472 results.
[1] 2 3 4 5
You've Been Served: What Might Happen When Responding to a Subpoena
Author: Hedges, Ron
Source: AHIMA blog post | Journal of AHIMA - website
Publication Date: March 12, 2015
Legal consequences flow from the use or abuse of EHR. This monthly column presents examples of what those consequences can be.
Healthcare providers receive and respond to subpoenas on a regular basis. Providers routinely produce personal health information (PHI) when doing so....
Year of the Audit
Author: Dimick, Chris
Source: Journal of AHIMA
Publication Date: March 2010
The healthcare forecast for 2010 includes a strong chance of audit. HIM professionals in many organizations will be busy responding to a shower of external record requests and internal compliance checks.
Stormy systems of audit programs, compliance initiatives, and fraud preventi....
Work Plan Fiscal Year 2015
Author: U.S. Department of Health and Human Services. Office of the Inspector General
Source: Government (U.S.)
Publication Date: October 2014
This report forecasts areas of OIG focus based on the results of OIG’s risk assessments and have been identified as significant management and performance challenges facing HHS. In FY 2015 and beyond, we will continue to focus on emerging payment, eligibility, management, and IT systems security vulnerabilities in health care reform programs, such as the health insurance marketplaces.
Work Plan Fiscal Year 2013
Author: U.S. Department of Health and Human Services. Office of the Inspector General
Source: Government (U.S.)
Publication Date: October 03, 2012
The work plan addresses ongoing and proposed work for the major operating divisions of HHS: CMS; the public health agencies: AHRQ, CDC, FDA, HRSA, IHS, NIH, SAMHSA; the Administration for Children & Families and the Administration on Aging.
Work Plan Fiscal Year 2012
Author: U.S. Department of Health and Human Services. Office of the Inspector General
Source: Government (U.S.)
Publication Date: October 03, 2011
Work Plan Fiscal Year 2011
Author: U.S. Department of Health and Human Services. Office of the Inspector General
Source: Government (U.S.)
Publication Date: October 03, 2010
Work Plan Fiscal Year 2010
Author: U.S. Department of Health and Human Services. Office of the Inspector General
Source: Government (U.S.)
Publication Date: October 03, 2009
Work Plan Fiscal Year 2009
Author: U.S. Department of Health and Human Services. Office of the Inspector General
Source: Government (U.S.)
Publication Date: October 03, 2008
Work Plan Fiscal Year 2008
Author: U.S. Department of Health and Human Services. Office of the Inspector General
Source: Government (U.S.)
Publication Date: October 03, 2007
Work Plan Fiscal Year 2007
Author: U.S. Department of Health and Human Services. Office of the Inspector General
Source: Government (U.S.)
Publication Date: October 12, 2006
Work Plan Fiscal Year 2006
Author: U.S. Department of Health and Human Services. Office of the Inspector General
Source: Government (U.S.)
Publication Date: October 03, 2005
Work Plan Fiscal Year 2005
Author: U.S. Department of Health and Human Services. Office of the Inspector General
Source: Government (U.S.)
Publication Date: October 12, 2004
Work Plan Fiscal Year 2004
Author: U.S. Department of Health and Human Services. Office of the Inspector General
Source: Government (U.S.)
Publication Date: October 12, 2003
Work Plan Fiscal Year 2003
Author: U.S. Department of Health and Human Services. Office of the Inspector General
Source: Government (U.S.)
Publication Date: October 12, 2002
Work Plan Fiscal Year 2002
Author: U.S. Department of Health and Human Services. Office of the Inspector General
Source: Government (U.S.)
Publication Date: October 12, 2001
Work Plan Fiscal Year 2001
Author: U.S. Department of Health and Human Services. Office of the Inspector General
Source: Government (U.S.)
Publication Date: October 12, 2000
Word is Collaboration: How HIM, Revenue: Cycle, and Compliance Team Up for Success
Author: McDavid, Jan P; Truscott, Tricia; Crump, Dawn; Brocato, Lori
Source: AHIMA Convention
Publication Date: October 02, 2011
Background:
The need for HIM, Compliance and Revenue Cycle Management to work together is more important than ever. New initiatives, regulations and more stringent compliance demands are crossing the lines of various departments throughout the healthcare continuum. Departments which may....
When Should a Notice of Privacy Practices be Provided?
Author: Dougherty, Michelle
Source: In Confidence (newsletter) | AHIMA Q and A
Publication Date: February 02, 2003
Question: I am a long-term care (LTC) consultant. An attorney for a facility I contract with stated the organization does not have to provide a notice of privacy practices to the residents in the facility on April 14, 2003, when the privacy rule becomes effective. Only newly admitted resident....
What Were They Thinking? Film Crew in ER Brings Lawsuit to Hospital
Author: Hedges, Ron
Source: AHIMA blog post | Journal of AHIMA - website
Publication Date: June 2016
As this blog is about legal consequences, I try to provide current examples of what those consequences might be using a specific set of facts. This month’s example comes from the filming of a documentary television series in New York and Presbyterian Hospital (NYP), one which left me with....
What to Expect When Phase 2 HIPAA Audits Begin
Author: Rose, Angela Dinh
Source: Journal of AHIMA
Publication Date: June 2016
The HITECH Omnibus Rule mandated that the US Department of Health and Human Services (HHS) conduct periodic audits on the privacy and security compliance of covered entities and business associates. It was during the Office for Civil Rights (OCR) update session on March 21, 2016 at the 20....
What's Next?
Author: Braithwaite, Bill
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
2000 HIPAA Conference Presentation
What's Next?
Presented by Bill Braithwaite, MD, PhD, FACMI, Senior Advisor on Health Information Policy, US Dept. Of HSS Hospital Systems Affected
Laboratory Pharmacy Radiology Registration (ADT) Orders Results Data Warehouse Management Master Perso....
What Lies Ahead in 2016?
Author: Hedges, Ron
Source: AHIMA blog post | Journal of AHIMA - website
Publication Date: December 18, 2015
This is the last Legal e-Speaking post of 2015. I thought I would use it to predict what 2016 might bring in litigation and beyond. When looking ahead to the next year, there are many possible things that HIM professionals should keep an eye out for, but five stand out to m....
What is Security Auditing?
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: November 2004
The HIPAA security rule includes a requirement for audit controls and to monitor and manage ongoing security for a variety of processes. But the requirement for internal audit was changed to “information security activity review,” and there is no other specific reference to auditin....
What Happened to PEPP?: QIOs Plan for Hospital Payment Monitoring Program
Author: Estrella, Renato
Source: Journal of AHIMA
Publication Date: July 2003
Efforts to boost the quality of care provided to Medicare patients arent new, but CMS latest plan will require additional efforts from hospitals. Learn more about the Hospital Payment Monitoring Program and how Quality Improvement Organizations are here to help.
Wondering wh....
What Does the NLRB Have to Do with Healthcare Providers?
Author: Hedges, Ron
Source: AHIMA blog post | Journal of AHIMA - website
Publication Date: November 16, 2016
As a presenter at this year’s AHIMA Annual Convention and Exhibit, I covered many topics. While I plan to post about others in subsequent posts, this month I want to discuss a subject that many healthcare providers and their staff members might find unfamiliar: the National Labor Rela....
Web-based HIPAA Tools Offer Concrete Solutions to Common Problems
Author: Niles, Dirk F.
Source: In Confidence (newsletter)
Publication Date: February 02, 2003
How many times have you wished for a tool that would make HIPAA easier to manage? What if locating the right regulations was as simple as answering a few questions and receiving a compliance plan? New Web-based services offer users a whole new range of options that can take the mystery out of....
Walking the Tightrope—Coding Compliance in the Electronic Age
Author: Williams, Vickie J.
Source: AHIMA Convention
Publication Date: October 17, 2008
Introduction
For at least the last ten years, the federal government and private whistleblowers have viewed improper diagnostic coding as fertile ground for major investigations and prosecutions of healthcare providers. Prosecutors use the civil False Claims Act, the Civil Money Penalties....
Verbal/Telephone Order Authentication and Time Frames (2012 update)
Author: AHIMA
Source: AHIMA practice brief
Publication Date: August 2012
Editor’s note: This update replaces the June 2010 practice brief “Verbal/Telephone Order Authentication and Time Frames.”
It is important for a healthcare facility to review and understand all applicable federal and state laws and accreditation standards when de....
Verbal/Telephone Order Authentication and Time Frames (2010 update)
Author: AHIMA
Source: AHIMA practice brief
Publication Date: June 2010
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
Verbal/Telephone Order Authentication and Time Frames (2001)
Author: Dougherty, Michelle
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: February 2001
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
Value of HIM in Privacy and Security Compliance
Author: Amatayakul, Margret; Work, Mitch
Source: Journal of AHIMA
Publication Date: May 2007
Survey results illustrate HIM participation in compliance efforts and offer a look at common program components
HIM professionals have long been at the forefront of ensuring the privacy and confidentiality of health information. With the introduction of the HIPAA privacy and security rul....
Using Network Audits to Monitor Privacy and Security
Author: Shanley, Suzanne
Source: In Confidence (newsletter)
Publication Date: May 02, 2003
Under the security rule, covered entities must ensure that some process is put in place to record and review system access and activity. Audit controls are required to record any alterations to confidential patient information, including changes to content and the addition or deletion of info....
Using Data to Survive RAC Attacks: Analyzing Audit Data Helps Mitigate Future RAC Risk
Author: Crump, Dawn
Source: Journal of AHIMA
Publication Date: January 2014
Medicare's Recovery Audit Contractor (RAC) program began as a three-year, three-state pilot program in 2005 and went nationwide in 2009. The American Hospital Association (AHA) began tracking data collection in January 2010 and since then, according to AHA, the RAC program has recouped $2.....
United under HIPAA: a Comparison of Arrangements and Agreements (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: September 2002
The HIPAA transactions, security, and privacy regulations identify five agreements and relationships that can be established between healthcare entities to achieve economies of scale and lessen HIPAA's administrative burden. They are: affiliated covered entity (ACE)
business associa....
Understanding the Privacy Rule's Amendments
Author: Hughes, Gwen
Source: Journal of AHIMA
Publication Date: November 2002
By now you know that amendments to the final privacy rule were published in the August 14, 2002, Federal Register. The amendments are intended to correct problems identified in the original privacy rule published on December 28, 2000.
This article presents a summary of some of....
Understanding Telecommunications, Network Security, and HIPAA
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: May 02, 2003
Part three in a 10-part series.
This article is the third of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. The third information security domain of telecommunications and network security is the largest and most compl....
Understanding Release of Information in Long-Term Care Facilities
Author: Marsh, Carmilla
Source: Journal of AHIMA
Publication Date: February 2002
Release of information is a perennial challenge for HIM professionals in all care settings. However, long-term care offers some special challenges, especially in the light of the HIPAA privacy rule published in December 2000 (with a compliance date of April 2003). This article reviews the basi....
Understanding HIPAA Privacy Compliance Investigations
Author: Hjort, Beth M.
Source: In Confidence (newsletter)
Publication Date: June 02, 2003
Question: Under what circumstances would our organization be investigated for HIPAA privacy compliance?
Answer: The complaint investigation process will be complaint driven. The Department of Health and Human Services’ Office for Civil Rights (OCR), the enforcement body for the privacy....
Understanding HIPAA Enforcement: Trust, but Verify
Author: Apple, Gordon J.
Source: In Confidence (newsletter)
Publication Date: June 02, 2003
Former President Ronald Reagan coined a phrase during the Cold War, “trust, but verify,” regarding treaties with the former Soviet Union. Today, as we ponder the enforcement environment likely to emerge over HIPAA, a more apt phrase may be “trust, don’t do much, and react to public pressure.”....
Understanding Governmental Audits (2013 update)
Author: Rihanek, Theresa; Lopez, Doreen
Source: AHIMA practice brief
Publication Date: November 2013
This practice brief supersedes the July 2011 practice brief "Understanding Governmental Audits."
Today, armed with enhanced fraud and abuse laws, the federal government has launched new audits that organizations and providers must contend with on a regular basis. Recent additions....
Understanding Governmental Audits
Author: AHIMA
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: July 2011
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
Uncovering the Relationship between IRBs and the HIPAA Privacy Rule
Author: Gilles, Kathy
Source: Journal of AHIMA
Publication Date: November 2004
More than 18 months after the HIPAA privacy rule compliance date, there is still one area that remains problematic for many covered entities—the use and disclosure of protected health information (PHI) for research purposes. One point of significant confusion is the relationship between....
Two Challenges for Here and Now: Grappling with RAC and POA Requirements
Author: Rode, Dan
Source: Journal of AHIMA
Publication Date: March 2008
This column often deals with AHIMA’s or the profession’s larger goals and objectives. Important, yes, but often not what HIM professionals are involved with on a day-to-day basis. This article addresses two significant issues that HIM professionals are facing on the job right now.....
Trouble with Audit Controls
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: October 2004
The 2004 Phoenix Health System/HIMSS HIPAA compliance survey indicates that providers find audit controls the most difficult of the HIPAA security standards to implement.
While it is recognized that every organization must conduct a risk analysis to determine the systems or activities th....
Transitioning to a Principle Based Privacy Compliance
Author: Williams, Jutta; Thomason, Mary
Source: AHIMA Convention
Publication Date: October 02, 2011
Balancing the protection of individual privacy and the need to use data to provide quality healthcare is no easy task for healthcare workers – or for regulators. Not surprisingly, regulatory requirements for governing the use of health information are complex and have required revision.....
Transactions Delay Prompts Concern Among Covered Entities
Author: Rode, Dan
Source: Journal of AHIMA
Publication Date: March 2002
AHIMA recently attended a meeting of healthcare providers, payers, and staff representatives of the National Committee on Vital and Health Statistics (NCVHS) and the Centers for Medicare and Medicaid Services (CMS). Organized by the Association for Electronic Health Care Transactions, the meet....
Tough Compliance Questions to Ask Your Business Associates
Author: Klasa, Marge
Source: AHIMA Convention
Publication Date: October 21, 2005
Introduction
Maintaining the privacy and security of patient health information (PHI) is not only best practice, it is a HIPAA mandate for all Covered Entities (CE).1 But how does the CE know if its Business Associates (BA) and vendors agree to protect and secure patients’ PH....
Top RAC Target Areas
Author: AHIMA
Source: Journal of AHIMA
Publication Date: July 2012
If you bill fee-for-service programs, your claims will be subject to review by the Recovery Audit Contractor Program (RAC). That was the promise made by the Centers for Medicare and Medicaid Services when it expanded its once-experimental program to all 50 states in 2010. The RAC's mission....
Top HITECH-HIPAA Compliance Obstacles Emerge: Analyzing lessons learned from six months of Omnibus Privacy Rule implementation efforts
Author: Butler, Mary
Source: Journal of AHIMA
Publication Date: April 2014
Have a spare 32.8 million hours? The US Department of Health and Human Services (HHS) sure hopes so.
As noted in the Federal Register, that figure is the total number of hours the HHS Office for Civil Rights (OCR) estimated it would take all HIPAA-covered entities combined....
The State of HIPAA Privacy and Security Compliance, 2006
Author: AHIMA
Source: AHIMA report
Publication Date: April 19, 2006
This third annual survey looks at how well the industry is maintaining HIPAA privacy and security compliance as a part of the normal course of business as it moves further away from the implementation deadlines.
The Privacy Mindset: Setting Better Boundaries with Third-Party Record Reviewers
Author: Derlink, Amy L; Schembari, Elaine
Source: Journal of AHIMA
Publication Date: March 2012
Responding to an audit can be hectic and stressful, but HIM professionals must remember to hold external record reviewers accountable to good privacy and security practices.
When you visit the hair salon, take an exercise class, or sit across from a financial planner, you expect them....
The Omnibus Arrives: OCR Issues HITECH-HIPAA Final Privacy Rule
Author: Rode, Dan
Source: Journal of AHIMA
Publication Date: April 2013
The Office for Civil Rights (OCR) has published the long-awaited final omnibus rules covering many HITECH Act requirements in the January 25, 2013 Federal Register (78FR5566). The rule is officially titled “Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notific....
The New Privacy Officer
Author: Dimick, Chris
Source: Journal of AHIMA
Publication Date: April 2012
It has been a decade since the first privacy officers took their jobs in response to the HIPAA privacy rule. A slew of changes since then have added more responsibility, required more skills, and demanded more time of them than anyone could have imagined.
When Nancy Davis, R....
Teeth for HIPAA in 2008? CMS Announces Plans for Security “Assessments”
Author: Dinh, Angela K.
Source: Journal of AHIMA
Publication Date: March 2008
Although the HIPAA security rule went into effect in April 2005, the first security audit of a facility’s compliance with the HIPAA security rule did not take place until just last year. That audit was heard around the country, awakening every network, firewall, and security plan in exis....
Teamwork and Compliance Go Hand in Hand
Author: Ruppersburg, Patricia L.
Source: Journal of AHIMA
Publication Date: April 1999
Compliance is an issue that has earned much respect from healthcare professionals. It has become imperative to all HIM professionals to focus on providing the best possible solution for compliance. The ultimate goal: to create a scenario in which compliance supports the existing heal....
Teaching Physician Guidelines
Author: Graff, Jean Stevens
Source: Brief Encounter
Publication Date: September 02, 2001
Working in an orthopedic clinic, I understand the great need for my newly created position. I am employed at a teaching hospital as a medical record auditor charged with the task of educating physicians on the art of coding and documentation. My job is to ensure compliance with the Medicare ma....
Tackling the Training Mandate: How to Get Your Work Force Privacy Training Under Control and Under Way
Author: Nutten, Sandra
Source: Journal of AHIMA
Publication Date: February 2003
One of the privacy rules biggest tasks is work force training. In this article, we offer helpful tips for getting started and staying on track.
Training your work force on the HIPAA privacy rule isnt only federal lawits the foundation on which the entire orga....
Synching up Privacy and Security
Author:
Source: AHIMA Today
Publication Date: October 13, 2008
Review of the October 2008 Privacy and Security Institute held in conjunction with AHIMA's Convention.
Surviving a CMS Security Investigation: Oregon Facility Shares an Early Look at the Process
Author: Hofman, Judi
Source: Journal of AHIMA
Publication Date: February 2009
Hospitals and other healthcare organizations are expecting greater scrutiny of their HIPAA compliance programs in 2009. Last year the Centers for Medicare and Medicaid Services (CMS) announced plans to ramp up its HIPAA enforcement efforts even before an Office of Inspector General report chid....
Survey Procedures and Interpretive Guidelines for Laboratories and Laboratory Services
Author: U.S. Centers for Medicare & Medicaid Services
Source: Government (U.S.)
Publication Date: October 06, 2015
State Operations Manual Appendix C
Survey Procedures and Interpretive Guidelines for Intermediate Care Facilities for Persons with Mental Retardation
Author: U.S. Centers for Medicare & Medicaid Services
Source: Government (U.S.)
Publication Date: November 02, 1995
PART 1
I. Introduction II. Principal Focus of Surveys III. Survey Process IV. Components of Active Treatment V. Task 1 - Sample Selection VI.
Survey Procedures and Interpretive Guidelines for Intermediate Care Facilities for Persons with Mental Retardation
Author: U.S. Centers for Medicare & Medicaid Services
Source: Government (U.S.)
Publication Date: November 02, 1995
Survey Procedures and Interpretive Guidelines for Hospices
Author: U.S. Centers for Medicare & Medicaid Services
Source: Government (U.S.)
Publication Date: December 02, 1994
State Operations Manual
Survey Procedures and Interpretive Guidelines for Ambulatory Surgical Services
Author: U.S. Centers for Medicare & Medicaid Services
Source: Government (U.S.)
Publication Date: December 02, 1993
State Operations Manual
Appendix L - Survey Procedures and Interpretive Guidelines for Ambulatory Surgical Services
Table of Contents
....
Surveyor Procedures for Pharmaceutical Service Requirements in Long-Term Care...
Author: U.S. Centers for Medicare & Medicaid Services
Source: Government (U.S.)
Publication Date: September 02, 1990
State Operations Manual
Appendix....
Summary of the HIPAA Privacy Rule
Author: U.S. Office for Civil Rights
Source: Government (U.S.) | U.S. Department of Health & Human Services
Publication Date: May 02, 2003
Study Reveals Risk of Unsecured PHI in E-mail Communications
Author: Reams, Cary
Source: In Confidence (newsletter)
Publication Date: November 02, 2003
E-mail has become both an important business tool and a slippery slope when it comes to HIPAA compliance. Though HIPAA requires “reasonable and appropriate safeguards” whenever e-mailing protected health information (PHI), a recent study conducted by Zix Corporation shows that healthcare orga....
Study of Health Care Fraud and Abuse: Implications for Professionals Managing Health Information
Author: AHIMA Foundation
Source: AHIMA report
Publication Date: November 2010
Strategies for Medicare Medical Necessity
Author: Carter, Darren
Source: AHIMA Convention
Publication Date: September 23, 2002
Stopping Fraud: Detecting and Preventing Fraud in the e-Health Era
Author: Eramo, Lisa A
Source: Journal of AHIMA
Publication Date: March 2011
Stopping fraud will require health record systems, organizations, and individuals capable of, and committed to, detecting and preventing false claims before they are paid.
Healthcare fraud continues to plague the country, costing the United States billions of dollars per year.
....
Stop Medicare Fraud [external web site]
Author: U.S. Department of Health and Human Services; U.S. Department of Justice
Source: Government (U.S.)
Publication Date: July 15, 2009
Medicare fraud results in higher health care costs for everyone. Eliminating fraud cuts costs for families, businesses, and the federal government. It also increases the quality of services for those who need care.
Stop? Go? How to Handle Proposed Amendments to the Privacy Rule (HIPAA on the Job)
Author: Hughes, Gwen
Source: Journal of AHIMA
Publication Date: July 2002
Privacy rule implementation teams have a dilemma.
The Department of Health and Human Services (HHS) recently proposed amendments to the HIPAA privacy rule aimed at correcting problems related to its implementation. HHS gave the public until April 26 to provide comments. Based....
Staying Alert to Patient Rights Under HIPAA
Author: Apple, Gordon J.
Source: In Confidence (newsletter)
Publication Date: March 02, 2001
Privacy has been a central tenet of medical ethics for over 2,000 years. The Hippocratic Oath provides:
"All that may come to my knowledge in the exercise of my profession or in daily commerce with men, which ought not to be spread abroad, I will keep secret and will never reveal."
State of HIPAA Privacy and Security Compliance 2005
Author: AHIMA
Source: AHIMA report
Publication Date: April 11, 2005
The results of a survey to assess the current state of HIPAA privacy and security within the healthcare industry.
AHIMA releases the results of this research in conjunction with the second annual National Health Information Privacy and Security Week, April 10-16, 2005. AHIMA is sponsoring National Health Information Privacy and Security Week to raise awareness among healthcare professionals, their employers, the media, and the public regarding the importance of protecting the privacy, confidentiality, and security of personal health information (PHI).
Standards for Electronic Transactions...Final Rule and Notice
Author: U.S. Centers for Medicare & Medicaid Services
Source: Federal Register
Publication Date: August 17, 2000
Special Considerations for Business Associate Agreements: Substance Abuse Treatment, Federal Law Present Challenges
Author: Haines, Pamela T.
Source: Journal of AHIMA
Publication Date: April 2004
If you are writing business associate agreements for a healthcare provider these days, you have probably discovered there are often no magic words or formulas that will produce an agreement. Although sample forms available from various sources may be helpful, generally no two business associat....
Sooner or Later, There Will (Likely) be Litigation
Author: Hedges, Ron
Source: AHIMA blog post | Journal of AHIMA - website
Publication Date: November 18, 2015
With new technology comes new opportunities… as well as the potential for litigation. Take 3D implanted devices for example. Implanted devices are commonplace in healthcare. These devices can accomplish a range of tasks, such as deliver timed dosages of drugs, monitor....
"SNIP"ping Away at HIPAA
Author: Bettendorf, Jim
Source: In Confidence (newsletter)
Publication Date: November 02, 2001
Consider this a resource guide from a fellow privacy official trying to make sense of it all. I am of course referring to the Health Insurance Portability and Accountability Act of 1996 (HIPAA). By now, we are all familiar with HIPAA’s content, but not quite sure what path to take when it com....
Smart Training on Privacy and Security (expanded version)
Author: Bacik, Sandy
Source: Journal of AHIMA
Publication Date: April 2010
There is plenty of privacy and security training to be done, and many trainers struggle to get resources from their organizations and attention from their audiences. Sandy Bacik, CISSP, ISSMP, CISM, CGEIT, is a principal consultant at EnerNex and a former chief security officer. Here she o....
Smart Training on Privacy and Security
Author: Bacik, Sandy
Source: Journal of AHIMA
Publication Date: July 2010
ARRA's modifications to the HIPAA privacy and security rules are setting off a new round of training in facilities large and small. Trainers must fit the new training into existing schedules that already include organizational policies and procedures, HIPAA, and other regulations such as the R....
Skilled Nursing Facility Manual
Author: U.S. Centers for Medicare & Medicaid Services
Source: Government (U.S.)
Publication Date: February 01, 2002
Seven Select Questions to Ask Your Privacy Officer (Or Yourself)
Author: Downing, Katherine
Source: Journal of AHIMA
Publication Date: April 2014
On January 25, 2013, the US Department of Health and Human Services’ (HHS) Office for Civil Rights (OCR) published the long-awaited HITECH-HIPAA Omnibus Final Rule in the Federal Register. As anticipated, the Omnibus Rule includes some of the most significant changes to patient priva....
Sentinel Event Procedures Undergo Scrutiny
Author: Fuller, Sandra R.
Source: Journal of AHIMA
Publication Date: February 1998
Substantial changes were made to the Joint Commission on Accreditation of Healthcare Organizations' Sentinel Event Procedures at the November 1997 Board of Commissioners meeting. With an implementation date scheduled for April 1, 1998, all Joint Commission accredited healthcare organiz....
Security Risk Analysis and Management: An Overview (2013 update)
Author: Walsh, Tom
Source: AHIMA practice brief
Publication Date: November 2013
Editor’s note: This update replaces the January 2011 practice brief “Security Risk Analysis and Management: An Overview.”
Managing risks is an essential step in operating any business. It’s impossible to eliminate all threats; however, healthcare organizati....
Security Risk Analysis and Management: an Overview (2011 update)
Author: Walsh, Tom
Source: AHIMA practice brief
Publication Date: January 2011
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
Security Risk Analysis and Management: an Overview
Author: Amatayakul, Margret
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: October 2003
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
Security Awareness: The Right Messages
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: April 2004
How many of you have warned your e-mail users about “phishers”—e-mail that appears to come from a trusted source asking the recipient to click on a link to update personal details? But the site is really a fake, and the e-mail is a scam to steal personal information.
Security Audits of Electronic Health Information (2011 update)
Author: AHIMA
Source: AHIMA practice brief
Publication Date: March 2011
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
Security Audits (2003 update)
Author: Hjort, Beth M.
Source: AHIMA practice brief
Publication Date: November 2003
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
Security and HIPAA: Protecting Your Operations
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: August 02, 2003
Part six in a 10-part series.
This article is the sixth of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. The information security domain of operations security includes the topics of controls, protections, monitoring,....
Save the Stamps: Health Information Handlers Offering Electronic Record Submission for CMS Audits
Author: Galterio, Louis
Source: Journal of AHIMA
Publication Date: January 2013
Healthcare facilities are cutting out the middle man-the post office-by sending audit-requested medical records directly to the federal government using the Electronic Submission of Medical Documentation (esMD) program.
The esMD program has been growing at a fast ra....
Sanction Guidelines for Privacy and Security Violations (2013 update) - Retired
Author: AHIMA
Source: AHIMA practice brief
Publication Date: October 2013
Editor's note: This practice brief supersedes the October 2011 practice brief "Sanction Guidelines for Privacy and Security Violations."
The HIPAA Breach Notification Rule requires healthcare providers, health plans, and other HIPAA covered entities (CEs) to notify individuals whe....
Sanction Guidelines for Privacy and Security Violations (2011 update)
Author: AHIMA
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: October 2011
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
Sanction Guidelines for Privacy and Security Breaches (2009)
Author: AHIMA
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: May 2009
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
Room for Improvement: CMS Reports 2004 Payment Error Rate Findings; OIG Publishes Recommendations for Hospital Compliance Programs
Author: Bowman, Sue E
Source: Journal of AHIMA
Publication Date: April 2005
Two recent developments highlight the need for improvement in medical record documentation, coding, and hospital compliance programs.
CMS Fails to Meet 2004 Payment Error Rate Performance Goal
One of the Centers for Medicare and Medicaid Services’ (CMS) Medicare performan....
RHIOs: Build in Healthcare Fraud Management from the Beginning
Author: Hanson, Susan P.; Cassidy, Bonnie S.
Source: AHIMA Convention
Publication Date: October 10, 2007
The problem of fraud and abuse within the healthcare system comes from two sources: providers and patients. A provider is anyone who is authorized to give care by the Secretary of the Department of Labor.6
The types of provider fraud are numerous and vary in magnitude. Provider fraud and....
Rethinking Initial HIPAA Efforts (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: November 2003
Many healthcare organizations met the compliance date of April 14, 2003, for HIPAA privacy by addressing the most visible featuresimplementing a notice of privacy practices, assigning an information privacy official (IPO), and conducting training sessions.
But a review of....
Restrictions in Action: Three Case Studies
Author: Beckett, Barb; Downing, Kathy; Gillespie, Joe D; Waugh, Traci
Source: Journal of AHIMA
Publication Date: March 2015
Since its initial adoption the HIPAA Privacy Rule has granted individuals the right to request restrictions on the use or disclosure of their protected health information (PHI) for treatment, payment, and healthcare operations (TPO), as well as for disclosures to family members and certai....
Research Repositories, Databases, and the HIPAA Privacy Rule
Author: U.S. Department of Health and Human Services
Source: Government (U.S.)
Publication Date: January 12, 2004
downloaded from the DHHS web site
Reports: Health IT Can Address Healthcare Fraud
Author:
Source: Journal of AHIMA
Publication Date: January 2006
FORE Reports Announced at Press Conference
National Health Information Technology Coordinator David Brailer, MD, PhD, thanked AHIMA for “a landmark effort” during a press conference highlighting the release of two reports detailing how health information technology can ad....
[1] 2 3 4 5