472 results.
<< 5 6 7 8 9 10 11 12 [13] 14 15 16 17 18 19 20 >>
Guidance on Risk Analysis Requirements under the HIPAA Security Rule
Author: U.S. Office for Civil Rights
Source: Government (U.S.) | U.S. Department of Health & Human Services
Publication Date: July 15, 2010
Smart Training on Privacy and Security
Author: Bacik, Sandy
Source: Journal of AHIMA
Publication Date: July 2010
ARRA's modifications to the HIPAA privacy and security rules are setting off a new round of training in facilities large and small. Trainers must fit the new training into existing schedules that already include organizational policies and procedures, HIPAA, and other regulations such as the R....
Verbal/Telephone Order Authentication and Time Frames (2010 update)
Author: AHIMA
Source: AHIMA practice brief
Publication Date: June 2010
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
Preemption of the HIPAA Privacy Rule (2010 update)
Author: AHIMA
Source: AHIMA practice brief
Publication Date: June 2010
This practice brief has been retired. It is made available for historical purposes only.
Handling Complaints and Mitigation (Updated) - Retired
Author: AHIMA; American Medical Informatics Association (AMIA)
Source: AHIMA practice brief
Publication Date: June 2010
Editor’s note: This update replaces content presented in the November 2003 practice brief “Handling Complaints and Mitigation.”
Many HIM professionals are experienced at managing various types of complaints that arise in day-to-day health information operations.....
Putting It in Writing: Updating BA Agreements to Cover Breach Notification
Author: Hjort, Beth M.; Rhodes, Harry B.
Source: Journal of AHIMA
Publication Date: June 2010
When ARRA extended sections of the HIPAA privacy and security rules to cover business associates (BAs), it created a seismic shift in their contractual relationships with covered entities (CEs). Further, the changes became effective simultaneous with other ARRA amendments that require CEs and....
Red Flags Rule In Limbo: Controversy Keeps Enforcement at Bay
Author: Dimick, Chris
Source: Journal of AHIMA
Publication Date: April 2010
Lawsuits, lobbying, and legislation are holding up enforcement of the Federal Trade Commission’s identity theft prevention law.
The Red Flags Rule has been all bark and no bite since the federal regulation was published in November 2007. More than two years and four postponements la....
Smart Training on Privacy and Security (expanded version)
Author: Bacik, Sandy
Source: Journal of AHIMA
Publication Date: April 2010
There is plenty of privacy and security training to be done, and many trainers struggle to get resources from their organizations and attention from their audiences. Sandy Bacik, CISSP, ISSMP, CISM, CGEIT, is a principal consultant at EnerNex and a former chief security officer. Here she o....
Medicare Recovery Audit Contracting: Weaknesses Remain in Addressing Vulnerabilities to Improper Payments, Although Improvements Made to Contractor Oversight
Author: U.S. Government Accountability Office
Source: Government (U.S.)
Publication Date: March 31, 2010
Year of the Audit
Author: Dimick, Chris
Source: Journal of AHIMA
Publication Date: March 2010
The healthcare forecast for 2010 includes a strong chance of audit. HIM professionals in many organizations will be busy responding to a shower of external record requests and internal compliance checks.
Stormy systems of audit programs, compliance initiatives, and fraud preventi....
<< 5 6 7 8 9 10 11 12 [13] 14 15 16 17 18 19 20 >>