472 results.
1 2 3 [4] 5 6 7 8 9 10 11 12 13 14 15 16 >>
Optimizing PHI Disclosure Management in the Age of Compliance
Author: Don, Hardwick; Twiggs, Mariela; Braden, James H
Source: Journal of AHIMA
Publication Date: February 2015
A mere two decades ago, healthcare providers didn’t face significant penalties for improperly disclosing protected health information (PHI). Since then, regulations surrounding the privacy and security of PHI have evolved to include strict requirements and corresponding steep financial pe....
Evaluation of PHI Hunter in Natural Language Processing Research
Author: Redd, Andrew; Pickard, Steve; Meystre, Stephane; Scehnet, Jeffrey; Bolton, Dan; Heavirland, Julia; Weaver, Allison Lynn ; Hope, Carol; Garvin, Jennifer Hornung
Source: Perspectives in Health Information Management
Publication Date: January 2015
Abstract
Objectives: We introduce and evaluate a new, easily accessible tool using a common statistical analysis and business analytics software suite, SAS, which can be programmed to remove specific protected health information (PHI) from a text document. Removal of PHI is import....
Industry Awaits Phase 2 of HIPAA Audit Program
Author: Asmonga, Donald D.
Source: Journal of AHIMA
Publication Date: January 2015
The wait for the second round of mandated privacy and security audits from the Department of Health and Human Services’ (HHS) Office for Civil Rights (OCR) continues. OCR is currently working through final details for the revised audit plan as they await finalization of new technolog....
Be e-Prepared: Tips for Tackling Ever-changing Electronic Audits, e-Discovery, and e-Measures
Author: Butler, Mary
Source: Journal of AHIMA
Publication Date: November 2014
Don’t let the quiet before the storm fool you. Regulators might be hushed now, but compliance activity is expected to keep health information management (HIM) professionals on their toes throughout 2015. As electronic health record (EHR) implementation becomes more pervasive, so too does....
Work Plan Fiscal Year 2015
Author: U.S. Department of Health and Human Services. Office of the Inspector General
Source: Government (U.S.)
Publication Date: October 2014
This report forecasts areas of OIG focus based on the results of OIG’s risk assessments and have been identified as significant management and performance challenges facing HHS. In FY 2015 and beyond, we will continue to focus on emerging payment, eligibility, management, and IT systems security vulnerabilities in health care reform programs, such as the health insurance marketplaces.
Introduction to Evaluation and Management Services
Author: Huey, Kim
Source: CodeWrite | AHIMA newsletter article
Publication Date: October 2014
Evaluation and management (E/M) are cognitive services in which a physician or other qualified healthcare professional diagnoses and treats illness or injury. Almost all specialties will perform evaluation and management services. Even physicians who generate the bulk of their revenue in....
HIPAA's Place in Court-Ordered Discovery: Determining What's Legal During Litigation Health Record Requests
Author: Hedges, Ron; Brady, Kevin
Source: Journal of AHIMA
Publication Date: September 2014
Every Health information management (HIM) professional, lawyer, and healthcare consumer should be familiar with the Health Insurance Portability and Accountability Act (HIPAA). For healthcare consumers, HIPAA offers protections and rights of access to personal health information. For HIM....
Coping with Government Audits
Author: Butler, Mary
Source: Journal of AHIMA - website
Publication Date: August 2014
The HIM Problem: Medicare Auditor Scrutiny of Inpatient Claims
This spring, the Centers for Medicare and Medicaid Services (CMS) issued its “two midnight rule” which was intended to define and clarify what Medicare considers to be criteria justifying an inpatient st....
HIPAA Breach Enforcement Roundup
Author: Cacciatore, Victoria; Downing, Katherine
Source: Journal of AHIMA
Publication Date: July 2014
Criminal attacks on healthcare systems have risen 100 percent since 2010, according to a recent Ponemon study.1 This makes it obvious that the privacy and security of patient health information is vulnerable and highly susceptible to data breach. The HIPAA Breach Notification Rule became e....
Navigating a Compliant Breach Management Process
Author: Downing, Katherine
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: June 2014
The purpose of AHIMA’s new Breach Management Toolkit is to provide a comprehensive collection of resources and best practices to help healthcare organizations and health information management (HIM) professionals navigate their way through the Health Insurance Portability and Accountability Act (HIPAA) Breach Notification Rule and the overall breach management process. The toolkit is intended to raise awareness of the importance and responsibility of everyone within the organization to report HIPAA breaches to the appropriate designated personnel, as well as provide breach prevention education and training.
1 2 3 [4] 5 6 7 8 9 10 11 12 13 14 15 16 >>