Search Results

= Members only

Current search

198 results.

1 2 [3] 4 5 6 7 8 9 10 11 12 13 14 15 16 >>

Primer on Encryption

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: June 2004


Encryption is an addressable implementation specification under HIPAA’s access control and transmission security standards. Many providers are grappling with just how to address these specifications:
Is there a difference between the two specifications, and if so, what is the diff....

Managing HIPAA as Gatekeeper

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: September 2004


An unfortunate result of the HIPAA privacy rule is the emerging use of HIPAA as a gatekeeper, restricting the appropriate fl ow of protected health information (PHI). HIPAA is being cited as a reason not to disclose information without patient permission when needed for treatment, payment, or....

Privacy and Security Solutions for Interoperable Health Information Exchange: North Carolina HISPC Final Implementation Plan Report

Author: Anderson, Holt; North Carolina Information and Communications Alliance; RTI International

Source: U.S. Agency for Healthcare Research & Quality

Publication Date: April 15, 2007

The report includes an analysis of policy, technological, and legal barriers to exchanging health information within North Carolina and describes in greater detail the proposed solutions intended to reduce or eliminate those barriers.

Opting for Opt Out: How One HIE Manages Patient Consent

Author: Bass, Deb

Source: Journal of AHIMA

Publication Date: May 2011



Every health information exchange must determine how it will gain consent from patients to share their information. The Nebraska Health Information Initiative chose opt out and with good communication and management has maintained a high rate of patient participation.

Even afte....

1 2 [3] 4 5 6 7 8 9 10 11 12 13 14 15 16 >>