Search Results

= Members only

Current search

472 results.

[1] 2 3 4 5

Year of the Audit

Author: Dimick, Chris

Source: Journal of AHIMA

Publication Date: March 2010


The healthcare forecast for 2010 includes a strong chance of audit. HIM professionals in many organizations will be busy responding to a shower of external record requests and internal compliance checks.

Stormy systems of audit programs, compliance initiatives, and fraud preventi....

Work Plan Fiscal Year 2015

Author: U.S. Department of Health and Human Services. Office of the Inspector General

Source: Government (U.S.)

Publication Date: October 2014

This report forecasts areas of OIG focus based on the results of OIG’s risk assessments and have been identified as significant management and performance challenges facing HHS. In FY 2015 and beyond, we will continue to focus on emerging payment, eligibility, management, and IT systems security vulnerabilities in health care reform programs, such as the health insurance marketplaces.

Word is Collaboration: How HIM, Revenue: Cycle, and Compliance Team Up for Success

Author: McDavid, Jan P; Truscott, Tricia; Crump, Dawn; Brocato, Lori

Source: AHIMA Convention

Publication Date: October 02, 2011

Background:

The need for HIM, Compliance and Revenue Cycle Management to work together is more important than ever. New initiatives, regulations and more stringent compliance demands are crossing the lines of various departments throughout the healthcare continuum. Departments which may....

What to Expect When Phase 2 HIPAA Audits Begin

Author: Rose, Angela Dinh

Source: Journal of AHIMA

Publication Date: June 2016



The HITECH Omnibus Rule mandated that the US Department of Health and Human Services (HHS) conduct periodic audits on the privacy and security compliance of covered entities and business associates. It was during the Office for Civil Rights (OCR) update session on March 21, 2016 at the 20....

What's Next?

Author: Braithwaite, Bill

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
What's Next?
Presented by Bill Braithwaite, MD, PhD, FACMI, Senior Advisor on Health Information Policy, US Dept. Of HSS Hospital Systems Affected
Laboratory Pharmacy Radiology Registration (ADT) Orders Results Data Warehouse Management Master Perso....

What Lies Ahead in 2016?

Author: Hedges, Ron

Source: AHIMA blog post | Journal of AHIMA - website

Publication Date: December 18, 2015





This is the last Legal e-Speaking post of 2015. I thought I would use it to predict what 2016 might bring in litigation and beyond. When looking ahead to the next year, there are many possible things that HIM professionals should keep an eye out for, but five stand out to m....

What is Security Auditing?

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: November 2004


The HIPAA security rule includes a requirement for audit controls and to monitor and manage ongoing security for a variety of processes. But the requirement for internal audit was changed to “information security activity review,” and there is no other specific reference to auditin....

Understanding the Privacy Rule's Amendments

Author: Hughes, Gwen

Source: Journal of AHIMA

Publication Date: November 2002


By now you know that amendments to the final privacy rule were published in the August 14, 2002, Federal Register. The amendments are intended to correct problems identified in the original privacy rule published on December 28, 2000.


This article presents a summary of some of....

Trouble with Audit Controls

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: October 2004


The 2004 Phoenix Health System/HIMSS HIPAA compliance survey indicates that providers find audit controls the most difficult of the HIPAA security standards to implement.
While it is recognized that every organization must conduct a risk analysis to determine the systems or activities th....

Transactions Delay Prompts Concern Among Covered Entities

Author: Rode, Dan

Source: Journal of AHIMA

Publication Date: March 2002


AHIMA recently attended a meeting of healthcare providers, payers, and staff representatives of the National Committee on Vital and Health Statistics (NCVHS) and the Centers for Medicare and Medicaid Services (CMS). Organized by the Association for Electronic Health Care Transactions, the meet....

Top RAC Target Areas

Author: AHIMA

Source: Journal of AHIMA

Publication Date: July 2012


If you bill fee-for-service programs, your claims will be subject to review by the Recovery Audit Contractor Program (RAC). That was the promise made by the Centers for Medicare and Medicaid Services when it expanded its once-experimental program to all 50 states in 2010. The RAC's mission....

The New Privacy Officer

Author: Dimick, Chris

Source: Journal of AHIMA

Publication Date: April 2012



It has been a decade since the first privacy officers took their jobs in response to the HIPAA privacy rule. A slew of changes since then have added more responsibility, required more skills, and demanded more time of them than anyone could have imagined.

When Nancy Davis, R....

Teamwork and Compliance Go Hand in Hand

Author: Ruppersburg, Patricia L.

Source: Journal of AHIMA

Publication Date: April 1999



Compliance is an issue that has earned much respect from healthcare professionals. It has become imperative to all HIM professionals to focus on providing the best possible solution for compliance. The ultimate goal: to create a scenario in which compliance supports the existing heal....

Teaching Physician Guidelines

Author: Graff, Jean Stevens

Source: Brief Encounter

Publication Date: September 02, 2001


Working in an orthopedic clinic, I understand the great need for my newly created position. I am employed at a teaching hospital as a medical record auditor charged with the task of educating physicians on the art of coding and documentation. My job is to ensure compliance with the Medicare ma....

State of HIPAA Privacy and Security Compliance 2005

Author: AHIMA

Source: AHIMA report

Publication Date: April 11, 2005

The results of a survey to assess the current state of HIPAA privacy and security within the healthcare industry.

AHIMA releases the results of this research in conjunction with the second annual National Health Information Privacy and Security Week, April 10-16, 2005. AHIMA is sponsoring National Health Information Privacy and Security Week to raise awareness among healthcare professionals, their employers, the media, and the public regarding the importance of protecting the privacy, confidentiality, and security of personal health information (PHI).

"SNIP"ping Away at HIPAA

Author: Bettendorf, Jim

Source: In Confidence (newsletter)

Publication Date: November 02, 2001


Consider this a resource guide from a fellow privacy official trying to make sense of it all. I am of course referring to the Health Insurance Portability and Accountability Act of 1996 (HIPAA). By now, we are all familiar with HIPAA’s content, but not quite sure what path to take when it com....

Smart Training on Privacy and Security (expanded version)

Author: Bacik, Sandy

Source: Journal of AHIMA

Publication Date: April 2010



There is plenty of privacy and security training to be done, and many trainers struggle to get resources from their organizations and attention from their audiences. Sandy Bacik, CISSP, ISSMP, CISM, CGEIT, is a principal consultant at EnerNex and a former chief security officer. Here she o....

Smart Training on Privacy and Security

Author: Bacik, Sandy

Source: Journal of AHIMA

Publication Date: July 2010


ARRA's modifications to the HIPAA privacy and security rules are setting off a new round of training in facilities large and small. Trainers must fit the new training into existing schedules that already include organizational policies and procedures, HIPAA, and other regulations such as the R....

Sentinel Event Procedures Undergo Scrutiny

Author: Fuller, Sandra R.

Source: Journal of AHIMA

Publication Date: February 1998


Substantial changes were made to the Joint Commission on Accreditation of Healthcare Organizations' Sentinel Event Procedures at the November 1997 Board of Commissioners meeting. With an implementation date scheduled for April 1, 1998, all Joint Commission accredited healthcare organiz....

Security Awareness: The Right Messages

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: April 2004


How many of you have warned your e-mail users about “phishers”—e-mail that appears to come from a trusted source asking the recipient to click on a link to update personal details? But the site is really a fake, and the e-mail is a scam to steal personal information.

Security and HIPAA: Protecting Your Operations

Author: Ruano, Michael

Source: In Confidence (newsletter)

Publication Date: August 02, 2003


Part six in a 10-part series.
This article is the sixth of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. The information security domain of operations security includes the topics of controls, protections, monitoring,....

Reports: Health IT Can Address Healthcare Fraud

Author:

Source: Journal of AHIMA

Publication Date: January 2006


FORE Reports Announced at Press Conference

National Health Information Technology Coordinator David Brailer, MD, PhD, thanked AHIMA for “a landmark effort” during a press conference highlighting the release of two reports detailing how health information technology can ad....

[1] 2 3 4 5