Search Results

= Members only

Current search

472 results.

1 [2] 3 4 5 6 7 8 9 10

The New Privacy Officer

Author: Dimick, Chris

Source: Journal of AHIMA

Publication Date: April 2012



It has been a decade since the first privacy officers took their jobs in response to the HIPAA privacy rule. A slew of changes since then have added more responsibility, required more skills, and demanded more time of them than anyone could have imagined.

When Nancy Davis, R....

Teamwork and Compliance Go Hand in Hand

Author: Ruppersburg, Patricia L.

Source: Journal of AHIMA

Publication Date: April 1999



Compliance is an issue that has earned much respect from healthcare professionals. It has become imperative to all HIM professionals to focus on providing the best possible solution for compliance. The ultimate goal: to create a scenario in which compliance supports the existing heal....

Teaching Physician Guidelines

Author: Graff, Jean Stevens

Source: Brief Encounter

Publication Date: September 02, 2001


Working in an orthopedic clinic, I understand the great need for my newly created position. I am employed at a teaching hospital as a medical record auditor charged with the task of educating physicians on the art of coding and documentation. My job is to ensure compliance with the Medicare ma....

State of HIPAA Privacy and Security Compliance 2005

Author: AHIMA

Source: AHIMA report

Publication Date: April 11, 2005

The results of a survey to assess the current state of HIPAA privacy and security within the healthcare industry.

AHIMA releases the results of this research in conjunction with the second annual National Health Information Privacy and Security Week, April 10-16, 2005. AHIMA is sponsoring National Health Information Privacy and Security Week to raise awareness among healthcare professionals, their employers, the media, and the public regarding the importance of protecting the privacy, confidentiality, and security of personal health information (PHI).

"SNIP"ping Away at HIPAA

Author: Bettendorf, Jim

Source: In Confidence (newsletter)

Publication Date: November 02, 2001


Consider this a resource guide from a fellow privacy official trying to make sense of it all. I am of course referring to the Health Insurance Portability and Accountability Act of 1996 (HIPAA). By now, we are all familiar with HIPAA’s content, but not quite sure what path to take when it com....

Smart Training on Privacy and Security (expanded version)

Author: Bacik, Sandy

Source: Journal of AHIMA

Publication Date: April 2010



There is plenty of privacy and security training to be done, and many trainers struggle to get resources from their organizations and attention from their audiences. Sandy Bacik, CISSP, ISSMP, CISM, CGEIT, is a principal consultant at EnerNex and a former chief security officer. Here she o....

Smart Training on Privacy and Security

Author: Bacik, Sandy

Source: Journal of AHIMA

Publication Date: July 2010


ARRA's modifications to the HIPAA privacy and security rules are setting off a new round of training in facilities large and small. Trainers must fit the new training into existing schedules that already include organizational policies and procedures, HIPAA, and other regulations such as the R....

Sentinel Event Procedures Undergo Scrutiny

Author: Fuller, Sandra R.

Source: Journal of AHIMA

Publication Date: February 1998


Substantial changes were made to the Joint Commission on Accreditation of Healthcare Organizations' Sentinel Event Procedures at the November 1997 Board of Commissioners meeting. With an implementation date scheduled for April 1, 1998, all Joint Commission accredited healthcare organiz....

Security Awareness: The Right Messages

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: April 2004


How many of you have warned your e-mail users about “phishers”—e-mail that appears to come from a trusted source asking the recipient to click on a link to update personal details? But the site is really a fake, and the e-mail is a scam to steal personal information.

Security and HIPAA: Protecting Your Operations

Author: Ruano, Michael

Source: In Confidence (newsletter)

Publication Date: August 02, 2003


Part six in a 10-part series.
This article is the sixth of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. The information security domain of operations security includes the topics of controls, protections, monitoring,....

Reports: Health IT Can Address Healthcare Fraud

Author:

Source: Journal of AHIMA

Publication Date: January 2006


FORE Reports Announced at Press Conference

National Health Information Technology Coordinator David Brailer, MD, PhD, thanked AHIMA for “a landmark effort” during a press conference highlighting the release of two reports detailing how health information technology can ad....

1 [2] 3 4 5 6 7 8 9 10