Search Results

= Members only

Current search

472 results.

<< 4 5 6 7 8 9 10 11 12 13 [14] 15 16 17 18 19

Cryptography and HIPAA: Breaking the Code

Author: Ruano, Michael

Source: In Confidence (newsletter)

Publication Date: June 02, 2003


Part four in a 10-part series.
This article is the fourth of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. The information security domain of cryptography is probably the most complex and mathematical of all the domai....

Security and HIPAA: Protecting Your Operations

Author: Ruano, Michael

Source: In Confidence (newsletter)

Publication Date: August 02, 2003


Part six in a 10-part series.
This article is the sixth of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. The information security domain of operations security includes the topics of controls, protections, monitoring,....

HITECH Security – A Practical Approach

Author: Rudloff, Rob

Source: AHIMA Convention

Publication Date: September 28, 2010


Background


HITECH has introduced new security requirements around HIPAA including new breach requirements and associated penalties. This paper addresses the information security and privacy requirements and provides practical solutions to address them. Many organizations already....

Teamwork and Compliance Go Hand in Hand

Author: Ruppersburg, Patricia L.

Source: Journal of AHIMA

Publication Date: April 1999



Compliance is an issue that has earned much respect from healthcare professionals. It has become imperative to all HIM professionals to focus on providing the best possible solution for compliance. The ultimate goal: to create a scenario in which compliance supports the existing heal....

Best Practices for Medical Necessity Validation

Author: Scichilone, Rita A

Source: Journal of AHIMA

Publication Date: February 2002


To protect the Medicare Trust Fund from being drained, government health plans must provide coverage restrictions for unnecessary health services in vulnerable patient populations. One restriction mechanism is the provision of edits that look for valid reason-for-visit codes for selected servi....

Guidelines for Cost-effective HIPAA Compliance

Author: Siren, Bill

Source: Brief Encounter

Publication Date: July 02, 2001


Most of us are acutely aware of the events that took place on December 31, 1999, at midnight. There were some who thought that in five seconds, the lights would go off and all computer systems would cease to function. In the healthcare world, concerns were prevalent regarding whether medical e....

On the Line: Professional Practice Solutions

Author: Smith, Cheryl M.

Source: Journal of AHIMA

Publication Date: June 2001



Q: Are there new Joint Commission hospital standards that address patient safety?


Q: What are the Joint Commission definitions of a sentinel event and root cause analysis?


Q: Where can I find information on completion of the medical record statistics form to det....

Mind Your Business Associate Access: Six Steps

Author: Sullivan, Tori E.

Source: Journal of AHIMA

Publication Date: October 2002


It's April 10, 2003, and a privacy officer is reviewing her policies for the imminent privacy regulations, title II of the Health Insurance Portability and Accountability Act (HIPAA) of 1996. The compliance deadline is April 13, 2003, and she is already feeling stressed about meeting the date.....

Compliance Efforts Lead to Process Improvements

Author: Swope, Shana

Source: Journal of AHIMA

Publication Date: June 2000




After Medicare regulations and the accompanying paperwork threatened to overwhelm an outpatient rehabilitation center, staff took steps to simplify the recertification process. The result was improved efficiency plus increased commitment to the electronic medical record. He....

<< 4 5 6 7 8 9 10 11 12 13 [14] 15 16 17 18 19