Search Results

= Members only

Current search

379 results.

<< 4 5 6 7 8 9 10 11 [12] 13 14 15 16 17 18 19 >>

High Cost of Privacy

Author: Rhodes, Harry B.

Source: In Confidence (newsletter)

Publication Date: January 02, 2001


Cost: how much money needs to be invested? By now, most of us have discussed the implementation of the Health Insurance Portability and Accountability Act (HIPAA) final rules with our administrators, and naturally the question has been raised, “Just how much is this going to cost me?”Most lik....

HIPAA: 43,691 Privacy Complaints and Counting

Author: AHIMA

Source: Journal of AHIMA

Publication Date: June 2009


For those wondering what progress the Office for Civil Rights makes as it works through HIPAA privacy rule complaints, the numbers are easy to find. Each month OCR reports top-line results of the HIPAA cases it has received and resolved.

OCR has logged approximately 43,700 complaints....

HIPAA and Privacy: After the Compliance Date

Author: Mikels, Debbie

Source: AHIMA Convention

Publication Date: October 15, 2004

Abstract

This article reviews successful strategies in preparing for HIPAA Privacy compliance. There are ongoing challenges organizations will face after the compliance date, such as managing research issues, identifying all business associates, and managing the accounting of disclosures....

HIPAA and the EHR: Making Technical Safeguard Changes

Author: Fodor, Joseph

Source: Journal of AHIMA

Publication Date: January 2004


As electronic health records (EHRs) become more commonplace in healthcare, changes, adjustments, and improvements will be inevitable. When designing, implementing, upgrading, or remediating an EHR system, your organization’s implementation team should consider the impact of complying wit....

HIPAA Audit and System Activity Review: Developing a Process that Focuses on the Greatest Risks First

Author: Hofler, Linda D.; Hardee, Joy; Dildy, Kenneth; Burleson, Deeanna; Grady, Jamie

Source: Journal of AHIMA

Publication Date: March 2005


The privacy and security rules require audits and system activity reviews. Here is one health system's process, a systematic approach that focuses on areas of greatest risk.
Ensuring the privacy and confidentiality of patient information is fundamental to HIM, but it has taken on a new le....

HIPAA Breach Enforcement Roundup

Author: Cacciatore, Victoria; Downing, Katherine

Source: Journal of AHIMA

Publication Date: July 2014



Criminal attacks on healthcare systems have risen 100 percent since 2010, according to a recent Ponemon study.1 This makes it obvious that the privacy and security of patient health information is vulnerable and highly susceptible to data breach. The HIPAA Breach Notification Rule became e....

<< 4 5 6 7 8 9 10 11 [12] 13 14 15 16 17 18 19 >>