Search Results

= Members only

Current search

379 results.

<< 12 13 14 15 16 17 18 19 [20] 21 22 23 24 25 26 27 >>

Stealth Software Deters PHI Theft

Author: Kawles, Terrance L.

Source: Journal of AHIMA

Publication Date: July 2003


As the leading edge of digital portability advances, the protections afforded the “portability” portion of HIPAA become strained. Under the final security standards, covered entities (CEs) must establish procedures and mechanisms to protect the confidentiality, integrity, and availab....

New Tool Streamlines HIPAA Assessment Process

Author: Cohen, Kathleen

Source: In Confidence (newsletter)

Publication Date: August 02, 2003


How are you making sure that your organization is complying with the HIPAA privacy regulations? Many hospitals are doing HIPAA rounds with privacy officers, going from unit to unit to assess and document HIPAA compliance. But trying to make sense of the data collected during HIPAA rounds can....

Journal Q&A (9/03)

Author: AHIMA Professional Practice Team

Source: AHIMA Q and A

Publication Date: September 02, 2003

Q: Under HIPAA, how should covered entities respond to requests from public health officials who state that they need protected health information (PHI) to carry out their duties?

A: The privacy rule recognizes that PHI may be needed to respond to threats to public health, including the....

Are Ethics Guiding Your Workplace?

Author: Yokubaitis, Pamela R.

Source: Journal of AHIMA

Publication Date: September 2003



Sanctions under the HIPAA regulations mean serious financial consequences for healthcare professionals who release protected health information to others without following proper disclosure protocols. But HIM professionals should not be motivated by fear of financial consequences alone. Ou....

<< 12 13 14 15 16 17 18 19 [20] 21 22 23 24 25 26 27 >>