215 results.
[1] 2 3
Are You Ready for a HIPAA Audit?
Author: Wiedemann, Lou Ann
Source: Journal of AHIMA
Publication Date: April 2017
Using Aliases to Protect Privacy in Healthcare
Author: Barrett, Charlotte S; Beidler, Aurae; Davis, Nancy; Glondys, Barbara
Source: Journal of AHIMA
Publication Date: November 2016
Guidelines for a Compliant Business Associate Agreement (2016)
Author: AHIMA Work Group
Source: AHIMA practice brief
Publication Date: October 2016
Information Governance for Offsite Data Security
Author: Saharia, Devendra
Source: Journal of AHIMA
Publication Date: April 2016
Shifting from Reactive to Proactive HIPAA Audits
Author: Brinda, Danika
Source: Journal of AHIMA
Publication Date: January 2016
Cybersecurity 101
Author: Lucci, Susan; Walsh, Tom
Source: Journal of AHIMA
Publication Date: November 2015
Ensuring Your Business Associates Provide ‘Satisfactory Assurances’
Author: Lewis, Sharon; McLendon, Kelly
Source: Journal of AHIMA
Publication Date: October 2015
Cracking Encryption: Despite Benefits, Technology Still Not Widely Used to Combat Multi-Million Dollar Breaches
Author: Butler, Mary
Source: Journal of AHIMA
Publication Date: April 2015
Industry Awaits Phase 2 of HIPAA Audit Program
Author: Asmonga, Donald D.
Source: Journal of AHIMA
Publication Date: January 2015
HIPAA Breach Enforcement Roundup
Author: Cacciatore, Victoria; Downing, Katherine
Source: Journal of AHIMA
Publication Date: July 2014
Black Market PHI Does Exist: Why It’s Time to Take Security Risk Assessments Seriously
Author:
Source: Journal of AHIMA
Publication Date: May 2014
On the HIPAA Hook
Author: Hicks, Andrew
Source: Journal of AHIMA
Publication Date: April 2014
Security Risk Analysis and Management: An Overview (2013 update)
Author: Walsh, Tom
Source: AHIMA practice brief
Publication Date: November 2013
Guidelines for a Compliant Business Associate Agreement - Retired
Author: AHIMA
Source: AHIMA practice brief
Publication Date: November 2013
HIPAA Security Overview - Retired
Author: Miaoulis, William M
Source: AHIMA practice brief
Publication Date: November 2013
Privacy and Security Training (2013 update) - Retired
Author: Downing, Kathy; Lucci, Susan; Lerch, Diane M
Source: AHIMA practice brief
Publication Date: October 2013
When to Send a Breach Notification: New HIPAA Rules Revise “Harm” Standard
Author: Warner, Diana
Source: Journal of AHIMA
Publication Date: April 2013
HIPAA Mighty and Flawed: Regulation has Wide-Reaching Impact on the Healthcare Industry
Author: Solove, Daniel J
Source: Journal of AHIMA
Publication Date: April 2013
Analysis of Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification Rules under HITECH and GINA; Other Modifications to the HIPAA Rules
Author: AHIMA
Source: AHIMA regulation analysis
Publication Date: January 25, 2013
Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification Rules Under the Health Information Technology for Economic and Clinical Health Act and the Genetic Information Nondiscrimination Act; Other Modifications to the HIPAA Rules; Final Rule
Author: U.S. Office for Civil Rights
Source: U.S. Department of Health & Human Services | U.S. Office for Civil Rights
Publication Date: January 2013
HIPAA Compliance for Clinician Texting
Author: Greene, Adam H
Source: Journal of AHIMA
Publication Date: April 2012
Keeping It Private: Staying Compliant with the HIPAA Privacy and Security Rules
Author: Tomes, Jonathan P.
Source: Journal of AHIMA
Publication Date: March 2012
Automation for Privacy and Security Compliance
Author: McLendon, Kelly
Source: Journal of AHIMA
Publication Date: March 2012
Simplification at Last? HHS Rolls out Operating Rules for HIPAA Transaction Standards
Author: Dimick, Chris
Source: Journal of AHIMA
Publication Date: February 2012
HHS Steps up HIPAA Audits: Now Is the Time to Review Security Policies and Procedures
Author: Greene, Adam H
Source: Journal of AHIMA
Publication Date: October 2011
Tracking the Industry’s Progress: AHIMA Survey on ICD-10 and 5010 Compliance
Author: AHIMA
Source: AHIMA
Publication Date: September 21, 2011
Aligning ICD-10: Federal Initiatives Recognize the Value of Integration
Author: Rode, Dan
Source: Journal of AHIMA
Publication Date: June 2011
Security Audits of Electronic Health Information (2011 update)
Author: AHIMA
Source: AHIMA practice brief
Publication Date: March 2011
Managing External Reviewer Requests in the EHR: Considerations, Requirements, and Associated Expenses
Author: Wiedemann, Lou Ann
Source: Journal of AHIMA
Publication Date: March 2011
The Year That Was and the Year to Be
Author: Asmonga, Donald D.
Source: Journal of AHIMA
Publication Date: February 2011
Security Risk Analysis and Management: an Overview (2011 update)
Author: Walsh, Tom
Source: AHIMA practice brief
Publication Date: January 2011
ICD-10’s Impact on Noncovered Entities: Many Reasons Will Lead to Voluntary Upgrades
Author: Bowman, Sue E; Leon-Chisen, Nelly
Source: Journal of AHIMA
Publication Date: January 2011
HIPAA Privacy and Security Training (2010 update)
Author: AHIMA
Source: AHIMA practice brief
Publication Date: November 2010
HIPAA Security Overview (2010 update)
Author: AHIMA
Source: AHIMA practice brief
Publication Date: November 2010
Prepare Now for Coming HIPAA Security Reviews
Author:
Source: AHIMA Advantage
Publication Date: October 2010
ICD-9-CM Coding Guidance for LTC Facilities. Appendix A: Planning for the ICD-10-CM Transition for LTC Facilities
Author: AHIMA
Source: AHIMA practice brief attachment
Publication Date: October 2010
Three Short Years: Organizations Lagging in 5010 and ICD-10 Progress
Author: Dimick, Chris
Source: Journal of AHIMA
Publication Date: September 2010
Environmental Scan: Unique Health Plan Identifier And Operating Rules for Health Information Transactions
Author: Amatayakul, Margret
Source: U.S. National Committee for Vital and Health Statistics
Publication Date: July 11, 2010
Putting It in Writing: Updating BA Agreements to Cover Breach Notification
Author: Hjort, Beth M.; Rhodes, Harry B.
Source: Journal of AHIMA
Publication Date: June 2010
Preparing for 5010: Internal testing of HIPAA Transaction Upgrades recommended by December 31
Author: Moynihan, Jim
Source: Journal of AHIMA
Publication Date: January 2010
2010 Healthcare Calendar: The Deadlines and Initiatives to Prepare for This Year
Author: Rode, Dan
Source: Journal of AHIMA
Publication Date: January 2010
CMS’s 2009 Security Assessment Process
Author: Dinh, Angela K.
Source: Journal of AHIMA
Publication Date: September 2009
Analysis of the Final Rule, January 16, 2009, Health Insurance Reform: Modifications to the Health Insurance Portability and Accountability Act (HIPAA) Electronic Transaction Standards
Author: Rode, Dan
Source: AHIMA regulation analysis
Publication Date: February 02, 2009
Analysis of the Final Rule: HIPAA Administrative Simplification: Modification to Medical Data Code Set Standards to Adopt ICD-10-CM and ICD-10-PCS
Author: Rode, Dan
Source: AHIMA regulation analysis
Publication Date: February 02, 2009
Reassessing Your Security Practices in a Health IT Environment: a Guide for Small Health Care Practices
Author: U.S. Office of the National Coordinator for Health Information Technology; U.S. Office for Civil Rights
Source: Government (U.S.)
Publication Date: December 16, 2008
Nationwide Review of the Centers for Medicare & Medicaid Services Health Insurance Portability and Accountability Act of 1996 Oversight
Author: U.S. Department of Health and Human Services. Office of the Inspector General
Source: Government (U.S.)
Publication Date: October 27, 2008
Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule [revision 1]
Author: Scholl, Matthew; Stine, Kevin; Hash, Joan; Bowen, Pauline; Johnson, Arnold; Smith, Carla; Steinberg, Daniel
Source: Government (U.S.)
Publication Date: October 24, 2008
Health Insurance Reform: Modifications to the Health Insurance Portability and Accountability Act Electronic Transaction Standards. Proposed Rule
Author: U.S. Department of Health and Human Services. Office of the Secretary
Source: Government (U.S.)
Publication Date: August 22, 2008
HIPAA Security Compliance: What Comes Next?
Author: Dinh, Angela K.
Source: External - used with permission
Publication Date: May 02, 2008
Sample - Interview and Document Request for HIPAA Security Onsite Investigations and Compliance Reviews
Author: U.S. Centers for Medicare & Medicaid Services
Source: Government (U.S.)
Publication Date: May 02, 2008
Enhancing Protections for Uses of Health Data: a Stewardship Framework. Summary for Policy Makers
Author: National Committee on Vital and Health Statistics (NCVHS)
Source: Government (U.S.)
Publication Date: April 24, 2008
Integrating Privacy and Security: Coordination Benefits HIPAA Compliance Efforts
Author: Adler, M. Peter
Source: Journal of AHIMA
Publication Date: April 2008
Enhanced Protections for Uses of Health Data: a Stewardship Framework for ‘Secondary Uses’ of Electronically Collected and Transmitted Health Data
Author: National Committee on Vital and Health Statistics (NCVHS)
Source: Government (U.S.)
Publication Date: December 19, 2007
Security Standards: Implementation for the Small Provider
Author: U.S. Centers for Medicare & Medicaid Services
Source: Government (U.S.)
Publication Date: December 10, 2007
HIPAA Security Redux: A Re-evaluation Process and Recommended Areas to Review
Author: Adler, M. Peter
Source: Journal of AHIMA
Publication Date: November 2007
Safeguards for Remote Access
Author: AHIMA Privacy and Security Practice Council
Source: Journal of AHIMA
Publication Date: July 2007
Value of HIM in Privacy and Security Compliance
Author: Amatayakul, Margret; Work, Mitch
Source: Journal of AHIMA
Publication Date: May 2007
HIPAA Security Guidance
Author: U.S. Centers for Medicare & Medicaid Services
Source: Government (U.S.)
Publication Date: January 03, 2007
The State of HIPAA Privacy and Security Compliance, 2006
Author: AHIMA
Source: AHIMA report
Publication Date: April 19, 2006
Running out of Room for Data: HIPAA Requires Healthcare Organizations to Re-assess Data Storage
Author: Brick, Frank
Source: Journal of AHIMA
Publication Date: April 2006
Managing Data Content: Clinical Data Management Programs Improve Reimbursement
Author: Rhodes, Harry B.
Source: Journal of AHIMA
Publication Date: February 2006
HIPAA Administrative Simplification: Standards for Electronic Health Care Claims Attachments CMS-0050-P
Author: Rode, Dan
Source: AHIMA testimony and comments
Publication Date: January 20, 2006
You Can't Throw IT in the Dumpster Anymore: Tips for Finding a Qualified Electronic Waste Disposal Service
Author: Harford, Joseph P.; Rizzo, Karen
Source: Journal of AHIMA
Publication Date: January 2006
HIPAA Compliance in U.S. Hospitals: A Self-Report of Progress Toward the Security Rule
Author: Having, Karen; Davis, Diane C.
Source: Perspectives in Health Information Management
Publication Date: November 2005
Medical Record Security/Risk Assessment
Author: Chitvanni, Norma; Corbosiero, Amy ; Raymond, Jacqueline; Robbins, Shari; Shaw, Donna
Source: AHIMA Convention
Publication Date: October 21, 2005
Taking Charge of Issues in Auditing for HIPAA Security Rule Compliance
Author: Travis, John
Source: AHIMA Convention
Publication Date: October 21, 2005
Spoliation of Medical Evidence
Author: Tomes, Jonathan P.
Source: Journal of AHIMA
Publication Date: October 2005
Basics of Risk Analysis and Risk Management
Author: U.S. Centers for Medicare & Medicaid Services
Source: Government (U.S.)
Publication Date: August 18, 2005
Destroying Data the DoD Way: Military Standards Help Ensure Compliance for Electronic Data Security
Author: Keating, Angie Singer
Source: Journal of AHIMA
Publication Date: July 2005
How to Safely Recycle PCs
Author: Quinsey, Carol Ann
Source: Journal of AHIMA
Publication Date: June 2005
Security Standards: Organizational, Policies and Procedures and Documentation Requirements
Author: U.S. Centers for Medicare & Medicaid Services
Source: Government (U.S.)
Publication Date: May 02, 2005
HIPAA Security: Don't Disband the Committee Just Yet
Author: Brown, Stephen C.
Source: Journal of AHIMA
Publication Date: May 2005
State of HIPAA Privacy and Security Compliance 2005
Author: AHIMA
Source: AHIMA report
Publication Date: April 11, 2005
Putting the Finishing Touches to Security: Are You Ready?
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: April 2005
HIPAA Audit and System Activity Review: Developing a Process that Focuses on the Greatest Risks First
Author: Hofler, Linda D.; Hardee, Joy; Dildy, Kenneth; Burleson, Deeanna; Grady, Jamie
Source: Journal of AHIMA
Publication Date: March 2005
Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
Author: Hash, Joan; Bowen, Pauline; Johnson, Arnold; Smith, Carla; Steinberg, Daniel
Source: Government (U.S.)
Publication Date: March 02, 2005
Safeguarding ePHI from Fire the Dry Way
Author: Brown, Karen
Source: Journal of AHIMA
Publication Date: March 2005
Reporting Security Incidents
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: March 2005
HIPAA Marches On--Or Does It?
Author: Rode, Dan
Source: Journal of AHIMA
Publication Date: March 2005
26.2-mile Security Rule: Is Your Organization Gaining on Compliance or Just Running in Place?
Author: Walsh, Tom
Source: Journal of AHIMA
Publication Date: March 2005
Security Standards: Physical Safeguards
Author: U.S. Centers for Medicare & Medicaid Services
Source: Government (U.S.)
Publication Date: February 28, 2005
Security Standards: Technical Safeguards
Author: U.S. Centers for Medicare & Medicaid Services
Source: Government (U.S.)
Publication Date: February 28, 2005
Access Controls: Striking the Right Balance
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: January 2005
HIPAA Acknowledgments: the Need for a Standard Transaction Acknowledgment
Author: WebMD
Source: External web site
Publication Date: November 24, 2004
Security 101 for Covered Entities
Author: U.S. Centers for Medicare & Medicaid Services
Source: Government (U.S.)
Publication Date: November 23, 2004
Security Standards: Administrative Safeguards
Author: U.S. Centers for Medicare & Medicaid Services
Source: Government (U.S.)
Publication Date: November 23, 2004
What is Security Auditing?
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: November 2004
HIPAA Requirements for Secure Record Storage and Data Transfer
Author: Rosenbaum, Arnold S.; Nelson, Gina A.
Source: AHIMA Convention
Publication Date: October 15, 2004
Perspectives on Managing Regulations: HIPAA
Author: Davis, Nancy; Lemery, Chrisann
Source: AHIMA Convention
Publication Date: October 15, 2004
More Than Code Revisions in the 2004 Changes to ICD-9-CM
Author: Giannangelo, Kathy
Source: Journal of AHIMA - Coding Notes
Publication Date: October 2004
Trouble with Audit Controls
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: October 2004
HIPAA Security FAQs
Author: U.S. Centers for Medicare & Medicaid Services
Source: Government (U.S.)
Publication Date: August 16, 2004
HIPAA Implementation: the Case for a Rational Roll-out Plan
Author: WebMD
Source: External web site
Publication Date: July 19, 2004
Kick Starting the Security Risk Analysis
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: July 2004
Updated Toolkit for Security Strategies
Author: Cooper, Ted
Source: Journal of AHIMA
Publication Date: July 2004
Primer on Encryption
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: June 2004
HIPAA Security Shopping List (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: May 2004
National Health Information Privacy and Security Week: Understanding the HIPAA Privacy and Security Rules
Author: AHIMA
Source: AHIMA presentation | AHIMA recognition week resources
Publication Date: April 12, 2004
2004 HIPAA Privacy & Security Compliance Survey
Author: AHIMA
Source: AHIMA
Publication Date: April 12, 2004
Security Awareness: The Right Messages
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: April 2004
[1] 2 3