Search Results

= Members only

Current search

472 results.

1 2 3 4 5 6 [7] 8 9 10

HIPAA Security: Don't Disband the Committee Just Yet

Author: Brown, Stephen C.

Source: Journal of AHIMA

Publication Date: May 2005


By now, every healthcare organization has faced the initial security compliance responsibilities associated with HIPAA. However, the compliance road has not yet been fully traveled. The nature of the rule makes compliance a recursive effort of reassessment, continual auditing, regular educatio....

HIPAA: It's Different for Manufacturers

Author: Humphrey, Heather L.

Source: Journal of AHIMA

Publication Date: February 2005


A few years ago, the Y2K crisis refocused the data world. Suddenly medical device manufacturers saw the inherent risks data brought to the business industry. What began with answering a simple question about date functionality quickly moved to conversations about personal information, its appr....

HIPAA Compliance: Is Outsourcing the Answer?

Author: Watkins, Larry

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
HIPAA Compliance: Is Outsourcing the Answer?
Larry Watkins, Director, Electronic Commerce -- Per-Se Technologies EDI in Health Care-HIPAA Legislation
Mandated Standards 9 Electronic Transaction Standards Standardization of Supporting Codes Standard....

HIPAA Compliance: Is Outsourcing the Answer?

Author: McLaughlin, Mark

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
HIPAA Compliance: Is Outsourcing the Answer?
Mark McLaughlin, Informatics Standards Liaison, McKessonHBOC Compliance Depends on You!: HIPAA Components for Outsourcing
Transactions Processing Auditing Security Disaster Recovery
Consultants and....

HIPAA Compliance for Clinician Texting

Author: Greene, Adam H

Source: Journal of AHIMA

Publication Date: April 2012



The HIPAA privacy and security rules need not act as an obstacle to efficient communications, but keeping texting compliant requires planning and diligence.

Text (or SMS) messaging has become nearly ubiquitous on mobile devices. According to one survey, approximately 72 perce....

HIPAA Changes Call for Revising BA Agreements

Author: McDavid, Jan P

Source: Journal of AHIMA

Publication Date: May 2013



Business associates (BAs) of HIPAA-covered entities like hospitals and doctor's offices should already be intimately acquainted with HIPAA's privacy and security regulations. BAs should already have business associate agreements with every covered entity with whom they work and assume resp....

HIPAA Breach Enforcement Roundup

Author: Cacciatore, Victoria; Downing, Katherine

Source: Journal of AHIMA

Publication Date: July 2014



Criminal attacks on healthcare systems have risen 100 percent since 2010, according to a recent Ponemon study.1 This makes it obvious that the privacy and security of patient health information is vulnerable and highly susceptible to data breach. The HIPAA Breach Notification Rule became e....

HIPAA Audit and System Activity Review: Developing a Process that Focuses on the Greatest Risks First

Author: Hofler, Linda D.; Hardee, Joy; Dildy, Kenneth; Burleson, Deeanna; Grady, Jamie

Source: Journal of AHIMA

Publication Date: March 2005


The privacy and security rules require audits and system activity reviews. Here is one health system's process, a systematic approach that focuses on areas of greatest risk.
Ensuring the privacy and confidentiality of patient information is fundamental to HIM, but it has taken on a new le....

HIPAA and the EHR: Making Technical Safeguard Changes

Author: Fodor, Joseph

Source: Journal of AHIMA

Publication Date: January 2004


As electronic health records (EHRs) become more commonplace in healthcare, changes, adjustments, and improvements will be inevitable. When designing, implementing, upgrading, or remediating an EHR system, your organization’s implementation team should consider the impact of complying wit....

HIPAA and Privacy: After the Compliance Date

Author: Mikels, Debbie

Source: AHIMA Convention

Publication Date: October 15, 2004

Abstract

This article reviews successful strategies in preparing for HIPAA Privacy compliance. There are ongoing challenges organizations will face after the compliance date, such as managing research issues, identifying all business associates, and managing the accounting of disclosures....

HIPAA: 43,691 Privacy Complaints and Counting

Author: AHIMA

Source: Journal of AHIMA

Publication Date: June 2009


For those wondering what progress the Office for Civil Rights makes as it works through HIPAA privacy rule complaints, the numbers are easy to find. Each month OCR reports top-line results of the HIPAA cases it has received and resolved.

OCR has logged approximately 43,700 complaints....

HIM Staff RACing Up Record Requests

Author: AHIMA

Source: Journal of AHIMA

Publication Date: April 2013


Healthcare claims auditors have inundated release of information staff and vendors this year with record requests, in part due to the aggressive Centers for Medicare and Medicaid Services’ (CMS) Recovery Audit Contractor (RAC) initiative. RACs review provider bills and medical records to....

High Cost of Privacy

Author: Rhodes, Harry B.

Source: In Confidence (newsletter)

Publication Date: January 02, 2001


Cost: how much money needs to be invested? By now, most of us have discussed the implementation of the Health Insurance Portability and Accountability Act (HIPAA) final rules with our administrators, and naturally the question has been raised, “Just how much is this going to cost me?”Most lik....

1 2 3 4 5 6 [7] 8 9 10