Search Results

= Members only

Current search

472 results.

<< 4 5 6 7 8 9 10 11 12 13 14 15 [16] 17 18 19

Security and HIPAA: Protecting Your Operations

Author: Ruano, Michael

Source: In Confidence (newsletter)

Publication Date: August 02, 2003


Part six in a 10-part series.
This article is the sixth of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. The information security domain of operations security includes the topics of controls, protections, monitoring,....

Security Awareness: The Right Messages

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: April 2004


How many of you have warned your e-mail users about “phishers”—e-mail that appears to come from a trusted source asking the recipient to click on a link to update personal details? But the site is really a fake, and the e-mail is a scam to steal personal information.

Sentinel Event Procedures Undergo Scrutiny

Author: Fuller, Sandra R.

Source: Journal of AHIMA

Publication Date: February 1998


Substantial changes were made to the Joint Commission on Accreditation of Healthcare Organizations' Sentinel Event Procedures at the November 1997 Board of Commissioners meeting. With an implementation date scheduled for April 1, 1998, all Joint Commission accredited healthcare organiz....

Smart Training on Privacy and Security

Author: Bacik, Sandy

Source: Journal of AHIMA

Publication Date: July 2010


ARRA's modifications to the HIPAA privacy and security rules are setting off a new round of training in facilities large and small. Trainers must fit the new training into existing schedules that already include organizational policies and procedures, HIPAA, and other regulations such as the R....

Smart Training on Privacy and Security (expanded version)

Author: Bacik, Sandy

Source: Journal of AHIMA

Publication Date: April 2010



There is plenty of privacy and security training to be done, and many trainers struggle to get resources from their organizations and attention from their audiences. Sandy Bacik, CISSP, ISSMP, CISM, CGEIT, is a principal consultant at EnerNex and a former chief security officer. Here she o....

"SNIP"ping Away at HIPAA

Author: Bettendorf, Jim

Source: In Confidence (newsletter)

Publication Date: November 02, 2001


Consider this a resource guide from a fellow privacy official trying to make sense of it all. I am of course referring to the Health Insurance Portability and Accountability Act of 1996 (HIPAA). By now, we are all familiar with HIPAA’s content, but not quite sure what path to take when it com....

State of HIPAA Privacy and Security Compliance 2005

Author: AHIMA

Source: AHIMA report

Publication Date: April 11, 2005

The results of a survey to assess the current state of HIPAA privacy and security within the healthcare industry.

AHIMA releases the results of this research in conjunction with the second annual National Health Information Privacy and Security Week, April 10-16, 2005. AHIMA is sponsoring National Health Information Privacy and Security Week to raise awareness among healthcare professionals, their employers, the media, and the public regarding the importance of protecting the privacy, confidentiality, and security of personal health information (PHI).

<< 4 5 6 7 8 9 10 11 12 13 14 15 [16] 17 18 19