Search Results

= Members only

Current search

2929 results.

<< 3 4 5 6 7 8 9 10 [11] 12 13 14 15 16 17 18 >>

Journal Q&A (3/98)

Author: AHIMA Professional Practice Team

Source: AHIMA Q and A

Publication Date: March 02, 1998


Q: In light of last year's changes to the Joint Commission's standard on delinquent records, how do I compute my delinquent record rate?


A: Last year the Joint Commission reduced the prescriptive nature of the language regarding delinquent records. Only the total number of ....

Journal Q&A (3/98)

Author: AHIMA Professional Practice Team

Source: AHIMA Q and A

Publication Date: March 02, 1998


Q: Cellular phones are very popular and are a convenient way to increase communication. Should we place any restrictions on the use of cellular phones to discuss patient information?

A: Cellular phones operate on radio frequencies, which means anyone tuning into that f....

Protection of Personal Data -- The European View

Author: Mathews, Steve

Source: Journal of AHIMA

Publication Date: March 1998


A new series of laws are being passed to control the processing of personal information -- including medical information -- inside the European Commonwealth. The author gives an overview of the European view of personal information and examines the implications for healthcare professionals bo....

Information Security--A Database View

Author: Zender, Anne

Source: Journal of AHIMA

Publication Date: March 1998



HIM professionals agree that applying the principles of information security is important in a hospital setting. But as Sharon Johnson, RRA, knows, those principles can be applied in many situations--including settings under construction. Since spring 1997, Johnson has been ....

New Standards Focus on Information Security

Author: Hanken, Mary Alice

Source: Journal of AHIMA

Publication Date: March 1998


The federal legislation for the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and the need in healthcare for security of confidential data have come together to heighten the interest in security standards for electronic health information systems. Th....

<< 3 4 5 6 7 8 9 10 [11] 12 13 14 15 16 17 18 >>