Search Results

= Members only

Current search

198 results.

1 2 3 4 5 6 7 [8]

Dilemma of Patient Health Record Security

Author: Demster, Barbara

Source: In Confidence (newsletter)

Publication Date: January 02, 2002


E-health privacy and security can be confusing and overwhelming issues when one is new to the world of technology and the Internet.
Many perceive the Internet as a clearly defined entity in a universe called cyberspace.We see “e-health” defined as Internet-related healthcare activities,....

Early Word on HIPAA Claims Attachments

Author: Dougherty, Michelle

Source: Journal of AHIMA

Publication Date: October 2001


If we could look into a crystal ball and see into the future, it would be much easier to prepare for HIPAA, particularly the electronic transaction standards. Because of the rarity of crystal balls these days, we must rely on other predictors at our disposal, such as the white paper issued by t....

Data Transmission: A World of Possibilities

Author: Smith, Deborah A.

Source: Journal of AHIMA

Publication Date: May 2001




In a landscape of regulation and consolidation, healthcare providers must find new, cost-effective ways to communicate sensitive data with partners. Observations, lab results, and admission-discharge-transfer data must be shared accurately, confidentially, and in a timely manner with....

Quick Take on Clearinghouses

Author: McLaughlin, Mark

Source: Journal of AHIMA

Publication Date: January 2001




HIPAA's provisions have brought healthcare clearinghouses into the spotlight. What is a clearinghouse, and how is its role affected by the new regulations? This article answers these questions.

A clearinghouse is typically used to collect, validate, and distribute insurance c....

Internal Audit Model for Information Security

Author: Mead, Kevin

Source: In Confidence (newsletter)

Publication Date: July 02, 2000


Internal auditors are found within many organizations, and have traditionally concerned themselves with the protection of assets. In the past, this manifested itself by the placing of asset tags on furniture and equipment and verifying the presence of the asset each year. Recently, however, i....

Journal Q&A (2/00)

Author: AHIMA Professional Practice Team

Source: AHIMA Q and A

Publication Date: February 02, 2000

Q: What Internet security guidelines are available?
A: Initially, Medicare issued a statement that the Internet was not secure enough for transmission of sensitive data. However, the growing demand for transmittal of HCFA Privacy Act-protected data via the Internet resulted in HCFA's....

HL7 Overview

Author: Quinn, John

Source: Journal of AHIMA

Publication Date: July 1999


As one of the co-developers of Health Level Seven (HL7), I am very close to the issue. So in describing it, I'm going to start with the basics, beginning with the current definition that has evolved over HL7's brief existence:

"The Health Level Seven (HL7) Standard, an ANSI approved....

OASIS Cracks Down on Home Care

Author: Carpenter, Jennifer E.

Source: Journal of AHIMA

Publication Date: May 1999



January 25, 1999, brought the publication of the final rule on the assessment and use of the Outcomes and Assessment Information Set (OASIS) in the Federal Register. This rule requires that each patient receive a patient-specific, comprehensive assessment that identifies the patient'....

Journal Q&A (10/98)

Author: AHIMA Professional Practice Team

Source: AHIMA Q and A

Publication Date: October 02, 1998


Q: Where can I find information about a system that will allow for the electronic transmission of Minimum Data Set (MDS) information?

A: One of the Health Care Financing Administration's (HCFA's) proposals relating to the MDS 2.0 resident assessment process requires lo....

1 2 3 4 5 6 7 [8]