Search Results

= Members only

Current search

472 results.

<< 4 5 6 7 8 9 10 11 12 [13] 14 15 16 17 18 19

Evaluation of PHI Hunter in Natural Language Processing Research

Author: Redd, Andrew; Pickard, Steve; Meystre, Stephane; Scehnet, Jeffrey; Bolton, Dan; Heavirland, Julia; Weaver, Allison Lynn ; Hope, Carol; Garvin, Jennifer Hornung

Source: Perspectives in Health Information Management

Publication Date: January 2015


Abstract


Objectives: We introduce and evaluate a new, easily accessible tool using a common statistical analysis and business analytics software suite, SAS, which can be programmed to remove specific protected health information (PHI) from a text document. Removal of PHI is import....

High Cost of Privacy

Author: Rhodes, Harry B.

Source: In Confidence (newsletter)

Publication Date: January 02, 2001


Cost: how much money needs to be invested? By now, most of us have discussed the implementation of the Health Insurance Portability and Accountability Act (HIPAA) final rules with our administrators, and naturally the question has been raised, “Just how much is this going to cost me?”Most lik....

Marketing Privacy: HIPAA's New Sales Pitch

Author: Rhodes, Harry B.

Source: AHIMA Convention

Publication Date: October 10, 2001



Background

Direct marketing is the direct contact between a seller and a consumer. This type of targeted marketing has gained wide popularity as a marketing strategy in the late 20th century because it can be addressed directly. With increasing amounts of specific information avai....

Transactions Delay Prompts Concern Among Covered Entities

Author: Rode, Dan

Source: Journal of AHIMA

Publication Date: March 2002


AHIMA recently attended a meeting of healthcare providers, payers, and staff representatives of the National Committee on Vital and Health Statistics (NCVHS) and the Centers for Medicare and Medicaid Services (CMS). Organized by the Association for Electronic Health Care Transactions, the meet....

Low-Tech Threats in a High-Tech World

Author: Rollins, Genna

Source: Journal of AHIMA - website

Publication Date: April 2011



Despite the rise of health IT, healthcare providers still face daily privacy and security risks of the mundane variety—paper records are misplaced, improperly disclosed, or released without confidential information redacted. No matter the opportunities and risks that technology bring....

What to Expect When Phase 2 HIPAA Audits Begin

Author: Rose, Angela Dinh

Source: Journal of AHIMA

Publication Date: June 2016



The HITECH Omnibus Rule mandated that the US Department of Health and Human Services (HHS) conduct periodic audits on the privacy and security compliance of covered entities and business associates. It was during the Office for Civil Rights (OCR) update session on March 21, 2016 at the 20....

HITECH Frequently Asked Privacy, Security Questions: Part 3

Author: Rose, Angela Dinh; Greene, Adam H

Source: Journal of AHIMA | AHIMA Q and A

Publication Date: March 2014

This article concludes a three-part series discussing the most commonly asked questions regarding compliance requirements surrounding the final HITECH Omnibus Rule, released in January 2013. It highlights the updated requirements and provides answers to questions regarding decedent protected health information (PHI), the release of immunization records to schools, and the enhanced request for restrictions requirements.

Getting 'Hip' to Other Privacy Laws: Part 2

Author: Roth, Julie A.

Source: Journal of AHIMA

Publication Date: March 2004


The HIPAA privacy rule is just one of several federal laws that protect the privacy of non-public information. But privacy is not a new concept in healthcare. Healthcare workers have long protected medical information under a varety of state and federal laws, accreditation standards, and rules....

<< 4 5 6 7 8 9 10 11 12 [13] 14 15 16 17 18 19