215 results.
<< 7 8 9 10 [11] 12 13 14 15 16 17 18 19 20 21 22
Study Reveals Risk of Unsecured PHI in E-mail Communications
Author: Reams, Cary
Source: In Confidence (newsletter)
Publication Date: November 02, 2003
E-mail has become both an important business tool and a slippery slope when it comes to HIPAA compliance. Though HIPAA requires “reasonable and appropriate safeguards” whenever e-mailing protected health information (PHI), a recent study conducted by Zix Corporation shows that healthcare orga....
Security Audits (2003 update)
Author: Hjort, Beth M.
Source: AHIMA practice brief
Publication Date: November 2003
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
HIPAA Privacy and Security Training (2003 update)
Author: Hjort, Beth M.
Source: AHIMA practice brief
Publication Date: November 2003
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
Physical Security and HIPAA: What You Need to Know Now
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: December 02, 2003
This article is the final installment of a 10-part series that introduced the domains of information security and related them to federal HIPAA regulations. The information security domain of physical security covers threats against and the controls required to protect facilities, equipment,....
HIPAA and the EHR: Making Technical Safeguard Changes
Author: Fodor, Joseph
Source: Journal of AHIMA
Publication Date: January 2004
As electronic health records (EHRs) become more commonplace in healthcare, changes, adjustments, and improvements will be inevitable. When designing, implementing, upgrading, or remediating an EHR system, your organizations implementation team should consider the impact of complying wit....
Finding Quality HIPAA Security Resources (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: January 2004
Many of us struggled to understand the HIPAA privacy rule and initially had few resources to turn to for help. As your organization begins planning for security rule compliance, however, many of you may be finding that you’re overwhelmed with the volume of potential resources available.....
Journal Q&A (2/04)
Author: AHIMA Professional Practice Team
Source: AHIMA Q and A
Publication Date: February 02, 2004
Q: Can you explain the difference between the terms “addressable” and “required” as they are used in the final security rule?
A: The final security rule and the privacy rule use the terms “standards” and “implementation specifications.” Standards....
Safe at Home: Remote Coding Meets HIPAA
Author: Keough, Tim
Source: Journal of AHIMA
Publication Date: February 2004
Remote coding offers big benefits and unique security challenges. Here’s how one organization moves patient data securely across the Internet.
"Whatever, in connection with my professional practice, or not in connection with it, I see or hear, in the life of men, which ought....
Electronic Record, Electronic Security
Author: Hagland, Mark
Source: Journal of AHIMA
Publication Date: February 2004
New technologies are enhancing the ability to protect patient information. But there’s more to successful implementation than just what’s inside the box.
Melanie Schattauer, RHIA, Jack Obert, and their colleagues at Mercy St. John’s Health System in Springfield, M....
Securing Executive Support for Security (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: February 2004
Many information privacy officials (IPOs) and information security officials (ISOs) may be facing what seems like an uphill battle to gain support for security measures believed to be necessary to comply with the HIPAA security rule. There are a number of converging factors that can influence....
<< 7 8 9 10 [11] 12 13 14 15 16 17 18 19 20 21 22