215 results.
1 2 3 4 [5] 6 7 8 9 10 11 12 13 14 15 16 >>
Developing a Framework for a Security Assessment
Author: Parisien, Darryl
Source: In Confidence (newsletter)
Publication Date: September 02, 2001
Is your organization taking the necessary actions to comply with the security regulations of HIPAA? Do you believe you have more time to comply? If you think you do, you might want to do a little more research. Take note that United States Code Title 42 Section 1320d-2 states:
Each pers....
NCVHS Groups Explore CPR, Privacy Rule Possibilities
Author: Rode, Dan
Source: Journal of AHIMA
Publication Date: October 2001
HIPAA's fifth anniversary was marked by meetings of two key subcommittees of the National Committee on Vital and Health Statistics (NCVHS): the standards (transactions) and security subcommittee and the privacy and confidentiality subcommittee. At the security subcommittee, experts fr....
Early Word on HIPAA Claims Attachments
Author: Dougherty, Michelle
Source: Journal of AHIMA
Publication Date: October 2001
If we could look into a crystal ball and see into the future, it would be much easier to prepare for HIPAA, particularly the electronic transaction standards. Because of the rarity of crystal balls these days, we must rely on other predictors at our disposal, such as the white paper issued by t....
Selecting Strong Passwords (HIPAA on the Job)
Author: Amatayakul, Margret; Walsh, Tom
Source: Journal of AHIMA
Publication Date: October 2001
Are the majority of passwords in your organization something like “Spot1,” “Spot2,” “Spot3” (for Joe, whose password expires every 90 days and whose dog’s name is Spot)? If so, your organization could be at risk. Here’s what you need to....
Conducting a HIPAA Security Risk Assessment
Author: Klein, Jim
Source: AHIMA Convention
Publication Date: October 10, 2001
Introduction
Organizations covered under the Proposed Security Standards1 (the Draft Standard) are facing important regulatory compliance decisions for operational, technical, clinical, and administrative components of their enterprise. With the promulgation of the final Security Stand....
Overview of the HIPAA Security Regulations and Their Impact
Author: Parmigiani, John
Source: AHIMA Convention
Publication Date: October 10, 2001
The HIPAA Security Standards require healthcare providers, health plans, and clearinghouses that transmit health information in electronic form to have reasonable and appropriate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and availabil....
HIPAA Security Standards: Working With Your Information Technology Vendors
Author: Brandt, Mary D.
Source: AHIMA Convention
Publication Date: October 10, 2001
"Information security? I don't need to worry about that. My information technology (IT) vendor will take care of it."
You probably haven't made this comment, but I've heard it many times. It would certainly be convenient if we could delegate responsibility for secur....
On the Line: Professional Practice Solutions
Author: Dougherty, Michelle
Source: Journal of AHIMA
Publication Date: November 2001
Q: Where can I find the updated data elements and data definitions for the Uniform Hospital Discharge Data Set (UHDDS)?
Q: Where can I find an easy-to-use glossary for terms in the HIPAA regulations?
Michelle Dougherty (michelle.dougherty@ahima.org) is an HIM practice manager....
HIPAA Compliance Extension Postpones Simplification Benefits
Author: Rode, Dan
Source: Journal of AHIMA
Publication Date: February 2002
Under the terms of the Health Insurance Portability and Accountability Act of 1996, February 2002 would mark the second anniversary of administrative simplification for all but the smallest of health plans, and one year of rules related to claims attachments. Instead, Congress just approve....
Make Your Telecommuting Program HIPAA Compliant (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: February 2002
An increasing number of healthcare workforce members are telecommuting. As transcriptionists, coders, customer service representatives, and others are working from home, many providers are weighing the benefits against potential privacy and security risks.
Who Is Working from Home....
1 2 3 4 [5] 6 7 8 9 10 11 12 13 14 15 16 >>