Search Results

= Members only

Current search

472 results.

1 2 [3] 4 5

Reports: Health IT Can Address Healthcare Fraud

Author:

Source: Journal of AHIMA

Publication Date: January 2006


FORE Reports Announced at Press Conference

National Health Information Technology Coordinator David Brailer, MD, PhD, thanked AHIMA for “a landmark effort” during a press conference highlighting the release of two reports detailing how health information technology can ad....

Practice Toolkit: Medical Record Completion

Author: Hirsch, Ronald

Source: Journal of AHIMA

Publication Date: January 2006


Medical record completion compliance has always been a problem at Sherman Hospital, a medium-sized community hospital in Elgin, IL. The number of incomplete charts often exceeded the standard set by the Joint Commission on Accreditation of Healthcare Organizations, risking a type I violation.....

Privacy Compliance: Maintaining the Gains

Author: Vogt, Nancy

Source: Journal of AHIMA

Publication Date: October 2005


Most HIM professionals would probably agree that the state of information privacy has dramatically improved as a result of all the HIPAA efforts over the past few years. Executive leadership has tuned in, and even boards of directors have addressed information privacy. Awareness is at an all-t....

How to Safely Recycle PCs

Author: Quinsey, Carol Ann

Source: Journal of AHIMA

Publication Date: June 2005


Securing the privacy of both protected health information and personal information should be a primary concern when personal computers have outlived their usefulness. Recycling or disposing of a computer safely can be a challenge.

It’s not enough to simply give an old computer....

HIPAA Security: Don't Disband the Committee Just Yet

Author: Brown, Stephen C.

Source: Journal of AHIMA

Publication Date: May 2005


By now, every healthcare organization has faced the initial security compliance responsibilities associated with HIPAA. However, the compliance road has not yet been fully traveled. The nature of the rule makes compliance a recursive effort of reassessment, continual auditing, regular educatio....

State of HIPAA Privacy and Security Compliance 2005

Author: AHIMA

Source: AHIMA report

Publication Date: April 11, 2005

The results of a survey to assess the current state of HIPAA privacy and security within the healthcare industry.

AHIMA releases the results of this research in conjunction with the second annual National Health Information Privacy and Security Week, April 10-16, 2005. AHIMA is sponsoring National Health Information Privacy and Security Week to raise awareness among healthcare professionals, their employers, the media, and the public regarding the importance of protecting the privacy, confidentiality, and security of personal health information (PHI).

Reaffirming Your HIPAA Compliance Efforts

Author: Woloszyn, William

Source: Journal of AHIMA

Publication Date: April 2005


Two years after the HIPAA privacy compliance date, is it time for your organization to reassess your efforts and recommit to enforcing HIPAA?
Revisiting HIPAA’s Roots

The HIPAA privacy regulation was created in response to public healthcare concerns about the privacy of pa....

Reporting Security Incidents

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: March 2005


HIPAA requires covered entities “implement policies and procedures to address security incidents.” There is one implementation specification: to “identify and respond to suspected or known security incidents; mitigate, to the extent practical, harmful effects of security inci....

HIPAA Audit and System Activity Review: Developing a Process that Focuses on the Greatest Risks First

Author: Hofler, Linda D.; Hardee, Joy; Dildy, Kenneth; Burleson, Deeanna; Grady, Jamie

Source: Journal of AHIMA

Publication Date: March 2005


The privacy and security rules require audits and system activity reviews. Here is one health system's process, a systematic approach that focuses on areas of greatest risk.
Ensuring the privacy and confidentiality of patient information is fundamental to HIM, but it has taken on a new le....

HIPAA: It's Different for Manufacturers

Author: Humphrey, Heather L.

Source: Journal of AHIMA

Publication Date: February 2005


A few years ago, the Y2K crisis refocused the data world. Suddenly medical device manufacturers saw the inherent risks data brought to the business industry. What began with answering a simple question about date functionality quickly moved to conversations about personal information, its appr....

Access Controls: Striking the Right Balance

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: January 2005


As healthcare organizations put the finishing touches on their HIPAA security compliance plans, many are finding that updating access controls is not easy. Clinicians often scoff at the word “control” in general and at “access control” in particular. Not all products ar....

What is Security Auditing?

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: November 2004


The HIPAA security rule includes a requirement for audit controls and to monitor and manage ongoing security for a variety of processes. But the requirement for internal audit was changed to “information security activity review,” and there is no other specific reference to auditin....

HIPAA and Privacy: After the Compliance Date

Author: Mikels, Debbie

Source: AHIMA Convention

Publication Date: October 15, 2004

Abstract

This article reviews successful strategies in preparing for HIPAA Privacy compliance. There are ongoing challenges organizations will face after the compliance date, such as managing research issues, identifying all business associates, and managing the accounting of disclosures....

Trouble with Audit Controls

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: October 2004


The 2004 Phoenix Health System/HIMSS HIPAA compliance survey indicates that providers find audit controls the most difficult of the HIPAA security standards to implement.
While it is recognized that every organization must conduct a risk analysis to determine the systems or activities th....

Kick Starting the Security Risk Analysis

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: July 2004


Many covered entities are just now starting to approach the compliance aspects of the HIPAA security rule. Why discuss “compliance aspects” and not standards or controls, as we did when preparing for the privacy rule? Privacy and security are long-standing concepts to healthcare,....

2004 HIPAA Privacy & Security Compliance Survey

Author: AHIMA

Source: AHIMA

Publication Date: April 12, 2004

The results of a survey conducted by AHIMA to assess the current state of HIPAA privacy within the healthcare industry. These results are being released in conjunction with the first annual National Health Information Privacy and Security Week.

Preparing for the Next Big April

Author: Thomason, Mary

Source: Journal of AHIMA

Publication Date: April 2004


Yesterday’s privacy compliance preparations can contribute to meeting tomorrow’s security mandates. One organization is tackling risk analysis with both matrix and memories.
The 2003 HIPAA privacy rule implementation is still fresh in many minds throughout healthcare organiza....

Security Awareness: The Right Messages

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: April 2004


How many of you have warned your e-mail users about “phishers”—e-mail that appears to come from a trusted source asking the recipient to click on a link to update personal details? But the site is really a fake, and the e-mail is a scam to steal personal information.

Getting 'Hip' to Other Privacy Laws: Part 2

Author: Roth, Julie A.

Source: Journal of AHIMA

Publication Date: March 2004


The HIPAA privacy rule is just one of several federal laws that protect the privacy of non-public information. But privacy is not a new concept in healthcare. Healthcare workers have long protected medical information under a varety of state and federal laws, accreditation standards, and rules....

Proof Is in the Policy

Author: Walsh, Tom

Source: Journal of AHIMA

Publication Date: February 2004


Proving security compliance later requires establishing documentation now. HIM professionals have a valuable role to play.

HIM professionals played central roles in their organization’s privacy efforts, ensuring that appropriate policies, procedures, and documents were in plac....

HIPAA and the EHR: Making Technical Safeguard Changes

Author: Fodor, Joseph

Source: Journal of AHIMA

Publication Date: January 2004


As electronic health records (EHRs) become more commonplace in healthcare, changes, adjustments, and improvements will be inevitable. When designing, implementing, upgrading, or remediating an EHR system, your organization’s implementation team should consider the impact of complying wit....

How an Integrated Delivery System Organized, Approached, and Monitored HIPAA Privacy Compliance: a Case Study

Author: Miller, Judith A.

Source: In Confidence (newsletter)

Publication Date: November 02, 2003


Advocate Health Care is a large, fully integrated not-for-profit healthcare delivery system in metropolitan Chicago. Many months prior to the April 14, 2003, deadline, Advocate began preparing for the HIPAA privacy compliance deadline.When April 14 arrived, Advocate’s associates and physician....

Implementing Electronic Signatures - Retired

Author: AHIMA Task Force

Source: AHIMA practice brief

Publication Date: October 2003

Implementing Electronic Signatures (AHIMA Practice Brief)
Editor's note: The following information supplants information contained in the practice brief "Electronic Signatures (Updated)" published in the October 1998 Journal of AHIMA.
Electronic health records may provide the ability to....

2003 Red Book Reveals Cost-saving Recommendations

Author: Prophet-Bowman, Sue

Source: Journal of AHIMA

Publication Date: September 2003


Although the Department of Health and Human Services (HHS) Office of Inspector General (OIG) has already saved tax payers more than $12 million this year, it offers still more cost-saving recommendations for the Centers for Medicare & Medicaid Services (CMS) in its annual Red Book that hav....

New Tool Streamlines HIPAA Assessment Process

Author: Cohen, Kathleen

Source: In Confidence (newsletter)

Publication Date: August 02, 2003


How are you making sure that your organization is complying with the HIPAA privacy regulations? Many hospitals are doing HIPAA rounds with privacy officers, going from unit to unit to assess and document HIPAA compliance. But trying to make sense of the data collected during HIPAA rounds can....

Security and HIPAA: Protecting Your Operations

Author: Ruano, Michael

Source: In Confidence (newsletter)

Publication Date: August 02, 2003


Part six in a 10-part series.
This article is the sixth of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. The information security domain of operations security includes the topics of controls, protections, monitoring,....

Journal Q&A (7/03)

Author: AHIMA Professional Practice Team

Source: AHIMA Q and A

Publication Date: July 02, 2003

Q: When is a new history and physical (H&P) needed when moving a patient between an acute care bed to a swing bed?

A: The key to determining when an H&P is needed is to find out how the swing bed is being used and the regulations that apply. Section 1883 of the Social Security Ac....

Journal Q&A (7/03)

Author: AHIMA Professional Practice Team

Source: AHIMA Q and A

Publication Date: July 02, 2003

Q: How can I find the Medicare manuals, program memorandums, and the Conditions of Participation on the new CMS Web site?

A: After the Health Care Financing Administration (HCFA) changed its name to CMS, it moved all its resources to its new site at www.cms.gov/manuals.


....

Oral Privacy and HIPAA: We Really Need to Talk

Author: Jacobs, Jodi

Source: In Confidence (newsletter)

Publication Date: June 02, 2003


Oral privacy is not a new need or requirement in healthcare. However, because it is now backed by a federal mandate, it is receiving newfound attention. With the passing of the April 14, 2003, deadline for HIPAA compliance, hospitals, pharmacies, clearinghouses, physician’s offices, military....

Cryptography and HIPAA: Breaking the Code

Author: Ruano, Michael

Source: In Confidence (newsletter)

Publication Date: June 02, 2003


Part four in a 10-part series.
This article is the fourth of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. The information security domain of cryptography is probably the most complex and mathematical of all the domai....

Journal Q&A (5/03)

Author: AHIMA Professional Practice Team

Source: AHIMA Q and A

Publication Date: May 02, 2003


Q: What is an organized health care arrangement (OHCA) and what are its advantages?


A: The privacy rule defines an OHCA as:

a clinically integrated care setting in which individuals typically receive healthcare from more than one healthcare provider

an org....

Catching Up with HIPAA: Managing Noncompliance

Author: Weintraub, Abner E.

Source: Journal of AHIMA

Publication Date: May 2003


With the April 14 HIPAA privacy deadline behind us, many covered entities are still struggling to become compliant. Limited budgets and staff, conflicting advice, and unforeseen delays have all conspired to keep many covered entities from meeting the deadline.


What do you tell....

Observation Services Present Compliance Challenges

Author: Prophet-Bowman, Sue

Source: Journal of AHIMA

Publication Date: March 2003


Observation services have been a top fraud and abuse target of the Office of Inspector General (OIG) of the Department of Health and Human Services, primarily due to the complexity of the Medicare billing regulations and the potential for abuse. New regulations regarding reimbursement for thes....

1 2 [3] 4 5