Search Results

= Members only

Current search

379 results.

[1] 2 3 4 5 6 7 8

Winding Road to the Privacy Rule

Author: Rode, Dan

Source: Journal of AHIMA

Publication Date: June 2001

We have a privacy rule. After years of effort from AHIMA members, the first national privacy standards were allowed to go into effect by Department of Health and Human Services (HHS) Secretary Tommy G. Thompson, with pressure from the White House.

It's time for HIM professi....

Who's Covered by HIPAA (HIPAA on the Job)

Author: Rode, Dan

Source: Journal of AHIMA

Publication Date: March 2001

One of the mysteries of the administrative simplification section of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) is determining who is covered or comes under the requirements of the act. This article will examine HIPAA to unravel some of the mystery of &quo....


Author: AHIMA Professional Practice Team

Source: AHIMA Q and A

Publication Date: October 2002

Because HIPAA gives patients the right to copy their medical records, does my facility have to supply a copy machine for this purpose or allow patients to take their records to a copy center?
According to section 164.520 of the HIPAA final privacy rule, an individual has "the right to inspect....

Understanding the Privacy Rule's Amendments

Author: Hughes, Gwen

Source: Journal of AHIMA

Publication Date: November 2002

By now you know that amendments to the final privacy rule were published in the August 14, 2002, Federal Register. The amendments are intended to correct problems identified in the original privacy rule published on December 28, 2000.

This article presents a summary of some of....

The New Privacy Officer

Author: Dimick, Chris

Source: Journal of AHIMA

Publication Date: April 2012

It has been a decade since the first privacy officers took their jobs in response to the HIPAA privacy rule. A slew of changes since then have added more responsibility, required more skills, and demanded more time of them than anyone could have imagined.

When Nancy Davis, R....

Testimony on Behalf of The American Health Information Management Association (AHIMA) to the Privacy and Confidentiality Subcommittee of the National Committee of Vital and Health Statistics (NCVHS)

Author: Rode, Dan

Source: AHIMA testimony and comments

Publication Date: August 22, 2001

August 22, 2001

Mr. Rothstein, members of the Privacy and Confidentiality Subcommittee, ladies and gentlemen - good morning!

I am Dan Rode, vice president for the AHIMA. On behalf of the Association, its more than 40,000 members, and myself, thank you for the opportunity....

Take Another Look: Proposed Changes to Privacy Rule

Author: Rode, Dan

Source: Journal of AHIMA

Publication Date: May 2002

In late March, the Department of Health and Human Services (HHS) released proposed changes related to the HIPAA privacy standards. By the time you read this column, the 30-day comment period for these regulations will have already passed, although debate on these changes will still be in full....

Stealth Software Deters PHI Theft

Author: Kawles, Terrance L.

Source: Journal of AHIMA

Publication Date: July 2003

As the leading edge of digital portability advances, the protections afforded the “portability” portion of HIPAA become strained. Under the final security standards, covered entities (CEs) must establish procedures and mechanisms to protect the confidentiality, integrity, and availab....

State of HIPAA Privacy and Security Compliance 2005

Author: AHIMA

Source: AHIMA report

Publication Date: April 11, 2005

The results of a survey to assess the current state of HIPAA privacy and security within the healthcare industry.

AHIMA releases the results of this research in conjunction with the second annual National Health Information Privacy and Security Week, April 10-16, 2005. AHIMA is sponsoring National Health Information Privacy and Security Week to raise awareness among healthcare professionals, their employers, the media, and the public regarding the importance of protecting the privacy, confidentiality, and security of personal health information (PHI).

[1] 2 3 4 5 6 7 8