215 results.
[1] 2 3 4 5
New Standards Focus on Information Security
Author: Hanken, Mary Alice
Source: Journal of AHIMA
Publication Date: March 1998
The federal legislation for the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and the need in healthcare for security of confidential data have come together to heighten the interest in security standards for electronic health information systems. Th....
Security and Electronic Signature Standards: Proposed Rule
Author: U.S. Department of Health and Human Services
Source: Federal Register
Publication Date: August 12, 1998
HHS Publishes Notice of Proposed Rule Making for Security, Electronic Signature Standards
Author: Frawley, Kathleen A.; Asmonga, Donald D.
Source: Journal of AHIMA
Publication Date: October 1998
On August 12, the Department of Health and Human Services (HHS) published the notice of proposed rule making on standards for the security of individual health information and electronic signature use by health plans, healthcare clearinghouses and healthcare providers. These standards are part....
HIPAA, Security, and Electronic Signature: A Closer Look
Author: Ballam, Holly
Source: Journal of AHIMA
Publication Date: March 1999
A recent notice of proposed rule making for an electronic signature standard, if adopted, will affect the way health information is managed for years to come. Here's what you need to know about electronic signature and what the proposed standard may mean for HIM.
The Health....
Implementing HIPAA Security Standards -- Are You Ready?
Author: Fuller, Sandra R.
Source: Journal of AHIMA
Publication Date: October 1999
When the final security standards related to HIPAA are published later this year, the race to implement them will be on. Are you prepared? The author offers a handy set of guidelines.
The wait is almost over for the final security standards required by the Health Insurance Portability an....
By the Rules: Making Security Policies Stick
Author: Zender, Anne
Source: Journal of AHIMA
Publication Date: October 1999
Considerable attention has been paid to the development of organizationwide information security policiesespecially what they should contain and how they should be put in place. But enforcing these policies isn't always easy. We asked four information security experts to give us....
Organizing the Effort
Author: Grant, Karen G.
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
2000 HIPAA Conference Presentation
Organizing the Effort
Presented by Karen G. Grant, RHIA, Corporate Director, Health Information Services, Partners HealthCare System Goals
To maintain a secure and continuously available technology infrastructure for Partners HealthCare System Compl....
Code Sets: Improving the Quality of Coded Data
Author: Prophet, Sue
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
2000 HIPAA Conference Presentation
Code Sets: Improving the Quality of Coded Data
The Healthcare Provider Perspective
Sue Prophet, RHIA, CCS
Director, Classification and Coding, AHIMA Current Problems with Use of Code Sets
Lack of acceptance of valid codes (e.g., V and E co....
HIPAA Security Standards Update
Author: Parmigiani, John
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
2000 HIPAA Conference Presentation
HIPAA Security Standards Update
Presented by John Parmigiani, Practice Director, Healthcare Computing Strategies Industry + Government = HIPAA Security Standards
Objectives
Establish a Healthcare Data/Systems Security Framework Identify Require....
Code Sets: Improving the Quality of Coded Data: Insurance Industry Perspective
Author: Bonnell, Claudia
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
2000 HIPAA Conference Presentation
Code Sets: Improving the Quality of Coded Data
The Insurance Industry Perspective
Presented by Claudia Bonnell, RN, MLS
Project Manager, Medical Information, Blue Cross and Blue Shield Association What Do You Want to Know?
The potential p....
Code Sets
Author: Brooks, Patricia E.
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
2000 HIPAA Conference Presentation
Code Sets
Presented by Pat Brooks, RHIA
HCFA Standards for Electronic Transactions
HCFA-0149-P Published May 7, 1998 Final not yet published To be enacted 2 years after final notice (3 years for small plans)
Proposed Initial Standards for....
Performing a Baseline Security Assessment
Author: Lawson, Jayne W.
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
2000 HIPAA Conference Presentation
Performing a Baseline Security Assessment
Presented By Jayne W. Lawson, RHIA, Information Security Manager, Hartford Hospital Awareness and Accountability
Designate staff/team responsible for overseeing review process Determine sponsorship Educate h....
HIPAA Security Context, Concepts, and Misconceptions
Author: Baker, Dixie B.
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
Kaiser Permanente Approach
Author: Cooper, Ted
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
2000 HIPAA Conference Presentation
Organizing the Effort
Case Study: The Kaiser Permanente Approach
Presented by Ted Cooper, MD, National Director, Confidentiality & Security, Kaiser Permanente Kaiser Permanente
Kaiser Foundation Health Plan Kaiser Foundation Hospitals Region....
Transactions Standards
Author: Braithwaite, Bill
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
2000 HIPAA Conference Presentation
Transactions Standards
Presented by Bill Braithwaite, MD, PhD, FACMI, Senior Advisor on Health Information Policy, US Dept. of HSS
Transaction Standards
NPRM published in 1998 (5/7/98 - 7/6/98) Adopts ASC X12N standards for transactions (e....
HIPAA Electronic Transactions
Author: Miller, Susan A
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
2000 HIPAA Conference Presentation
HIPAA Electronic Transactions
Presented by Susan A. Miller, Esquire, Corporate Regulatory & Compliance Manager, IDX Systems Company HIPAA Summary
Title II, Subtitle FAdministrative Simplification of the Health Insurance Portability and Accoun....
Lessons Learned from a Security Assessment
Author: Cummings, Judy
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
2000 HIPAA Conference Presentation
Lessons Learned from a Security Assessment
Presented by Judy Cummings, Senior Manager, Strategic Development
Sharp Healthcare Information Systems Presentation Overview
After this presentation, you will know these things about a security assessm....
Code Sets: Improving the Quality of Coded Data
Author: Dixon-Lee, Claire
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
2000 HIPAA Conference Presentation
Code Sets: Improving the Quality of Coded Data
Presented by Claire Dixon-Lee, PhD, RHIA Future of Code Sets
Data Content Standardization Data Elements including formats and definitions Code Sets and values
Maximum defined data set Computer-....
Information Security
Author: Tang, Paul C.
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
2000 HIPAA Conference Presentation
Information Security
Presented by Paul Tang, MD Information Systems Security
NRC Definition Security is the protection of information systems against unauthorized access to or modification of information, whether in storage, processing, or transit,....
Getting Ready for HIPAA Privacy Rules
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: April 2000
What do the proposed privacy regulations mean to HIM professionalsand what can you do now to begin to prepare? The author takes an in-depth look at the proposed rules.
The Health Insurance Portability and Accountability Act (HIPAA) of 1996 is bringing significant changes to the ma....
Next Steps? First Steps? Getting a Grip on HIPAA Security Standards
Author: Zender, Anne
Source: Journal of AHIMA
Publication Date: April 2000
How ready are healthcare organizations to put the proposed security regulations connected to HIPAA into effect? What are the next steps-or, in some cases, first steps-HIM professionals should take? Our panel of experts offers some advice.
So you thought preparing for Y2K was a lot o....
HIPAA: Understanding the Requirements (HIPAA on the Job)
Author: Cassidy, Bonnie S.
Source: Journal of AHIMA
Publication Date: April 2000
(Editor's note: This is the first in a series of special inserts intended to help HIM professionals educate themselves about the Health Insurance Portability and Accountability Act [HIPAA] of 1996. In this installment, we take a look at this groundbreaking legislation from a nuts-and-bolts pe....
At Close Range: Protecting Privacy Through Proximity Access Control
Author: Brostoff, George
Source: In Confidence (newsletter)
Publication Date: May 02, 2000
What if a healthcare workstation could automatically recognize who was requesting access to its information and resources? What if users could be positively identified by simply approaching the workstation, or if workstations “knew” when authorized employees walked away, instantly closing con....
Standards Organizations Plan Collaboration
Author:
Source: Journal of AHIMA
Publication Date: June 2000
In March, the National Committee on Vital and Health Statistics (NCVHS) Subcommittee on Standards and Security reached an agreement with six standard-setting organizations. The six organizations include the Accredited Standards Committee X12, Dental Content Committee, Health Level Seven,....
Understanding HIPAA's Transaction and Code Set Standards (HIPAA on the Job)
Author: Cassidy, Bonnie S.
Source: Journal of AHIMA
Publication Date: July 2000
As we have seen in previous installments, part of the Health Insurance Portability and Accountability Act's purpose is to establish standards and requirements that make it easier to maintain and transmit health information electronically. These provisions, known as the administrative simplific....
Standards for Electronic Transactions...Final Rule and Notice
Author: U.S. Centers for Medicare & Medicaid Services
Source: Federal Register
Publication Date: August 17, 2000
Final Rule for Healthcare Electronic Transactions and Code Sets
Author: AHIMA Policy and Government Relations Team
Source: AHIMA regulation analysis
Publication Date: September 02, 2000
The long-anticipated final rule for healthcare electronic transactions and code sets was released on Thursday, August 17, 2000. This final rule (Rule) is the first of several anticipated for release by the Secretary of the Department of Health and Human Services (DHHS) over the next four month....
Understanding Chain of Trust and Business Partner Agreements (HIPAA on the Job)
Author: Cassidy, Bonnie S.
Source: Journal of AHIMA
Publication Date: October 2000
Confused about the differences between privacy and security? You’re not alone. Combine these with the jargon-laden chain of trust and business partner agreement issues, and a whole new set of questions about HIPAA implementation emerges.
Privacy, pursuant to HIPAA, addresses the righ....
Security @ the Edge
Author: Boroditsky, Marc
Source: In Confidence (newsletter)
Publication Date: November 02, 2000
With the pending impact of the Health Insurance Portability and Accountability Act (HIPAA) requirements and the high hopes for fully automated e-medical informatics, healthcare information professionals must gain an appreciation for the edge of their networks. More than ever before, the edge....
HHS Releases Final Rules for HIPAA Transactions, Code Sets
Author: Rode, Dan
Source: Journal of AHIMA
Publication Date: November 2000
HIM professionals have new HIPAA challenges to prepare for: this summer, the Department of Health and Human Services (HHS) released the highly anticipated final rule for certain transaction sets and codes.1 The rule was effective on October 16, 2000, and under HIPAA legislation, most....
Understanding HIPAA Transactions and Code Sets
Author: Rode, Dan
Source: Journal of AHIMA
Publication Date: January 2001
The recently published final regulations for transactions and code sets under HIPAA are the light at the end of the tunnel in the quest for uniform healthcare standards-and the first step on a long road to HIPAA implementation. What are the standard transactions and code sets? This article tak....
Next Challenge: Employee Training on Privacy, Security (HIPAA on the Job)
Author: Cassidy, Bonnie S.
Source: Journal of AHIMA
Publication Date: January 2001
Organizations must provide general awareness training for every employee and affiliate. This process should build general awareness of confidentiality and security issues for all employees. For employees with access to electronic health information, the organization should include job-specific....
Wrestling the HIPAA Security Regulations: Two Experts' Advice
Author: Austin, Steven
Source: Journal of AHIMA
Publication Date: February 2001
HIM professionals know they need to prepare for HIPAA, but where should they begin? Take a lesson from your peers at two of the nation's leading healthcare facilities.
HIM professionals know that the Health Insurance Portability and Accountability Act of 1996 (HIPAA) i....
Preparing the Physician Office for HIPAA
Author: Uppena, Mary
Source: Journal of AHIMA - Coding Notes
Publication Date: February 2001
Change has been a constant factor in coding and reimbursement with the intensified focus on billing, compliance, and cost control. Out of necessity, coding professionals in physician settings have learned to be organized, adaptable, and armed with the latest information. The mandates....
On the Line: Professional Practice Solutions
Author: Smith, Cheryl M.
Source: Journal of AHIMA
Publication Date: February 2001
Q: Where can I find information on the interpretation of Joint Commission on Accreditation of Healthcare Organization standards?
Q: How does the Health Insurance Portability and Accountability Act of 1996 (HIPAA) define health information in the final rule for healthcare elec....
Measuring HIPAA's Impact (HIPAA on the Job)
Author: Fuller, Sandra R.
Source: Journal of AHIMA
Publication Date: February 2001
As children, most of us stood against a door frame while our parents recorded our height and the date on the wall. These marks climbed each year as reminders of the changes we were experiencing. When relatives visited, we proudly showed off our progress to adulthood.
These....
Who's Covered by HIPAA (HIPAA on the Job)
Author: Rode, Dan
Source: Journal of AHIMA
Publication Date: March 2001
One of the mysteries of the administrative simplification section of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) is determining who is covered or comes under the requirements of the act. This article will examine HIPAA to unravel some of the mystery of &quo....
AHIMA's Statement Regarding Replacement of ICD-9-CM Procedural Coding System
Author: Kloss, Linda L
Source: AHIMA testimony and comments
Publication Date: May 17, 2001
Thursday, May 17, 2001
Good morning, I am Linda Kloss, chief executive officer of the American Health Information Management Association (AHIMA). On behalf of the Association, I thank you for this opportunity to provide input on replacing the ICD-9-CM procedural coding system with ICD-10-....
Data Mapping for HIPAA Transactions (HIPAA on the Job)
Author: Amatayakul, Margret; Bisterfeldt, Joan
Source: Journal of AHIMA
Publication Date: July 2001
If you have been focusing primarily on HIPAA’s privacy and security regulations, not transactions requirements, this "HIPAA on the Job" is a must-read. Ensuring that you have all the required data content in your electronic systems is key to your organization’s compliance with the t....
Five Steps to Reading the HIPAA Rules (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: September 2001
HIPAA's administrative simplification regulations appear to be anything but simple. Part of the Health Insurance Portability and Accountability Act of 1996, these provisions are intended to achieve efficiency and effectiveness and promote use of information systems. There are definite....
Developing a Framework for a Security Assessment
Author: Parisien, Darryl
Source: In Confidence (newsletter)
Publication Date: September 02, 2001
Is your organization taking the necessary actions to comply with the security regulations of HIPAA? Do you believe you have more time to comply? If you think you do, you might want to do a little more research. Take note that United States Code Title 42 Section 1320d-2 states:
Each pers....
NCVHS Groups Explore CPR, Privacy Rule Possibilities
Author: Rode, Dan
Source: Journal of AHIMA
Publication Date: October 2001
HIPAA's fifth anniversary was marked by meetings of two key subcommittees of the National Committee on Vital and Health Statistics (NCVHS): the standards (transactions) and security subcommittee and the privacy and confidentiality subcommittee. At the security subcommittee, experts fr....
Early Word on HIPAA Claims Attachments
Author: Dougherty, Michelle
Source: Journal of AHIMA
Publication Date: October 2001
If we could look into a crystal ball and see into the future, it would be much easier to prepare for HIPAA, particularly the electronic transaction standards. Because of the rarity of crystal balls these days, we must rely on other predictors at our disposal, such as the white paper issued by t....
Selecting Strong Passwords (HIPAA on the Job)
Author: Amatayakul, Margret; Walsh, Tom
Source: Journal of AHIMA
Publication Date: October 2001
Are the majority of passwords in your organization something like “Spot1,” “Spot2,” “Spot3” (for Joe, whose password expires every 90 days and whose dog’s name is Spot)? If so, your organization could be at risk. Here’s what you need to....
Conducting a HIPAA Security Risk Assessment
Author: Klein, Jim
Source: AHIMA Convention
Publication Date: October 10, 2001
Introduction
Organizations covered under the Proposed Security Standards1 (the Draft Standard) are facing important regulatory compliance decisions for operational, technical, clinical, and administrative components of their enterprise. With the promulgation of the final Security Stand....
Overview of the HIPAA Security Regulations and Their Impact
Author: Parmigiani, John
Source: AHIMA Convention
Publication Date: October 10, 2001
The HIPAA Security Standards require healthcare providers, health plans, and clearinghouses that transmit health information in electronic form to have reasonable and appropriate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and availabil....
HIPAA Security Standards: Working With Your Information Technology Vendors
Author: Brandt, Mary D.
Source: AHIMA Convention
Publication Date: October 10, 2001
"Information security? I don't need to worry about that. My information technology (IT) vendor will take care of it."
You probably haven't made this comment, but I've heard it many times. It would certainly be convenient if we could delegate responsibility for secur....
On the Line: Professional Practice Solutions
Author: Dougherty, Michelle
Source: Journal of AHIMA
Publication Date: November 2001
Q: Where can I find the updated data elements and data definitions for the Uniform Hospital Discharge Data Set (UHDDS)?
Q: Where can I find an easy-to-use glossary for terms in the HIPAA regulations?
Michelle Dougherty (michelle.dougherty@ahima.org) is an HIM practice manager....
HIPAA Compliance Extension Postpones Simplification Benefits
Author: Rode, Dan
Source: Journal of AHIMA
Publication Date: February 2002
Under the terms of the Health Insurance Portability and Accountability Act of 1996, February 2002 would mark the second anniversary of administrative simplification for all but the smallest of health plans, and one year of rules related to claims attachments. Instead, Congress just approve....
Make Your Telecommuting Program HIPAA Compliant (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: February 2002
An increasing number of healthcare workforce members are telecommuting. As transcriptionists, coders, customer service representatives, and others are working from home, many providers are weighing the benefits against potential privacy and security risks.
Who Is Working from Home....
[1] 2 3 4 5