Search Results

= Members only

Current search

472 results.

<< 4 5 6 7 8 9 10 11 12 13 14 15 [16] 17 18 19

Kick Starting the Security Risk Analysis

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: July 2004


Many covered entities are just now starting to approach the compliance aspects of the HIPAA security rule. Why discuss “compliance aspects” and not standards or controls, as we did when preparing for the privacy rule? Privacy and security are long-standing concepts to healthcare,....

What is Security Auditing?

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: November 2004


The HIPAA security rule includes a requirement for audit controls and to monitor and manage ongoing security for a variety of processes. But the requirement for internal audit was changed to “information security activity review,” and there is no other specific reference to auditin....

Trouble with Audit Controls

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: October 2004


The 2004 Phoenix Health System/HIMSS HIPAA compliance survey indicates that providers find audit controls the most difficult of the HIPAA security standards to implement.
While it is recognized that every organization must conduct a risk analysis to determine the systems or activities th....

Access Controls: Striking the Right Balance

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: January 2005


As healthcare organizations put the finishing touches on their HIPAA security compliance plans, many are finding that updating access controls is not easy. Clinicians often scoff at the word “control” in general and at “access control” in particular. Not all products ar....

Reporting Security Incidents

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: March 2005


HIPAA requires covered entities “implement policies and procedures to address security incidents.” There is one implementation specification: to “identify and respond to suspected or known security incidents; mitigate, to the extent practical, harmful effects of security inci....

Security Awareness: The Right Messages

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: April 2004


How many of you have warned your e-mail users about “phishers”—e-mail that appears to come from a trusted source asking the recipient to click on a link to update personal details? But the site is really a fake, and the e-mail is a scam to steal personal information.

Fundamentals for the Newly Initiated

Author: Amatayakul, Margret

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
Fundamentals for the Newly Initiated
Margret Amatayakul, Margret\A Consulting, LLC Session Objectives
Get an overview of the original legislation, processes, and timelines Examine the scope and impact of the new regulations Review ongoing HIPAA impl....

Implementing Electronic Signatures - Retired

Author: AHIMA Task Force

Source: AHIMA practice brief

Publication Date: October 2003

Implementing Electronic Signatures (AHIMA Practice Brief)
Editor's note: The following information supplants information contained in the practice brief "Electronic Signatures (Updated)" published in the October 1998 Journal of AHIMA.
Electronic health records may provide the ability to....

Journal Q&A (5/01)

Author: AHIMA Staff

Source: AHIMA Q and A

Publication Date: May 02, 2001

Q: Does the new HIPAA privacy rule require hospitals to obtain patient consent prior to sending copies of dictated reports and test results to the patient's physician?

A: Unless the HIPAA privacy rule published on December 28, 2000 (45 CFR Parts 160 through 164) is modified by the Bush ad....

<< 4 5 6 7 8 9 10 11 12 13 14 15 [16] 17 18 19