215 results.
[1] 2 3 4 5 6 7 8 9
Are You Ready for a HIPAA Audit?
Author: Wiedemann, Lou Ann
Source: Journal of AHIMA
Publication Date: April 2017
Using Aliases to Protect Privacy in Healthcare
Author: Barrett, Charlotte S; Beidler, Aurae; Davis, Nancy; Glondys, Barbara
Source: Journal of AHIMA
Publication Date: November 2016
Guidelines for a Compliant Business Associate Agreement (2016)
Author: AHIMA Work Group
Source: AHIMA practice brief
Publication Date: October 2016
Information Governance for Offsite Data Security
Author: Saharia, Devendra
Source: Journal of AHIMA
Publication Date: April 2016
Shifting from Reactive to Proactive HIPAA Audits
Author: Brinda, Danika
Source: Journal of AHIMA
Publication Date: January 2016
Cybersecurity 101
Author: Lucci, Susan; Walsh, Tom
Source: Journal of AHIMA
Publication Date: November 2015
Ensuring Your Business Associates Provide ‘Satisfactory Assurances’
Author: Lewis, Sharon; McLendon, Kelly
Source: Journal of AHIMA
Publication Date: October 2015
Cracking Encryption: Despite Benefits, Technology Still Not Widely Used to Combat Multi-Million Dollar Breaches
Author: Butler, Mary
Source: Journal of AHIMA
Publication Date: April 2015
Industry Awaits Phase 2 of HIPAA Audit Program
Author: Asmonga, Donald D.
Source: Journal of AHIMA
Publication Date: January 2015
HIPAA Breach Enforcement Roundup
Author: Cacciatore, Victoria; Downing, Katherine
Source: Journal of AHIMA
Publication Date: July 2014
Black Market PHI Does Exist: Why It’s Time to Take Security Risk Assessments Seriously
Author:
Source: Journal of AHIMA
Publication Date: May 2014
On the HIPAA Hook
Author: Hicks, Andrew
Source: Journal of AHIMA
Publication Date: April 2014
Security Risk Analysis and Management: An Overview (2013 update)
Author: Walsh, Tom
Source: AHIMA practice brief
Publication Date: November 2013
Guidelines for a Compliant Business Associate Agreement - Retired
Author: AHIMA
Source: AHIMA practice brief
Publication Date: November 2013
HIPAA Security Overview - Retired
Author: Miaoulis, William M
Source: AHIMA practice brief
Publication Date: November 2013
Privacy and Security Training (2013 update) - Retired
Author: Downing, Kathy; Lucci, Susan; Lerch, Diane M
Source: AHIMA practice brief
Publication Date: October 2013
When to Send a Breach Notification: New HIPAA Rules Revise “Harm” Standard
Author: Warner, Diana
Source: Journal of AHIMA
Publication Date: April 2013
HIPAA Mighty and Flawed: Regulation has Wide-Reaching Impact on the Healthcare Industry
Author: Solove, Daniel J
Source: Journal of AHIMA
Publication Date: April 2013
Analysis of Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification Rules under HITECH and GINA; Other Modifications to the HIPAA Rules
Author: AHIMA
Source: AHIMA regulation analysis
Publication Date: January 25, 2013
Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification Rules Under the Health Information Technology for Economic and Clinical Health Act and the Genetic Information Nondiscrimination Act; Other Modifications to the HIPAA Rules; Final Rule
Author: U.S. Office for Civil Rights
Source: U.S. Department of Health & Human Services | U.S. Office for Civil Rights
Publication Date: January 2013
HIPAA Compliance for Clinician Texting
Author: Greene, Adam H
Source: Journal of AHIMA
Publication Date: April 2012
Keeping It Private: Staying Compliant with the HIPAA Privacy and Security Rules
Author: Tomes, Jonathan P.
Source: Journal of AHIMA
Publication Date: March 2012
Automation for Privacy and Security Compliance
Author: McLendon, Kelly
Source: Journal of AHIMA
Publication Date: March 2012
Simplification at Last? HHS Rolls out Operating Rules for HIPAA Transaction Standards
Author: Dimick, Chris
Source: Journal of AHIMA
Publication Date: February 2012
HHS Steps up HIPAA Audits: Now Is the Time to Review Security Policies and Procedures
Author: Greene, Adam H
Source: Journal of AHIMA
Publication Date: October 2011
[1] 2 3 4 5 6 7 8 9