Search Results

= Members only

Current search

472 results.

<< 4 5 6 7 8 9 10 [11] 12 13 14 15 16 17 18 19

Leading the HIPAA Privacy Risk Assessment

Author: Callahan-Dennis, Jill

Source: AHIMA Convention

Publication Date: October 10, 2001

Introduction and Background

As part of their preparations for compliance with the Health Insurance Portability and Accountability Act (HIPAA), healthcare organizations need to compare their current information-handling and information-disclosure practices to the requirement....

Learning the Laws Behind Compliance

Author: Wagg, Dorothy Grandolfi

Source: Journal of AHIMA

Publication Date: May 2000

With Vision 2006, AHIMA's Board of Directors challenged members to expand our knowledge base and professional horizons. One role that several HIM professionals have been asked to fill is compliance officer or manager. Generally, this role has led us down a familiar path—using our....

Legal Pitfalls of HIPAA

Author: Waller, Adele A.

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
Legal Pitfalls of HIPAA
Presented by Adele A. Waller, Bell, Boyd & Lloyd LLC Overview
Business Payoffs Planning for New Technology Needs Contractual Strategies for Compliance Policies and Procedures Integrating HIPAA into Corporate Compliance Progra....

Linking Anti-fraud and Legal EHR Functions

Author: Dougherty, Michelle

Source: Journal of AHIMA

Publication Date: March 2007

The following statement could easily come from any material written on the legal electronic health record: “EHRs and information available through the NHIN [nationwide health information network] must fully comply with applicable federal and state law and meet the requirements of reliability an....

Low-Tech Threats in a High-Tech World

Author: Rollins, Genna

Source: Journal of AHIMA - website

Publication Date: April 2011

Despite the rise of health IT, healthcare providers still face daily privacy and security risks of the mundane variety—paper records are misplaced, improperly disclosed, or released without confidential information redacted. No matter the opportunities and risks that technology bring....

Make Clinical Research Top Priority

Author: Prophet, Sue

Source: Journal of AHIMA

Publication Date: January 2002

Whenever biomedical or behavioral research is conducted and supported by government agencies, it’s critical to comply with federal regulations designed to protect human subjects. For compliance officers, this means understanding and constantly monitoring a number of federal laws, regulati....

Managing Governmental Audits

Author: Wilson, Donna D

Source: AHIMA Convention

Publication Date: September 26, 2010


Congress’ attention is now clearly focused on healthcare reform. With that said, the year of 2010 brought the “much anticipated” Recovery Audit Contractors (RACs) requesting medical records from many of the Medicare Fee for Service providers (complex reviews). Data-mining....

Marketing Privacy: HIPAA's New Sales Pitch

Author: Rhodes, Harry B.

Source: AHIMA Convention

Publication Date: October 10, 2001


Direct marketing is the direct contact between a seller and a consumer. This type of targeted marketing has gained wide popularity as a marketing strategy in the late 20th century because it can be addressed directly. With increasing amounts of specific information avai....

Measuring HIPAA's Impact (HIPAA on the Job)

Author: Fuller, Sandra R.

Source: Journal of AHIMA

Publication Date: February 2001

As children, most of us stood against a door frame while our parents recorded our height and the date on the wall. These marks climbed each year as reminders of the changes we were experiencing. When relatives visited, we proudly showed off our progress to adulthood.


Medical Identity Theft and the Red Flags Rule

Author: Apgar, Chris

Source: Journal of AHIMA - website

Publication Date: April 2009

Continuing our Health Information Privacy and Security Week series, today Chris Apgar, CISSP, president of Apgar & Associates LLC, takes a look at medical identity theft within the context of the Red Flags Rule.

Much is reported in the news about identity theft including new cat....

Medical Necessity under OPPS: a Look at the Challenges

Author: Carter, Darren

Source: Journal of AHIMA

Publication Date: February 2002

The outpatient prospective payment system (OPPS) has dramatically changed claims processing by introducing an automated system. Medical necessity validation has also been automated as a result, leaving hospitals with increased rejections. This article explores how OPPS impacts the medical nece....

Medicare Data Study Spotlights Coding Errors

Author: Cottrell, Carlton

Source: Journal of AHIMA

Publication Date: September 2000

Coding quality for Medicare claims is an area of constant concern. Coding errors can have far-reaching effects in the healthcare universe, and coders are experiencing increased scrutiny from both regulators and hospitals looking to control costs. As a follow-up to results of a Medica....

<< 4 5 6 7 8 9 10 [11] 12 13 14 15 16 17 18 19