Search Results

= Members only

Current search

2929 results.

<< 15 16 [17] 18 19 20 21 22 23 24 25 26 27 28 29 30

When is the PHR the EHR?

Author: Beach, Joan

Source: AHIMA Convention

Publication Date: October 17, 2008

Introduction

Are you ready to tackle the use of the Personal Health Record (PHR) and its integration into the Legal Health Record? Be prepared to find the point of integration and how to use the information provided by the patient. Learn how the “proxy” relationship impacts th....

HIM Professional's Role in Enterprise Content Management : Stepping Out of the Department and Into the Organization

Author: May, Michael L.; Martinez, Christina M.

Source: AHIMA Convention

Publication Date: October 17, 2008


Background


HIM Professionals can re-assert themselves as integral pieces of the EHR decision-making process for their organization by gaining new operationally appropriate technical competencies and building collaborative partnerships with our IT, clinical informatics, and leaders....

Reinsourcing Release of Information

Author: Haas, Mark

Source: AHIMA Convention

Publication Date: October 17, 2008


BACKGROUND


“Outsourcing” was one of the buzzwords in US businesses for the first half of the decade. The mere mention of the word or its close relative, “offshoring”, had a polarizing effect on employers, employees and customers. However, half-way through t....

Identity Crisis: Approaches to Patient Identification in a National Health Information Network

Author: Hillestad, Richard; Bigelow, James H; Chaudhry, Basit ; Dreyer, Paul; Greenberg, Michael D; Meili, Robin C; Ridgely, M Susan; Rothenberg, Jeff; Taylor, Roger

Source: RAND Corporation

Publication Date: October 20, 2008

This research brief summarizes an analysis and comparison of two methods of patient identification — statistical matching and unique patient identifier — on error rates, operational efficiency, costs, and privacy and security issues.

Identity Crisis: an Examination of the Costs and Benefits of a Unique Patient Identifier for the U.S. Health Care System

Author: Hillestad, Richard; Bigelow, James H; Chaudhry, Basit ; Dreyer, Paul; Greenberg, Michael D; Meili, Robin C; Ridgely, M Susan; Rothenberg, Jeff; Taylor, Roger

Source: RAND Corporation

Publication Date: October 20, 2008

This study finds that the use of a universal patient identifier should reduce errors and improve interoperability without significantly increasing security and privacy risks.

2008 HIMSS Security Survey

Author:

Source: External web site

Publication Date: October 28, 2008

This report provides the results of a survey of IT and security professionals addressing security environments in healthcare organizations, including access to patient data, tracking and audit logs, network security, and medical identity theft.

Planning Forms Automation

Author: Hyde, Cynthia S

Source: Journal of AHIMA

Publication Date: November 2008


A carefully crafted project plan is the first step in achieving expectations and lasting value from electronic forms management.

The intent of transitioning from paper-based processes to electronic, automated systems and solutions is to benefit the operations of healthcare facilities....

Management Practices for the Release of Information

Author: Bock, Linda J.; Demster, Barbara; Dinh, Angela K.; Gorton, Elisa R.; Lantis, James R. Jr.

Source: AHIMA practice brief | Journal of AHIMA

Publication Date: November 2008


Exchange of health information is an essential function to the provision of high-quality and cost-effective healthcare. The information should be complete and timely for its intended purpose. While this sounds straightforward, often it is not an easy task in the complex medical and legal envir....

CMS Bans Use of Physician Signature Stamps

Author: Bryant, Gloryanne H.

Source: Journal of AHIMA

Publication Date: November 2008


Question: What is the new Centers for Medicare and Medicaid Services ruling on use of signature stamps?

Answer: The Centers for Medicare and Medicaid Services (CMS) has made it clear that it will only accept signatures that are handwritten, electronic, or facsimiles of original wri....

ABCs of Medicare Advantage

Author: Hernandez, Jeannette

Source: Journal of AHIMA - Coding Notes

Publication Date: November 2008


Although most Medicare beneficiaries receive their health coverage through the traditional Medicare Part A and B fee-for-service programs, more and more beneficiaries are enrolling in Medicare Part C, referred to as Medicare Advantage (MA), to manage their healthcare costs.

By June 2....

Releasing Records from Other Providers

Author: Herrin, Barry S.

Source: Journal of AHIMA

Publication Date: November 2008


Question: Should organizations include records of other providers when responding to a release of information?

Answer: Yes. There are three reasons this is so.

First, there is no law or regulation that generally prohibits the redisclosure of information received from anot....

Leading on the Legal EHR

Author: Hicks, Jewelle E

Source: Journal of AHIMA

Publication Date: January 2009


Carol F. Smith, MBA, RHIA, is enthusiastic about the year ahead. As director of health information management for the University of Texas Anderson Cancer Center in Houston, TX, Smith supervises 110 full-time employees and works on projects ranging from revenue cycle, data quality, medical reco....

Auditing Copy and Paste

Author: AHIMA

Source: Journal of AHIMA

Publication Date: January 2009




For organizations that allow carrying forward clinical documentation, auditing its use is a key part of ensuring document integrity.




Copying clinical documentation can be a time-saver for busy clinicians. It also can pose a risk to document integrity. For org....

Releasing Information of Deceased Patients

Author: Herrin, Barry S.

Source: Journal of AHIMA

Publication Date: January 2009


Developed when modern law concepts were first formed, the mortmain, or “dead hand,” rule prevented the church from exercising undue influence over a soon-to-be-dead penitent to obtain a gift of an individual’s lands in remission of his or her sins. These statutes evolved over....

Securing Portable Devices

Author: Dinh, Angela K.

Source: Journal of AHIMA

Publication Date: January 2009


Reports of data breaches involving portable devices last year ran the gamut from oversight to theft: a college of medicine professor gave away a personal computer containing protected health information, including photos of his patients, to friends; a flash drive containing Social Security num....

Universal Adapters: Terminology Standards Enable Meaningful Data Exchange

Author: Cook, Jane; Foley, Margaret M.; Giannangelo, Kathy; Paterno, Marilyn D.; Scichilone, Rita A; Schwarz, Kathleen M.

Source: Journal of AHIMA

Publication Date: January 2009


Standardized clinical terminologies are critical connectors that allow systems to exchange health information.

In the winter of 1904 a major fire broke out in Baltimore, MD. The resulting damage—an entire swath of the downtown destroyed—was blamed largely on a lack of uni....

Untangling Privacy

Author: Dimick, Chris

Source: Journal of AHIMA

Publication Date: February 2009


Health IT won’t advance far without resolving the complex issue of privacy protections. Can a complicated situation be teased apart thread by thread?

The debate on privacy has become very public.

Privacy advocates, health IT advocates, providers, HIM professionals, fe....

Maximizing e-Prescribing Success

Author: Washington, Lydia

Source: Journal of AHIMA

Publication Date: February 2009


With fewer barriers and increased provider incentives, e-prescribing is currently poised to take off. More than just a means for doctors to transmit prescriptions to pharmacies, e-prescription systems can provide prescribers with a patient’s medication history, drug plan information, low....

Authenticating EHR Metadata

Author: McLean, Thomas R

Source: Journal of AHIMA

Publication Date: February 2009


Any medical malpractice action involving electronic records is likely to raise issues concerning metadata. Metadata are tantamount to an audit trail of how an electronic record was used and modified.

However, before this audit trail can be used in court, it must be authenticated. Whi....

Driving Compliance through Data Governance

Author: Nunn, Sandra L.

Source: Journal of AHIMA

Publication Date: March 2009


Healthcare organizations increasingly struggle to manage huge volumes of e-mail, hundreds of thousands of documents on shared drives, and hundreds of source and feeder systems that pour data and records into EHR systems, data warehouses, and decision support systems. This has given new panache....

Street Smart: Understanding the Context of Emergency Medical Services Communication and Documentation

Author: Teslow, Mary; Harris, Susie T.; Wilfong, Denise

Source: Journal of AHIMA

Publication Date: March 2009


HIM professionals can expand their understanding of the healthcare continuum by becoming more familiar with hospital emergency care and documentation.

Emergency medical services (EMS) has evolved into an integral part of the healthcare system. The field is working to integrate itself....

Health IT Certification Developments: CCHIT’s Current Work and How to Get Involved

Author: Birnbaum, Cassi L; Hall, Terri; Sweet, Helayne; Wiedemann, Lou Ann

Source: Journal of AHIMA

Publication Date: March 2009


For the last five years the Certification Commission for Healthcare Information Technology (CCHIT) has been working to promote the adoption of health IT by certifying electronic health record (EHR) products against common, baseline criteria.

The private, nonprofit certification body....

Using Document Imaging to Strengthen Revenue Cycle

Author: Clark, Jill S

Source: Journal of AHIMA

Publication Date: April 2009


For many organizations, document imaging is the first step toward implementing a fully electronic health record. Document imaging allows staff members across an organization to access electronic documents simultaneously. Three practitioners share their experiences on how this accessibility can....

Medical Identity Theft and the Red Flags Rule

Author: Apgar, Chris

Source: Journal of AHIMA - website

Publication Date: April 2009


Continuing our Health Information Privacy and Security Week series, today Chris Apgar, CISSP, president of Apgar & Associates LLC, takes a look at medical identity theft within the context of the Red Flags Rule.

Much is reported in the news about identity theft including new cat....

Guidance Specifying the Technologies and Methodologies That Render Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals for Purposes of the Breach Notification Requirements ... [of ARRA]

Author: U.S. Department of Health and Human Services. Office of the Secretary

Source: Government (U.S.)

Publication Date: April 27, 2009

[Federal Register: April 27, 2009 (Volume 74, Number 79)] [Rules and Regulations] [Page 19006-19010] From the Federal Register Online via GPO Access [wais.access.gpo.gov] [DOCID:fr27ap09-11] ======================================================================= ------------------------------------....

Testing Health Record Banking

Author: Dimick, Chris

Source: Journal of AHIMA

Publication Date: May 2009


Washington State’s experiment in consumer-controlled health records has moved into a pilot phase, transforming the health record banking model from theory to testing. In March the Washington State Health Care Authority (HCA) announced the launch of three pilot sites that will try out the....

<< 15 16 [17] 18 19 20 21 22 23 24 25 26 27 28 29 30