Search Results

= Members only

Current search

472 results.

1 2 [3] 4 5 6 7 8 9 10

Reporting Security Incidents

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: March 2005


HIPAA requires covered entities “implement policies and procedures to address security incidents.” There is one implementation specification: to “identify and respond to suspected or known security incidents; mitigate, to the extent practical, harmful effects of security inci....

Re-examining HIPAA Six Years Later

Author: Kloss, Linda L

Source: Journal of AHIMA

Publication Date: April 2008


It was six years ago this month that the HIPAA privacy rule went into effect. For many in healthcare, compliance has become a routine part of doing business. But for too many, the current regulations remain poorly understood and poorly implemented. All the while, the environment has been chang....

Recovery Audit Program Changes

Author: Wilson, Donna D

Source: CodeWrite

Publication Date: February 2015



Editor's note: The Centers for Medicare and Medicaid Services (CMS) has delayed the commencement of work under the Recovery Audit contract for durable medical equipment (DME), home health (HH), and hospice reviews. For more information and further updates on this new development, please s....

Reaffirming Your HIPAA Compliance Efforts

Author: Woloszyn, William

Source: Journal of AHIMA

Publication Date: April 2005


Two years after the HIPAA privacy compliance date, is it time for your organization to reassess your efforts and recommit to enforcing HIPAA?
Revisiting HIPAA’s Roots

The HIPAA privacy regulation was created in response to public healthcare concerns about the privacy of pa....

RAC Reform Awaits Government Action

Author: AHIMA Advocacy and Policy Team

Source: Journal of AHIMA

Publication Date: November 2013



Although the First session of the 113th Congress is coming to a close, plenty of work remains for the members of Congress to accomplish in the coming year. AHIMA has worked closely with federal legislators to raise awareness on key initiatives that affect health information management (HIM....

RAC Ready: How to Prepare for the Recovery Audit Contractor Program

Author: Johnson, Kathy M; Bloom, Allison; Morris, Denise; Madamba, Roderick

Source: Journal of AHIMA

Publication Date: February 2009


The Centers for Medicare and Medicaid Services is expected to announce the official start date of the Recovery Audit Contractor program this month, but it is already time for providers to be preparing for a potential audit. Managing a RAC audit effectively and efficiently requires preparing de....

RAC Primer for LTC Facilities

Author: Leonard, Mary Ann

Source: Journal of AHIMA

Publication Date: January 2010



Last year the Centers for Medicare and Medicaid Services (CMS) began rolling out the Recovery Audit Contractor (RAC) program to all 50 states and all providers, including long-term care facilities. HIM professionals working in LTC facilities need to understand the basics of the program in....

RAC Audit Underpayments: Does CMS Owe You Money?

Author: Eramo, Lisa A

Source: Journal of AHIMA

Publication Date: February 2017



Anxiety—it’s the emotion that looms over most patient financial services (PFS) directors and those working in health information management (HIM) when they discover that their organization’s claims are subject to a Centers for Medicare and Medicaid Services (CMS) Recovery....

Psychotherapy Notes under HIPAA

Author: Dougherty, Michelle

Source: In Confidence (newsletter) | AHIMA Q and A

Publication Date: July 02, 2001


Q: I work in a non-psychiatric facility covered by HIPAA. On occasion, a patient may receive a psychological evaluation and possibly treatment for a short period of time. Our medical record does not include a copy of the psychotherapist’s “notes,” but a report that summarizes the psychologist....

Proposed Rule Mandates Fraud Data Bank

Author:

Source: Journal of AHIMA

Publication Date: January 1999


On October 30, 1998, the Office of the Inspector General (OIG) of the Department of Health and Human Services (HHS) published a Notice of Proposed Rulemaking titled "Health Care Fraud and Abuse Data Collection Program: Reporting of Final Adverse Actions." The notice states that....

Proof Is in the Policy

Author: Walsh, Tom

Source: Journal of AHIMA

Publication Date: February 2004


Proving security compliance later requires establishing documentation now. HIM professionals have a valuable role to play.

HIM professionals played central roles in their organization’s privacy efforts, ensuring that appropriate policies, procedures, and documents were in plac....

Privacy's Day in Court

Author: Gradle, Brian D.

Source: Journal of AHIMA

Publication Date: September 2002


While HIM professionals work to implement HIPAA, courts across the nation continue to hear cases that could affect this work. Namely, these are cases related to state privacy laws.


HIPAA's "preemption" framework provides that state laws that are not contrary to HIPAA or that p....

Privacy Holes in the 'Hidden Healthcare System': Students' PHI-laden Education Records that are Stored and Shared Electronically Don’t Have the Same Safeguards as most EHRs

Author: DuBravec, Daniel A; Daigle, Matt

Source: Journal of AHIMA

Publication Date: June 2015



With student safety and privacy an increasing parental concern, school administrators nationwide are sitting on a powder keg of potential backlash because of a gray area of student privacy protections that Julia Lear, senior advisor for the Center of Health and Health Care in Schools at G....

Privacy Compliance: Maintaining the Gains

Author: Vogt, Nancy

Source: Journal of AHIMA

Publication Date: October 2005


Most HIM professionals would probably agree that the state of information privacy has dramatically improved as a result of all the HIPAA efforts over the past few years. Executive leadership has tuned in, and even boards of directors have addressed information privacy. Awareness is at an all-t....

Privacy and Security Audits of Electronic Health Information (2014 update)

Author: Walsh, Tom; Miaoulis, William M

Source: AHIMA practice brief | Journal of AHIMA

Publication Date: March 2014

In a perfect world, access controls alone would ensure the privacy and security of electronic protected health information (ePHI). However, the complexities of today’s healthcare environment make it extremely challenging to limit access to the minimum information necessary that members of the workforce require in order to perform their jobs.

1 2 [3] 4 5 6 7 8 9 10