Search Results

= Members only

Current search

379 results.

1 2 3 [4] 5 6 7 8

Managing HIPAA as Gatekeeper

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: September 2004


An unfortunate result of the HIPAA privacy rule is the emerging use of HIPAA as a gatekeeper, restricting the appropriate fl ow of protected health information (PHI). HIPAA is being cited as a reason not to disclose information without patient permission when needed for treatment, payment, or....

2004 HIPAA Privacy & Security Compliance Survey

Author: AHIMA

Source: AHIMA

Publication Date: April 12, 2004

The results of a survey conducted by AHIMA to assess the current state of HIPAA privacy within the healthcare industry. These results are being released in conjunction with the first annual National Health Information Privacy and Security Week.

Debate Surrounding Unique Health Identifier Continues

Author: Wheatley, Victoria

Source: Journal of AHIMA

Publication Date: February 2004


Whatever happened to the unique health identifier for individuals (UHI)? The UHI was one of four identifiers included in HIPAA. In July 1998 the Department of Health and Human Services (HHS) and the former Health Care Financing Administration (now the Centers for Medicare and Medicaid Services....

Electronic Record, Electronic Security

Author: Hagland, Mark

Source: Journal of AHIMA

Publication Date: February 2004


New technologies are enhancing the ability to protect patient information. But there’s more to successful implementation than just what’s inside the box.

Melanie Schattauer, RHIA, Jack Obert, and their colleagues at Mercy St. John’s Health System in Springfield, M....

HIPAA and the EHR: Making Technical Safeguard Changes

Author: Fodor, Joseph

Source: Journal of AHIMA

Publication Date: January 2004


As electronic health records (EHRs) become more commonplace in healthcare, changes, adjustments, and improvements will be inevitable. When designing, implementing, upgrading, or remediating an EHR system, your organization’s implementation team should consider the impact of complying wit....

Handling Release of Information Over the Phone

Author: Hjort, Beth M.

Source: In Confidence (newsletter)

Publication Date: November 02, 2003


Q: Hospitals must have sensitive yet confidential policies for handling concerned family and friends with questions about loved ones within their facilities. How can a covered entity (CE) be confident about appropriate telephone release of information when it’s so difficult to validate a call....

How Law, Investigation, Ethics Connect to HIPAA

Author: Ruano, Michael

Source: In Confidence (newsletter)

Publication Date: November 02, 2003


Part nine in a 10-part series.
This article is the ninth of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. The information security domain of law, investigation, and ethics covers these topics in depth and provides a p....

How an Integrated Delivery System Organized, Approached, and Monitored HIPAA Privacy Compliance: a Case Study

Author: Miller, Judith A.

Source: In Confidence (newsletter)

Publication Date: November 02, 2003


Advocate Health Care is a large, fully integrated not-for-profit healthcare delivery system in metropolitan Chicago. Many months prior to the April 14, 2003, deadline, Advocate began preparing for the HIPAA privacy compliance deadline.When April 14 arrived, Advocate’s associates and physician....

Are Ethics Guiding Your Workplace?

Author: Yokubaitis, Pamela R.

Source: Journal of AHIMA

Publication Date: September 2003



Sanctions under the HIPAA regulations mean serious financial consequences for healthcare professionals who release protected health information to others without following proper disclosure protocols. But HIM professionals should not be motivated by fear of financial consequences alone. Ou....

Journal Q&A (9/03)

Author: AHIMA Professional Practice Team

Source: AHIMA Q and A

Publication Date: September 02, 2003

Q: Under HIPAA, how should covered entities respond to requests from public health officials who state that they need protected health information (PHI) to carry out their duties?

A: The privacy rule recognizes that PHI may be needed to respond to threats to public health, including the....

New Tool Streamlines HIPAA Assessment Process

Author: Cohen, Kathleen

Source: In Confidence (newsletter)

Publication Date: August 02, 2003


How are you making sure that your organization is complying with the HIPAA privacy regulations? Many hospitals are doing HIPAA rounds with privacy officers, going from unit to unit to assess and document HIPAA compliance. But trying to make sense of the data collected during HIPAA rounds can....

Stealth Software Deters PHI Theft

Author: Kawles, Terrance L.

Source: Journal of AHIMA

Publication Date: July 2003


As the leading edge of digital portability advances, the protections afforded the “portability” portion of HIPAA become strained. Under the final security standards, covered entities (CEs) must establish procedures and mechanisms to protect the confidentiality, integrity, and availab....

Oral Privacy and HIPAA: We Really Need to Talk

Author: Jacobs, Jodi

Source: In Confidence (newsletter)

Publication Date: June 02, 2003


Oral privacy is not a new need or requirement in healthcare. However, because it is now backed by a federal mandate, it is receiving newfound attention. With the passing of the April 14, 2003, deadline for HIPAA compliance, hospitals, pharmacies, clearinghouses, physician’s offices, military....

Sorting Out Employee Sanctions

Author: Burrington-Brown, Jill

Source: Journal of AHIMA

Publication Date: June 2003


Has your organization addressed sanctions related to privacy and security issues? Both the final privacy rule and final security rule address this issue. The privacy rule states that the covered entity must “have and apply appropriate sanctions against members of its workforce who fail to....

Journal Q&A (6/03)

Author: AHIMA Professional Practice Team

Source: AHIMA Q and A

Publication Date: June 02, 2003

Q: What are a covered entity’s legal responsibilities when a former employee breaches confidentiality of information gained during his or her employment period?

A: Individual state laws would affect the outcome of litigation if charges were pressed through civil action. If the organ....

Obtaining Satisfactory Assurance for PHI Disclosure

Author: Quinsey, Carol Ann

Source: Journal of AHIMA

Publication Date: June 2003


Obtaining “satisfactory assurance” in the privacy rule may sound like something new, but the concept has been around for a long time. Do you know what it means and how it affects your HIM department? This article will explain what obtaining satisfactory assurance means and how it can....

Journal Q&A (6/03)

Author: AHIMA Professional Practice Team

Source: AHIMA Q and A

Publication Date: June 02, 2003

Q: Under the privacy rule, how should a physician’s office handle a request from parents for a written statement recommending limitation of their child’s activities at school?

A: Most covered entities have policies requiring written requests or authorizations for disclosure of....

Cryptography and HIPAA: Breaking the Code

Author: Ruano, Michael

Source: In Confidence (newsletter)

Publication Date: June 02, 2003


Part four in a 10-part series.
This article is the fourth of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. The information security domain of cryptography is probably the most complex and mathematical of all the domai....

1 2 3 [4] 5 6 7 8