Search Results

= Members only

Current search

472 results.

1 [2] 3 4 5

HIPAA Violation? Sue Me

Author: AHIMA

Source: Journal of AHIMA

Publication Date: March 2011


This is a true story that occurred recently in Indiana. Failing to collect payment for treatment, a medical group sent a patient to collections. In providing the unpaid bills to the collections attorney, practice staff failed to redact sensitive information. When the attorney filed the bills wi....

HITECH Security – A Practical Approach

Author: Rudloff, Rob

Source: AHIMA Convention

Publication Date: September 28, 2010


Background


HITECH has introduced new security requirements around HIPAA including new breach requirements and associated penalties. This paper addresses the information security and privacy requirements and provides practical solutions to address them. Many organizations already....

Managing Governmental Audits

Author: Wilson, Donna D

Source: AHIMA Convention

Publication Date: September 26, 2010


Background

Congress’ attention is now clearly focused on healthcare reform. With that said, the year of 2010 brought the “much anticipated” Recovery Audit Contractors (RACs) requesting medical records from many of the Medicare Fee for Service providers (complex reviews). Data-mining....

Smart Training on Privacy and Security

Author: Bacik, Sandy

Source: Journal of AHIMA

Publication Date: July 2010


ARRA's modifications to the HIPAA privacy and security rules are setting off a new round of training in facilities large and small. Trainers must fit the new training into existing schedules that already include organizational policies and procedures, HIPAA, and other regulations such as the R....

Smart Training on Privacy and Security (expanded version)

Author: Bacik, Sandy

Source: Journal of AHIMA

Publication Date: April 2010



There is plenty of privacy and security training to be done, and many trainers struggle to get resources from their organizations and attention from their audiences. Sandy Bacik, CISSP, ISSMP, CISM, CGEIT, is a principal consultant at EnerNex and a former chief security officer. Here she o....

Year of the Audit

Author: Dimick, Chris

Source: Journal of AHIMA

Publication Date: March 2010


The healthcare forecast for 2010 includes a strong chance of audit. HIM professionals in many organizations will be busy responding to a shower of external record requests and internal compliance checks.

Stormy systems of audit programs, compliance initiatives, and fraud preventi....

RAC Primer for LTC Facilities

Author: Leonard, Mary Ann

Source: Journal of AHIMA

Publication Date: January 2010



Last year the Centers for Medicare and Medicaid Services (CMS) began rolling out the Recovery Audit Contractor (RAC) program to all 50 states and all providers, including long-term care facilities. HIM professionals working in LTC facilities need to understand the basics of the program in....

CMS’s 2009 Security Assessment Process

Author: Dinh, Angela K.

Source: Journal of AHIMA

Publication Date: September 2009


In 2008 the Centers for Medicare and Medicaid Services (CMS) conducted 10 HIPAA security assessments in covered entities (CEs) nationwide. CMS’s stated purpose was not to identify flaws but to gain a true understanding of industry compliance with the HIPAA security rule.

CMS co....

HIPAA: 43,691 Privacy Complaints and Counting

Author: AHIMA

Source: Journal of AHIMA

Publication Date: June 2009


For those wondering what progress the Office for Civil Rights makes as it works through HIPAA privacy rule complaints, the numbers are easy to find. Each month OCR reports top-line results of the HIPAA cases it has received and resolved.

OCR has logged approximately 43,700 complaints....

Medical Identity Theft and the Red Flags Rule

Author: Apgar, Chris

Source: Journal of AHIMA - website

Publication Date: April 2009


Continuing our Health Information Privacy and Security Week series, today Chris Apgar, CISSP, president of Apgar & Associates LLC, takes a look at medical identity theft within the context of the Red Flags Rule.

Much is reported in the news about identity theft including new cat....

RAC Ready: How to Prepare for the Recovery Audit Contractor Program

Author: Johnson, Kathy M; Bloom, Allison; Morris, Denise; Madamba, Roderick

Source: Journal of AHIMA

Publication Date: February 2009


The Centers for Medicare and Medicaid Services is expected to announce the official start date of the Recovery Audit Contractor program this month, but it is already time for providers to be preparing for a potential audit. Managing a RAC audit effectively and efficiently requires preparing de....

Keeping HIPAA Education Fresh

Author: Dimick, Chris

Source: Journal of AHIMA

Publication Date: January 2009

Get hip with HIPAA.

That’s just one tagline attached to Sharp Healthcare’s HIPAA education modules. Photos from the age of hip—the late 1960s and early 1970s—permeate the online HIPAA training modules. Musicians Jimi Hendrix and Bob Dylan and era-TV icons like the....

CMS Bans Use of Physician Signature Stamps

Author: Bryant, Gloryanne H.

Source: Journal of AHIMA

Publication Date: November 2008


Question: What is the new Centers for Medicare and Medicaid Services ruling on use of signature stamps?

Answer: The Centers for Medicare and Medicaid Services (CMS) has made it clear that it will only accept signatures that are handwritten, electronic, or facsimiles of original wri....

Re-examining HIPAA Six Years Later

Author: Kloss, Linda L

Source: Journal of AHIMA

Publication Date: April 2008


It was six years ago this month that the HIPAA privacy rule went into effect. For many in healthcare, compliance has become a routine part of doing business. But for too many, the current regulations remain poorly understood and poorly implemented. All the while, the environment has been chang....

Emergency Medical Treatment & Labor Act (EMTALA) Resource

Author: U.S. Centers for Medicare & Medicaid Services

Source: Government (U.S.) | External web site

Publication Date: November 01, 2007

In 1986, Congress enacted the Emergency Medical Treatment & Labor Act (EMTALA) to ensure public access to emergency services regardless of ability to pay. Section 1867 of the Social Security Act imposes specific obligations on Medicare-participating hospitals that offer emergency services to provide a medical screening examination (MSE) when a request is made for examination or treatment for an emergency medical condition (EMC), including active labor, regardless of an individual's ability to pay. Hospitals are then required to provide stabilizing treatment for patients with EMCs. If a hospital is unable to stabilize a patient within its capability, or if the patient requests, an appropriate transfer should be implemented.

Linking Anti-fraud and Legal EHR Functions

Author: Dougherty, Michelle

Source: Journal of AHIMA

Publication Date: March 2007


The following statement could easily come from any material written on the legal electronic health record: “EHRs and information available through the NHIN [nationwide health information network] must fully comply with applicable federal and state law and meet the requirements of reliability an....

Brailer to HIM: Continue 'Larger, Louder, and Faster'

Author:

Source: Journal of AHIMA

Publication Date: January 2007


“Do what you are doing larger, louder, and faster,” David Brailer, PhD, MD, told attendees during his general session presentation. Brailer, who served as national coordinator for health information technology in the Department of Health and Human Services from 2004 to 2006, thanked the audienc....

Fraud Management: a $100 Billion Bonus from Health IT?

Author: Kloss, Linda L

Source: Journal of AHIMA

Publication Date: March 2006


The financial losses from healthcare fraud in the US are staggering...and growing. Fraud was estimated to be between 3 and 10 percent of total health expenditures in 2003, or $51 to $170 billion, according to the National Health Care Anti-Fraud Association. Whether an interconnected health IT....

1 [2] 3 4 5