Search Results

= Members only

Current search

472 results.

1 2 3 [4] 5

HIPAA Security: Don't Disband the Committee Just Yet

Author: Brown, Stephen C.

Source: Journal of AHIMA

Publication Date: May 2005


By now, every healthcare organization has faced the initial security compliance responsibilities associated with HIPAA. However, the compliance road has not yet been fully traveled. The nature of the rule makes compliance a recursive effort of reassessment, continual auditing, regular educatio....

HIPAA: It's Different for Manufacturers

Author: Humphrey, Heather L.

Source: Journal of AHIMA

Publication Date: February 2005


A few years ago, the Y2K crisis refocused the data world. Suddenly medical device manufacturers saw the inherent risks data brought to the business industry. What began with answering a simple question about date functionality quickly moved to conversations about personal information, its appr....

HIPAA Compliance: Is Outsourcing the Answer?

Author: Watkins, Larry

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
HIPAA Compliance: Is Outsourcing the Answer?
Larry Watkins, Director, Electronic Commerce -- Per-Se Technologies EDI in Health Care-HIPAA Legislation
Mandated Standards 9 Electronic Transaction Standards Standardization of Supporting Codes Standard....

HIPAA Compliance: Is Outsourcing the Answer?

Author: McLaughlin, Mark

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
HIPAA Compliance: Is Outsourcing the Answer?
Mark McLaughlin, Informatics Standards Liaison, McKessonHBOC Compliance Depends on You!: HIPAA Components for Outsourcing
Transactions Processing Auditing Security Disaster Recovery
Consultants and....

HIPAA Compliance for Clinician Texting

Author: Greene, Adam H

Source: Journal of AHIMA

Publication Date: April 2012



The HIPAA privacy and security rules need not act as an obstacle to efficient communications, but keeping texting compliant requires planning and diligence.

Text (or SMS) messaging has become nearly ubiquitous on mobile devices. According to one survey, approximately 72 perce....

HIPAA Changes Call for Revising BA Agreements

Author: McDavid, Jan P

Source: Journal of AHIMA

Publication Date: May 2013



Business associates (BAs) of HIPAA-covered entities like hospitals and doctor's offices should already be intimately acquainted with HIPAA's privacy and security regulations. BAs should already have business associate agreements with every covered entity with whom they work and assume resp....

HIPAA Breach Enforcement Roundup

Author: Cacciatore, Victoria; Downing, Katherine

Source: Journal of AHIMA

Publication Date: July 2014



Criminal attacks on healthcare systems have risen 100 percent since 2010, according to a recent Ponemon study.1 This makes it obvious that the privacy and security of patient health information is vulnerable and highly susceptible to data breach. The HIPAA Breach Notification Rule became e....

HIPAA Audit and System Activity Review: Developing a Process that Focuses on the Greatest Risks First

Author: Hofler, Linda D.; Hardee, Joy; Dildy, Kenneth; Burleson, Deeanna; Grady, Jamie

Source: Journal of AHIMA

Publication Date: March 2005


The privacy and security rules require audits and system activity reviews. Here is one health system's process, a systematic approach that focuses on areas of greatest risk.
Ensuring the privacy and confidentiality of patient information is fundamental to HIM, but it has taken on a new le....

HIPAA and the EHR: Making Technical Safeguard Changes

Author: Fodor, Joseph

Source: Journal of AHIMA

Publication Date: January 2004


As electronic health records (EHRs) become more commonplace in healthcare, changes, adjustments, and improvements will be inevitable. When designing, implementing, upgrading, or remediating an EHR system, your organization’s implementation team should consider the impact of complying wit....

HIPAA and Privacy: After the Compliance Date

Author: Mikels, Debbie

Source: AHIMA Convention

Publication Date: October 15, 2004

Abstract

This article reviews successful strategies in preparing for HIPAA Privacy compliance. There are ongoing challenges organizations will face after the compliance date, such as managing research issues, identifying all business associates, and managing the accounting of disclosures....

HIPAA: 43,691 Privacy Complaints and Counting

Author: AHIMA

Source: Journal of AHIMA

Publication Date: June 2009


For those wondering what progress the Office for Civil Rights makes as it works through HIPAA privacy rule complaints, the numbers are easy to find. Each month OCR reports top-line results of the HIPAA cases it has received and resolved.

OCR has logged approximately 43,700 complaints....

HIM Staff RACing Up Record Requests

Author: AHIMA

Source: Journal of AHIMA

Publication Date: April 2013


Healthcare claims auditors have inundated release of information staff and vendors this year with record requests, in part due to the aggressive Centers for Medicare and Medicaid Services’ (CMS) Recovery Audit Contractor (RAC) initiative. RACs review provider bills and medical records to....

High Cost of Privacy

Author: Rhodes, Harry B.

Source: In Confidence (newsletter)

Publication Date: January 02, 2001


Cost: how much money needs to be invested? By now, most of us have discussed the implementation of the Health Insurance Portability and Accountability Act (HIPAA) final rules with our administrators, and naturally the question has been raised, “Just how much is this going to cost me?”Most lik....

Guidelines for Cost-effective HIPAA Compliance

Author: Siren, Bill

Source: Brief Encounter

Publication Date: July 02, 2001


Most of us are acutely aware of the events that took place on December 31, 1999, at midnight. There were some who thought that in five seconds, the lights would go off and all computer systems would cease to function. In the healthcare world, concerns were prevalent regarding whether medical e....

Governmental Audit Toolkit

Author: AHIMA

Source: AHIMA toolkit

Publication Date: December 02, 2011

This toolkit is designed to provide guidance to HIM professionals on how to prepare for and ensure compliance in managing governmental audits.

Getting 'Hip' to Other Privacy Laws: Part 2

Author: Roth, Julie A.

Source: Journal of AHIMA

Publication Date: March 2004


The HIPAA privacy rule is just one of several federal laws that protect the privacy of non-public information. But privacy is not a new concept in healthcare. Healthcare workers have long protected medical information under a varety of state and federal laws, accreditation standards, and rules....

Fundamentals for the Newly Initiated

Author: Amatayakul, Margret

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
Fundamentals for the Newly Initiated
Margret Amatayakul, Margret\A Consulting, LLC Session Objectives
Get an overview of the original legislation, processes, and timelines Examine the scope and impact of the new regulations Review ongoing HIPAA impl....

Fraud Management: a $100 Billion Bonus from Health IT?

Author: Kloss, Linda L

Source: Journal of AHIMA

Publication Date: March 2006


The financial losses from healthcare fraud in the US are staggering...and growing. Fraud was estimated to be between 3 and 10 percent of total health expenditures in 2003, or $51 to $170 billion, according to the National Health Care Anti-Fraud Association. Whether an interconnected health IT....

Fraud and Abuse: What You Can Do

Author: Prophet, Sue

Source: Journal of AHIMA

Publication Date: January 1998



During AHIMA's National Convention, HIM professionals convened to network and share practical ideas on issues pertaining to fraud and abuse. While most of the participants worked in hospitals, other work settings, including colleges, consulting firms, and government agencies were als....

Fraud and Abuse Implications for the HIM Professional

Author: Prophet, Sue

Source: Journal of AHIMA

Publication Date: April 1997

Healthcare Fraud and Abuse Legislation

On August 21, 1996, President Clinton signed into law the Health Insurance Portability and Accountability Act. This law addresses several issues including the creation of a Health Care Fraud and Abuse Control Program. This program is intended to com....

First Step Toward Compliance: OCR Outreach

Author: Jeffries, Jane

Source: Journal of AHIMA

Publication Date: February 2002


Though the Office for Civil Rights (OCR) has played an active role in the Department of Health and Human Services (HHS) since the early 1980s, it has only recently moved to the forefront of HIM professionals’ minds. Charged with enforcing the HIPAA privacy rule, OCR has become the leading....

Fall Preview: A Look at the Season’s Expected Rules

Author: Heubusch, Kevin

Source: Journal of AHIMA

Publication Date: November 2011


Perhaps one of the biggest jobs related to implementing the ARRA provisions right now is keeping track of the moving parts. Publication of the act in 2009 was a kind of Big Bang-an explosion of provisions that rocked the healthcare universe. Since then, however, the pieces have traveled at dif....

Experiences of a VHA Privacy Officer

Author: Putt, Stephanie H.

Source: In Confidence (newsletter)

Publication Date: November 02, 2001


Being the privacy officer for one of the world’s largest healthcare delivery systems is often a daunting responsibility, yet it offers an opportunity to make a difference and face new challenges. The Veterans Health Administration, or VHA, is part of the Department of Veterans Affairs (VA). T....

Evaluation of PHI Hunter in Natural Language Processing Research

Author: Redd, Andrew; Pickard, Steve; Meystre, Stephane; Scehnet, Jeffrey; Bolton, Dan; Heavirland, Julia; Weaver, Allison Lynn ; Hope, Carol; Garvin, Jennifer Hornung

Source: Perspectives in Health Information Management

Publication Date: January 2015


Abstract


Objectives: We introduce and evaluate a new, easily accessible tool using a common statistical analysis and business analytics software suite, SAS, which can be programmed to remove specific protected health information (PHI) from a text document. Removal of PHI is import....

Evaluating the Information Governance Principles for Healthcare: Compliance and Availability

Author: Datskovsky, Galina; Hedges, Ron; Empel, Sofia; Washington, Lydia

Source: Journal of AHIMA

Publication Date: June 2015



Editor’s Note: This is the third in a series of four articles that discuss the eight Information Governance Principles for Healthcare.


AHIMA’s new Information Governance Principles for Healthcare (IGPHC) provide a framework for healthcare organizations to leverage informati....

Emergency Medical Treatment & Labor Act (EMTALA) Resource

Author: U.S. Centers for Medicare & Medicaid Services

Source: Government (U.S.) | External web site

Publication Date: November 01, 2007

In 1986, Congress enacted the Emergency Medical Treatment & Labor Act (EMTALA) to ensure public access to emergency services regardless of ability to pay. Section 1867 of the Social Security Act imposes specific obligations on Medicare-participating hospitals that offer emergency services to provide a medical screening examination (MSE) when a request is made for examination or treatment for an emergency medical condition (EMC), including active labor, regardless of an individual's ability to pay. Hospitals are then required to provide stabilizing treatment for patients with EMCs. If a hospital is unable to stabilize a patient within its capability, or if the patient requests, an appropriate transfer should be implemented.

Dual Accreditation Presents Challenges, Opportunities

Author: Zender, Anne

Source: Journal of AHIMA

Publication Date: February 2000


While most HIM professionals are acquainted with participating in a facility's Joint Commission accreditation processes, a small but significant number work in facilities that are also accredited by the American Osteopathic Association (AOA). Though the organizations have....

1 2 3 [4] 5