215 results.
1 [2] 3
HIPAA Security Overview
Author: Quinsey, Carol Ann
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: April 2004
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
Preparing for the Next Big April
Author: Thomason, Mary
Source: Journal of AHIMA
Publication Date: April 2004
Yesterday’s privacy compliance preparations can contribute to meeting tomorrow’s security mandates. One organization is tackling risk analysis with both matrix and memories.
The 2003 HIPAA privacy rule implementation is still fresh in many minds throughout healthcare organiza....
Health Insurance Portability and Accountability Act (HIPAA) X12N 837 Health Care Claim Implementation Guide (IG) Editing Additional Instruction
Author: U.S. Centers for Medicare & Medicaid Services
Source: Government (U.S.)
Publication Date: March 25, 2004
Testimony of the California Health Information Association to the Joint Hearing of the Select Committee on International Trade Policy and State Legislation and the Senate Business and Professions Committee
Author: LaMoureaux, LaVonne
Source: AHIMA testimony and comments
Publication Date: March 09, 2004
Destination 10: Healthcare Organization Preparation for ICD-10-CM and ICD-10-PCS (2004 update)
Author: AHIMA Coding Products and Services Team
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: March 2004
This practice brief has been retired. It is made available for historical purposes only.
Journal Q&A (2/04)
Author: AHIMA Professional Practice Team
Source: AHIMA Q and A
Publication Date: February 02, 2004
Q: Can you explain the difference between the terms “addressable” and “required” as they are used in the final security rule?
A: The final security rule and the privacy rule use the terms “standards” and “implementation specifications.” Standards....
Safe at Home: Remote Coding Meets HIPAA
Author: Keough, Tim
Source: Journal of AHIMA
Publication Date: February 2004
Remote coding offers big benefits and unique security challenges. Here’s how one organization moves patient data securely across the Internet.
"Whatever, in connection with my professional practice, or not in connection with it, I see or hear, in the life of men, which ought....
Electronic Record, Electronic Security
Author: Hagland, Mark
Source: Journal of AHIMA
Publication Date: February 2004
New technologies are enhancing the ability to protect patient information. But there’s more to successful implementation than just what’s inside the box.
Melanie Schattauer, RHIA, Jack Obert, and their colleagues at Mercy St. John’s Health System in Springfield, M....
Securing Executive Support for Security (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: February 2004
Many information privacy officials (IPOs) and information security officials (ISOs) may be facing what seems like an uphill battle to gain support for security measures believed to be necessary to comply with the HIPAA security rule. There are a number of converging factors that can influence....
HIPAA and the EHR: Making Technical Safeguard Changes
Author: Fodor, Joseph
Source: Journal of AHIMA
Publication Date: January 2004
As electronic health records (EHRs) become more commonplace in healthcare, changes, adjustments, and improvements will be inevitable. When designing, implementing, upgrading, or remediating an EHR system, your organizations implementation team should consider the impact of complying wit....
Finding Quality HIPAA Security Resources (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: January 2004
Many of us struggled to understand the HIPAA privacy rule and initially had few resources to turn to for help. As your organization begins planning for security rule compliance, however, many of you may be finding that you’re overwhelmed with the volume of potential resources available.....
Physical Security and HIPAA: What You Need to Know Now
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: December 02, 2003
This article is the final installment of a 10-part series that introduced the domains of information security and related them to federal HIPAA regulations. The information security domain of physical security covers threats against and the controls required to protect facilities, equipment,....
Security Audits (2003 update)
Author: Hjort, Beth M.
Source: AHIMA practice brief
Publication Date: November 2003
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
HIPAA Privacy and Security Training (2003 update)
Author: Hjort, Beth M.
Source: AHIMA practice brief
Publication Date: November 2003
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
How Law, Investigation, Ethics Connect to HIPAA
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: November 02, 2003
Part nine in a 10-part series.
This article is the ninth of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. The information security domain of law, investigation, and ethics covers these topics in depth and provides a p....
Rethinking Initial HIPAA Efforts (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: November 2003
Many healthcare organizations met the compliance date of April 14, 2003, for HIPAA privacy by addressing the most visible featuresimplementing a notice of privacy practices, assigning an information privacy official (IPO), and conducting training sessions.
But a review of....
Study Reveals Risk of Unsecured PHI in E-mail Communications
Author: Reams, Cary
Source: In Confidence (newsletter)
Publication Date: November 02, 2003
E-mail has become both an important business tool and a slippery slope when it comes to HIPAA compliance. Though HIPAA requires “reasonable and appropriate safeguards” whenever e-mailing protected health information (PHI), a recent study conducted by Zix Corporation shows that healthcare orga....
Security Risk Analysis and Management: an Overview
Author: Amatayakul, Margret
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: October 2003
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
HIPAA Reins in Shadow Charts, Independent Databases (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: October 2003
Shadow charts, independent databases, or orphan systems, as they are sometimes called, are among the most controversial and difficult to manage forms of protected health information (PHI) that exist. Yet some providers are having success using HIPAAs privacy and security stan....
CPT Category III Codes Cover New, Emerging Technologies: New Codes Developed to Address Issues in Light of HIPAA
Author: Beebe, Michael
Source: Journal of AHIMA - Coding Notes
Publication Date: October 2003
In 1998, the American Medical Association (AMA) initiated the CPT-5 Project. This project was a broad-based and comprehensive effort to make needed and practical enhancements to the CPT code set that would address challenges presented by emerging user needs and HIPAA. One of the initiatives tha....
Uncovering the Enemy Within: Utilizing Incident Response, Forensics
Author: Derhak, Mike
Source: In Confidence (newsletter)
Publication Date: September 02, 2003
Inappropriate sharing of protected health information. Sending intimidating e-mails. Browsing inappropriate Web sites. Downloading unauthorized Web content. Software, music, or video piracy. These are just a few examples of internal security breaches companies may face. According to the 2003....
Managing Applications, Systems Development Security Under HIPAA
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: September 02, 2003
Part seven in a 10-part series.
This article is the seventh of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. The information security domain of applications and systems development includes topics that cover the craft....
Medicare Program; Electronic Submission of Medicare Claims
Author: U.S. Centers for Medicare & Medicaid Services
Source: Federal Register
Publication Date: August 15, 2003
Security and HIPAA: Protecting Your Operations
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: August 02, 2003
Part six in a 10-part series.
This article is the sixth of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. The information security domain of operations security includes the topics of controls, protections, monitoring,....
Establishing Security Safeguards to Meet the Privacy Rule: What You Need to Know
Author: Gallagher, Lisa; Yale, Ken
Source: In Confidence (newsletter)
Publication Date: August 02, 2003
The HIPAA privacy rule requires that a covered entity (CE) institute appropriate administrative, technical, and physical measures to reasonably safeguard the privacy of protected health information (PHI). In order to keep information “private,” it must be kept safe or secure. Therefore, logic....
Handling Security Breaches Under HIPAA: a Legal Perspective
Author: Gradle, Brian D.
Source: In Confidence (newsletter)
Publication Date: August 02, 2003
If you were to ask health information managers for a one-word response to HIPAA, the majority of the replies would likely be “privacy.”However, simply because the compliance date for the final security rule (which was published by the government in February and applies to electronic informati....
Guidance on Compliance with HIPAA Transactions and Code Sets after the October 16, 2003, Implementation Deadline
Author: U.S. Centers for Medicare & Medicaid Services
Source: Government (U.S.)
Publication Date: July 24, 2003
HIPAA Transaction Standards Force OASIS Changes for Home Health
Author: Abraham, Prinny
Source: AHIMA community resource
Publication Date: July 24, 2003
Most Home Health Agencies bill Medicare electronically for skilled care provided to beneficiaries. OASIS (Outcome and Assessment Information Set) is the standard instrument used to determine correct case mix assignment under Medicare prospective payment system regulations. The diagnoses used on....
Ready for the Transactions Rule? Get Started with Code Sets (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: July 2003
October 16, 2003, is just a few months away. Has your organization addressed all the code set issues that are part of the HIPAA financial and administrative transactions and code sets requirements?
Because providers are accustomed to using many of the medical code sets required....
Building Privacy: Security Architecture, Models Under HIPAA
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: July 02, 2003
Part five in a 10-part series.
This article is the fifth of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. The information security domain of security architecture and models speaks to computer architectures, security....
Stealth Software Deters PHI Theft
Author: Kawles, Terrance L.
Source: Journal of AHIMA
Publication Date: July 2003
As the leading edge of digital portability advances, the protections afforded the portability portion of HIPAA become strained. Under the final security standards, covered entities (CEs) must establish procedures and mechanisms to protect the confidentiality, integrity, and availab....
Understanding HIPAA Enforcement: Trust, but Verify
Author: Apple, Gordon J.
Source: In Confidence (newsletter)
Publication Date: June 02, 2003
Former President Ronald Reagan coined a phrase during the Cold War, “trust, but verify,” regarding treaties with the former Soviet Union. Today, as we ponder the enforcement environment likely to emerge over HIPAA, a more apt phrase may be “trust, don’t do much, and react to public pressure.”....
Translating the Language of Security (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: June 2003
There were no big surprises in the final security rule. As promised, it has been reconciled with the privacy rule and most redundancies were removed. The security rule addresses only electronic protected health information (ePHI), though we must not forget the privacy rules mini-se....
Sorting Out Employee Sanctions
Author: Burrington-Brown, Jill
Source: Journal of AHIMA
Publication Date: June 2003
Has your organization addressed sanctions related to privacy and security issues? Both the final privacy rule and final security rule address this issue. The privacy rule states that the covered entity must have and apply appropriate sanctions against members of its workforce who fail to....
Final Security Regulations Present Challenges, Opportunities for HIM
Author: Rode, Dan
Source: Journal of AHIMA
Publication Date: May 2003
With the release of the final HIPAA security regulations in February, HIM has taken yet another step toward the transition from paper to the electronic health record (EHR). This article discusses key areas of security compliance and how your organization can be prepared.
When PHI Go....
Understanding Telecommunications, Network Security, and HIPAA
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: May 02, 2003
Part three in a 10-part series.
This article is the third of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. The third information security domain of telecommunications and network security is the largest and most compl....
Exploring HIPAA's Security Domains: Security Management Practices
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: March 02, 2003
Part one in a 10-part series.
This article is the first of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. This first domain of security management practices is the most general and introduces some topics t....
Think You're Ready? Don't Forget the Self-insured Health Plan (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: March 2003
Many providers are putting the finishing touches on their HIPAA privacy compliance activitiesbut may have overlooked their self-insured health plan or assumed that their third-party administrator (TPA) was taking care of HIPAA compliance. Now is the time to take a closer look at your sel....
Final Rule for HIPAA Security Standards: Analysis by the American Health Information Management Association Policy and Government Relations Team - February 2003
Author: AHIMA Policy and Government Relations Team
Source: AHIMA regulation analysis
Publication Date: February 28, 2003
Impact | This Analysis Includes | General Rules | Administrative Safeguards | Physical Safeguards | Technical Safeguards | Organizational Requirements | Policies, Procedures, and Documentation | Matrix | Introduction
After a wait of some four and one-half years, the Department of He....
Health Insurance Reform: Security Standards; Final Rule
Author: U.S. Centers for Medicare & Medicaid Services
Source: Government (U.S.)
Publication Date: February 20, 2003
Health Insurance Reform: Modifications to Electronic Data Transaction Standards and Code Sets; Final Rule
Author: U.S. Centers for Medicare & Medicaid Services
Source: Government (U.S.)
Publication Date: February 20, 2003
AHIMA Advantage E-alert [Special edition]
Author: AHIMA
Source: AHIMA newsletter
Publication Date: February 13, 2003
HHS to Release Final HIPAA Security Rule February 20; HIPAA Transaction and Code Set Standards Modifications Announced
Diverse Local Group Collaborates on Compliance Issues: Workgroup Focuses on Code Sets, Transactions
Author: Becker, Joanne
Source: Journal of AHIMA - Coding Notes
Publication Date: February 2003
Sometimes starting small can mean big results. A few months ago, I joined Iowas regional HIPAA Strategic National Implementation Process (SNIP) workgroup. The goal of local and regional SNIP workgroups is to create as much collaboration as possible to ensure compliance by all covered ent....
AHIMA Letter to the Secretaries of HHS and DoD on Security and Privacy of Protected Health Information
Author: Rode, Dan
Source: AHIMA testimony and comments
Publication Date: January 06, 2003
January 6, 2003
Donald H. Rumsfeld
Secretary
Department of Defense
1000 Defense Pentagon
Washington, DC 20301-1000
Tommy G. Thompson
Secretary
Department of Health and Human Services
Room 615-F, Hubert H Humphrey Building
200 Independ....
HIM on the Front Lines of Change: Marching Toward the National Health Information Infrastructure
Author: Rollins, Gina
Source: Journal of AHIMA
Publication Date: January 2003
What will it take to get the much-needed national health information infrastructure (NHII) up and running? Plenty of support from HIM professionals is vital, plus renewed attention to standards and information technology. Learn how each of these factors contribute to making the NHII a reality.....
HIPAA Transactions and Code Sets Toolkit for Physicians and Other Providers of Professional Healthcare Services
Author: Amatayakul, Margret
Source: External web site
Publication Date: 2003
Moving Toward a Unified Information Security Program
Author: Ruano, Michael
Source: Journal of AHIMA
Publication Date: January 2003
Is your organization up to the challenge of creating a unified information security program?
A unified information security program has been all but mandated for healthcare organizations by the federal government. HIPAA requires that electronic, paper, and oral patient identif....
AHIMA Comments on FY03 Medicare OP-PPS
Author: Rode, Dan; Prophet-Bowman, Sue
Source: AHIMA testimony and comments
Publication Date: October 03, 2002
October 3, 2002
Thomas A. Scully
Administrator
Centers for Medicare & Medicaid Services
Department of Health and Human Services
Attention: CMS-1206-P
PO Box 8018
Baltimore, Maryland 21244-8018
Re: File Code CMS-1206-P<....
Implementing the Minimum Necessary Standard
Author: Amatayakul, Margret; Brandt, Mary D.; Dennis, Jill Callahan
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: October 2002
This practice brief has been retired. It is made available for historical purposes only.
HIPAA and Electronic HIM Systems
Author: McLendon, Kelly
Source: AHIMA Convention
Publication Date: September 23, 2002
United under HIPAA: a Comparison of Arrangements and Agreements (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: September 2002
The HIPAA transactions, security, and privacy regulations identify five agreements and relationships that can be established between healthcare entities to achieve economies of scale and lessen HIPAA's administrative burden. They are: affiliated covered entity (ACE)
business associa....
Cumulative In Confidence Index
Author:
Source: In Confidence (newsletter)
Publication Date: August 09, 2002
DSMOs Shed Light on Future Coding Systems, Data Sets
Author: Scichilone, Rita A
Source: Journal of AHIMA - Coding Notes
Publication Date: July 2002
The future of coding systems in healthcare transactions is brighter than many might think. Because of the rapid changes in healthcare services, technology, and the industry as a whole, there are more coding systems emerging that may affect the work of clinical coding professionals in the futur....
Making Your Data Warehouse HIPAA Compliant
Author: Reinke, Brian
Source: In Confidence (newsletter)
Publication Date: July 02, 2002
Now a proven technology, data warehousing is entering into widespread use. Detailed patient records of many organizations are now being electronically archived using data warehousing. The goal of using this computer technology is to retain information for years so it can be used for various m....
Departmental Information Systems and HIPAA: Easing the Tension (part 2)
Author: Nulan, Craig A.
Source: In Confidence (newsletter)
Publication Date: June 02, 2002
Part two in a two-part series.
Part one of this article from the May 2002 issue of In Confidence focused on finding a balance between the needs of the information systems department and the requirements of HIPAA. The article offered tips on conducting an administrative certification as....
Privacy and Security: Are Two Hats Better Than One?
Author: Woloszyn, William
Source: Journal of AHIMA
Publication Date: June 2002
Who, me? Work as both a privacy officer and a security officer? It may seem impossible, but it can be done. While the roles of privacy officer and security officer are often presented as two distinct jobs in relation to HIPAA, if a lack of resources or personnel demand it, a daring HIM pro....
Departmental Information Systems and HIPAA: Easing the Tension (part 1)
Author: Nulan, Craig A.
Source: In Confidence (newsletter)
Publication Date: May 02, 2002
This is the first article in a two-part series. Look for part two in the June issue of In Confidence.
Healthcare has an interesting quandary in the areas of HIPAA privacy and security compliance. First, there is the unarguable tension between minimum necessary information access and use....
Take Another Look: Proposed Changes to Privacy Rule
Author: Rode, Dan
Source: Journal of AHIMA
Publication Date: May 2002
In late March, the Department of Health and Human Services (HHS) released proposed changes related to the HIPAA privacy standards. By the time you read this column, the 30-day comment period for these regulations will have already passed, although debate on these changes will still be in full....
Envisioning Consistent Coding for All
Author:
Source: AHIMA Advantage
Publication Date: April 2002
What if...a single entity oversaw all of the coding systems in use today? What if...all payers and providers were required to adhere to code set rules and guidelines in the same way? What if...there was one definitive set of coding rules, definitions, and guidelines that all users could easily....
Reasonable Approach to Physical Security (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: April 2002
Of all the components of HIPAA, physical security may be the most challenging and costly to address. After all, how do you move walls or create doors in open space? This article will show how physical security can be flexible, scalable, and reasonable for healthcare facilities.
What....
HIPAA Privacy and Security Training (2002)
Author: Hjort, Beth M.
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: April 2002
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
HIPAA Electronic Transactions and Code Sets Model Compliance Plan
Author: U.S. Centers for Medicare & Medicaid Services
Source: Government (U.S.)
Publication Date: March 27, 2002
Transactions Delay Prompts Concern Among Covered Entities
Author: Rode, Dan
Source: Journal of AHIMA
Publication Date: March 2002
AHIMA recently attended a meeting of healthcare providers, payers, and staff representatives of the National Committee on Vital and Health Statistics (NCVHS) and the Centers for Medicare and Medicaid Services (CMS). Organized by the Association for Electronic Health Care Transactions, the meet....
Transactions Extension: No Reason to Procrastinate (HIPAA on the Job)
Author: Amatayakul, Margret; Lazarus, Steven S.
Source: Journal of AHIMA
Publication Date: March 2002
Are your vendors, payers, and business managers grateful for the one-year delay for transactions compliance? They should bethe industry will need every last minute to come into compliance by October 16, 2003.
What Extension?
Signed into law on December 27, 2001....
Testimony of the American Health Information Management Association to the National Committee on Vital and Health Statistics on Medical Code Sets
Author: Prophet, Sue
Source: AHIMA testimony and comments
Publication Date: February 06, 2002
February 6, 2002
Opening Comments
Good morning Mr. Chairman, members and staff of the National Committee on Vital and Health Statistics (NCVHS) Standards and Security subcommittee, ladies and gentlemen. I am Sue Prophet, director of coding policy and compliance for the American Heal....
HIPAA Compliance Extension Postpones Simplification Benefits
Author: Rode, Dan
Source: Journal of AHIMA
Publication Date: February 2002
Under the terms of the Health Insurance Portability and Accountability Act of 1996, February 2002 would mark the second anniversary of administrative simplification for all but the smallest of health plans, and one year of rules related to claims attachments. Instead, Congress just approve....
Make Your Telecommuting Program HIPAA Compliant (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: February 2002
An increasing number of healthcare workforce members are telecommuting. As transcriptionists, coders, customer service representatives, and others are working from home, many providers are weighing the benefits against potential privacy and security risks.
Who Is Working from Home....
On the Line: Professional Practice Solutions
Author: Dougherty, Michelle
Source: Journal of AHIMA
Publication Date: November 2001
Q: Where can I find the updated data elements and data definitions for the Uniform Hospital Discharge Data Set (UHDDS)?
Q: Where can I find an easy-to-use glossary for terms in the HIPAA regulations?
Michelle Dougherty (michelle.dougherty@ahima.org) is an HIM practice manager....
Conducting a HIPAA Security Risk Assessment
Author: Klein, Jim
Source: AHIMA Convention
Publication Date: October 10, 2001
Introduction
Organizations covered under the Proposed Security Standards1 (the Draft Standard) are facing important regulatory compliance decisions for operational, technical, clinical, and administrative components of their enterprise. With the promulgation of the final Security Stand....
Overview of the HIPAA Security Regulations and Their Impact
Author: Parmigiani, John
Source: AHIMA Convention
Publication Date: October 10, 2001
The HIPAA Security Standards require healthcare providers, health plans, and clearinghouses that transmit health information in electronic form to have reasonable and appropriate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and availabil....
HIPAA Security Standards: Working With Your Information Technology Vendors
Author: Brandt, Mary D.
Source: AHIMA Convention
Publication Date: October 10, 2001
"Information security? I don't need to worry about that. My information technology (IT) vendor will take care of it."
You probably haven't made this comment, but I've heard it many times. It would certainly be convenient if we could delegate responsibility for secur....
NCVHS Groups Explore CPR, Privacy Rule Possibilities
Author: Rode, Dan
Source: Journal of AHIMA
Publication Date: October 2001
HIPAA's fifth anniversary was marked by meetings of two key subcommittees of the National Committee on Vital and Health Statistics (NCVHS): the standards (transactions) and security subcommittee and the privacy and confidentiality subcommittee. At the security subcommittee, experts fr....
Early Word on HIPAA Claims Attachments
Author: Dougherty, Michelle
Source: Journal of AHIMA
Publication Date: October 2001
If we could look into a crystal ball and see into the future, it would be much easier to prepare for HIPAA, particularly the electronic transaction standards. Because of the rarity of crystal balls these days, we must rely on other predictors at our disposal, such as the white paper issued by t....
Selecting Strong Passwords (HIPAA on the Job)
Author: Amatayakul, Margret; Walsh, Tom
Source: Journal of AHIMA
Publication Date: October 2001
Are the majority of passwords in your organization something like “Spot1,” “Spot2,” “Spot3” (for Joe, whose password expires every 90 days and whose dog’s name is Spot)? If so, your organization could be at risk. Here’s what you need to....
Five Steps to Reading the HIPAA Rules (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: September 2001
HIPAA's administrative simplification regulations appear to be anything but simple. Part of the Health Insurance Portability and Accountability Act of 1996, these provisions are intended to achieve efficiency and effectiveness and promote use of information systems. There are definite....
Developing a Framework for a Security Assessment
Author: Parisien, Darryl
Source: In Confidence (newsletter)
Publication Date: September 02, 2001
Is your organization taking the necessary actions to comply with the security regulations of HIPAA? Do you believe you have more time to comply? If you think you do, you might want to do a little more research. Take note that United States Code Title 42 Section 1320d-2 states:
Each pers....
Data Mapping for HIPAA Transactions (HIPAA on the Job)
Author: Amatayakul, Margret; Bisterfeldt, Joan
Source: Journal of AHIMA
Publication Date: July 2001
If you have been focusing primarily on HIPAA’s privacy and security regulations, not transactions requirements, this "HIPAA on the Job" is a must-read. Ensuring that you have all the required data content in your electronic systems is key to your organization’s compliance with the t....
AHIMA's Statement Regarding Replacement of ICD-9-CM Procedural Coding System
Author: Kloss, Linda L
Source: AHIMA testimony and comments
Publication Date: May 17, 2001
Thursday, May 17, 2001
Good morning, I am Linda Kloss, chief executive officer of the American Health Information Management Association (AHIMA). On behalf of the Association, I thank you for this opportunity to provide input on replacing the ICD-9-CM procedural coding system with ICD-10-....
Who's Covered by HIPAA (HIPAA on the Job)
Author: Rode, Dan
Source: Journal of AHIMA
Publication Date: March 2001
One of the mysteries of the administrative simplification section of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) is determining who is covered or comes under the requirements of the act. This article will examine HIPAA to unravel some of the mystery of &quo....
Wrestling the HIPAA Security Regulations: Two Experts' Advice
Author: Austin, Steven
Source: Journal of AHIMA
Publication Date: February 2001
HIM professionals know they need to prepare for HIPAA, but where should they begin? Take a lesson from your peers at two of the nation's leading healthcare facilities.
HIM professionals know that the Health Insurance Portability and Accountability Act of 1996 (HIPAA) i....
Preparing the Physician Office for HIPAA
Author: Uppena, Mary
Source: Journal of AHIMA - Coding Notes
Publication Date: February 2001
Change has been a constant factor in coding and reimbursement with the intensified focus on billing, compliance, and cost control. Out of necessity, coding professionals in physician settings have learned to be organized, adaptable, and armed with the latest information. The mandates....
On the Line: Professional Practice Solutions
Author: Smith, Cheryl M.
Source: Journal of AHIMA
Publication Date: February 2001
Q: Where can I find information on the interpretation of Joint Commission on Accreditation of Healthcare Organization standards?
Q: How does the Health Insurance Portability and Accountability Act of 1996 (HIPAA) define health information in the final rule for healthcare elec....
Measuring HIPAA's Impact (HIPAA on the Job)
Author: Fuller, Sandra R.
Source: Journal of AHIMA
Publication Date: February 2001
As children, most of us stood against a door frame while our parents recorded our height and the date on the wall. These marks climbed each year as reminders of the changes we were experiencing. When relatives visited, we proudly showed off our progress to adulthood.
These....
Understanding HIPAA Transactions and Code Sets
Author: Rode, Dan
Source: Journal of AHIMA
Publication Date: January 2001
The recently published final regulations for transactions and code sets under HIPAA are the light at the end of the tunnel in the quest for uniform healthcare standards-and the first step on a long road to HIPAA implementation. What are the standard transactions and code sets? This article tak....
Next Challenge: Employee Training on Privacy, Security (HIPAA on the Job)
Author: Cassidy, Bonnie S.
Source: Journal of AHIMA
Publication Date: January 2001
Organizations must provide general awareness training for every employee and affiliate. This process should build general awareness of confidentiality and security issues for all employees. For employees with access to electronic health information, the organization should include job-specific....
Security @ the Edge
Author: Boroditsky, Marc
Source: In Confidence (newsletter)
Publication Date: November 02, 2000
With the pending impact of the Health Insurance Portability and Accountability Act (HIPAA) requirements and the high hopes for fully automated e-medical informatics, healthcare information professionals must gain an appreciation for the edge of their networks. More than ever before, the edge....
HHS Releases Final Rules for HIPAA Transactions, Code Sets
Author: Rode, Dan
Source: Journal of AHIMA
Publication Date: November 2000
HIM professionals have new HIPAA challenges to prepare for: this summer, the Department of Health and Human Services (HHS) released the highly anticipated final rule for certain transaction sets and codes.1 The rule was effective on October 16, 2000, and under HIPAA legislation, most....
Understanding Chain of Trust and Business Partner Agreements (HIPAA on the Job)
Author: Cassidy, Bonnie S.
Source: Journal of AHIMA
Publication Date: October 2000
Confused about the differences between privacy and security? You’re not alone. Combine these with the jargon-laden chain of trust and business partner agreement issues, and a whole new set of questions about HIPAA implementation emerges.
Privacy, pursuant to HIPAA, addresses the righ....
Final Rule for Healthcare Electronic Transactions and Code Sets
Author: AHIMA Policy and Government Relations Team
Source: AHIMA regulation analysis
Publication Date: September 02, 2000
The long-anticipated final rule for healthcare electronic transactions and code sets was released on Thursday, August 17, 2000. This final rule (Rule) is the first of several anticipated for release by the Secretary of the Department of Health and Human Services (DHHS) over the next four month....
Standards for Electronic Transactions...Final Rule and Notice
Author: U.S. Centers for Medicare & Medicaid Services
Source: Federal Register
Publication Date: August 17, 2000
Understanding HIPAA's Transaction and Code Set Standards (HIPAA on the Job)
Author: Cassidy, Bonnie S.
Source: Journal of AHIMA
Publication Date: July 2000
As we have seen in previous installments, part of the Health Insurance Portability and Accountability Act's purpose is to establish standards and requirements that make it easier to maintain and transmit health information electronically. These provisions, known as the administrative simplific....
Standards Organizations Plan Collaboration
Author:
Source: Journal of AHIMA
Publication Date: June 2000
In March, the National Committee on Vital and Health Statistics (NCVHS) Subcommittee on Standards and Security reached an agreement with six standard-setting organizations. The six organizations include the Accredited Standards Committee X12, Dental Content Committee, Health Level Seven,....
At Close Range: Protecting Privacy Through Proximity Access Control
Author: Brostoff, George
Source: In Confidence (newsletter)
Publication Date: May 02, 2000
What if a healthcare workstation could automatically recognize who was requesting access to its information and resources? What if users could be positively identified by simply approaching the workstation, or if workstations “knew” when authorized employees walked away, instantly closing con....
Getting Ready for HIPAA Privacy Rules
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: April 2000
What do the proposed privacy regulations mean to HIM professionalsand what can you do now to begin to prepare? The author takes an in-depth look at the proposed rules.
The Health Insurance Portability and Accountability Act (HIPAA) of 1996 is bringing significant changes to the ma....
Next Steps? First Steps? Getting a Grip on HIPAA Security Standards
Author: Zender, Anne
Source: Journal of AHIMA
Publication Date: April 2000
How ready are healthcare organizations to put the proposed security regulations connected to HIPAA into effect? What are the next steps-or, in some cases, first steps-HIM professionals should take? Our panel of experts offers some advice.
So you thought preparing for Y2K was a lot o....
HIPAA: Understanding the Requirements (HIPAA on the Job)
Author: Cassidy, Bonnie S.
Source: Journal of AHIMA
Publication Date: April 2000
(Editor's note: This is the first in a series of special inserts intended to help HIM professionals educate themselves about the Health Insurance Portability and Accountability Act [HIPAA] of 1996. In this installment, we take a look at this groundbreaking legislation from a nuts-and-bolts pe....
Organizing the Effort
Author: Grant, Karen G.
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
2000 HIPAA Conference Presentation
Organizing the Effort
Presented by Karen G. Grant, RHIA, Corporate Director, Health Information Services, Partners HealthCare System Goals
To maintain a secure and continuously available technology infrastructure for Partners HealthCare System Compl....
Code Sets: Improving the Quality of Coded Data
Author: Prophet, Sue
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
2000 HIPAA Conference Presentation
Code Sets: Improving the Quality of Coded Data
The Healthcare Provider Perspective
Sue Prophet, RHIA, CCS
Director, Classification and Coding, AHIMA Current Problems with Use of Code Sets
Lack of acceptance of valid codes (e.g., V and E co....
HIPAA Security Standards Update
Author: Parmigiani, John
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
2000 HIPAA Conference Presentation
HIPAA Security Standards Update
Presented by John Parmigiani, Practice Director, Healthcare Computing Strategies Industry + Government = HIPAA Security Standards
Objectives
Establish a Healthcare Data/Systems Security Framework Identify Require....
Code Sets: Improving the Quality of Coded Data: Insurance Industry Perspective
Author: Bonnell, Claudia
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
2000 HIPAA Conference Presentation
Code Sets: Improving the Quality of Coded Data
The Insurance Industry Perspective
Presented by Claudia Bonnell, RN, MLS
Project Manager, Medical Information, Blue Cross and Blue Shield Association What Do You Want to Know?
The potential p....
1 [2] 3