Chief Privacy Officer Lucia Savage Focuses on Balancing Privacy and Security with Expanding Interoperable EHR Exchange

Author: Dimick, Chris

Source: Journal of AHIMA

Publication Date: April 2015



The spiders of time have been hard at work on the US healthcare privacy and security rules, to the point that their place in health IT interoperability has become fogged and is inhibiting their proper role in the meaningful exchange of health information, according to Lucia Savage, JD, th....

Where to Begin with Cyber Defense

Author: Lewis, Sharon; McDonald, Kevin B

Source: Journal of AHIMA

Publication Date: April 2015



As data is made more readily available through a growing number of public and private channels, understanding the risks is critical. Patients expect organizations to take the steps required to protect their sensitive and personal information as it is being produced, processed, shared, and....

HIPAA Breach Enforcement Roundup

Author: Cacciatore, Victoria; Downing, Katherine

Source: Journal of AHIMA

Publication Date: July 2014



Criminal attacks on healthcare systems have risen 100 percent since 2010, according to a recent Ponemon study.1 This makes it obvious that the privacy and security of patient health information is vulnerable and highly susceptible to data breach. The HIPAA Breach Notification Rule became e....

Navigating a Compliant Breach Management Process

Author: Downing, Katherine

Source: AHIMA practice brief | Journal of AHIMA

Publication Date: June 2014

The purpose of AHIMA’s new Breach Management Toolkit is to provide a comprehensive collection of resources and best practices to help healthcare organizations and health information management (HIM) professionals navigate their way through the Health Insurance Portability and Accountability Act (HIPAA) Breach Notification Rule and the overall breach management process. The toolkit is intended to raise awareness of the importance and responsibility of everyone within the organization to report HIPAA breaches to the appropriate designated personnel, as well as provide breach prevention education and training.

[1] 2 3 4 5 6