215 results.
1 2 [3]
Code Sets
Author: Brooks, Patricia E.
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
2000 HIPAA Conference Presentation
Code Sets
Presented by Pat Brooks, RHIA
HCFA Standards for Electronic Transactions
HCFA-0149-P Published May 7, 1998 Final not yet published To be enacted 2 years after final notice (3 years for small plans)
Proposed Initial Standards for....
Performing a Baseline Security Assessment
Author: Lawson, Jayne W.
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
2000 HIPAA Conference Presentation
Performing a Baseline Security Assessment
Presented By Jayne W. Lawson, RHIA, Information Security Manager, Hartford Hospital Awareness and Accountability
Designate staff/team responsible for overseeing review process Determine sponsorship Educate h....
HIPAA Security Context, Concepts, and Misconceptions
Author: Baker, Dixie B.
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
Kaiser Permanente Approach
Author: Cooper, Ted
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
2000 HIPAA Conference Presentation
Organizing the Effort
Case Study: The Kaiser Permanente Approach
Presented by Ted Cooper, MD, National Director, Confidentiality & Security, Kaiser Permanente Kaiser Permanente
Kaiser Foundation Health Plan Kaiser Foundation Hospitals Region....
Transactions Standards
Author: Braithwaite, Bill
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
2000 HIPAA Conference Presentation
Transactions Standards
Presented by Bill Braithwaite, MD, PhD, FACMI, Senior Advisor on Health Information Policy, US Dept. of HSS
Transaction Standards
NPRM published in 1998 (5/7/98 - 7/6/98) Adopts ASC X12N standards for transactions (e....
HIPAA Electronic Transactions
Author: Miller, Susan A
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
2000 HIPAA Conference Presentation
HIPAA Electronic Transactions
Presented by Susan A. Miller, Esquire, Corporate Regulatory & Compliance Manager, IDX Systems Company HIPAA Summary
Title II, Subtitle FAdministrative Simplification of the Health Insurance Portability and Accoun....
Lessons Learned from a Security Assessment
Author: Cummings, Judy
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
2000 HIPAA Conference Presentation
Lessons Learned from a Security Assessment
Presented by Judy Cummings, Senior Manager, Strategic Development
Sharp Healthcare Information Systems Presentation Overview
After this presentation, you will know these things about a security assessm....
Code Sets: Improving the Quality of Coded Data
Author: Dixon-Lee, Claire
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
2000 HIPAA Conference Presentation
Code Sets: Improving the Quality of Coded Data
Presented by Claire Dixon-Lee, PhD, RHIA Future of Code Sets
Data Content Standardization Data Elements including formats and definitions Code Sets and values
Maximum defined data set Computer-....
Information Security
Author: Tang, Paul C.
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
2000 HIPAA Conference Presentation
Information Security
Presented by Paul Tang, MD Information Systems Security
NRC Definition Security is the protection of information systems against unauthorized access to or modification of information, whether in storage, processing, or transit,....
Implementing HIPAA Security Standards -- Are You Ready?
Author: Fuller, Sandra R.
Source: Journal of AHIMA
Publication Date: October 1999
When the final security standards related to HIPAA are published later this year, the race to implement them will be on. Are you prepared? The author offers a handy set of guidelines.
The wait is almost over for the final security standards required by the Health Insurance Portability an....
By the Rules: Making Security Policies Stick
Author: Zender, Anne
Source: Journal of AHIMA
Publication Date: October 1999
Considerable attention has been paid to the development of organizationwide information security policiesespecially what they should contain and how they should be put in place. But enforcing these policies isn't always easy. We asked four information security experts to give us....
HIPAA, Security, and Electronic Signature: A Closer Look
Author: Ballam, Holly
Source: Journal of AHIMA
Publication Date: March 1999
A recent notice of proposed rule making for an electronic signature standard, if adopted, will affect the way health information is managed for years to come. Here's what you need to know about electronic signature and what the proposed standard may mean for HIM.
The Health....
HHS Publishes Notice of Proposed Rule Making for Security, Electronic Signature Standards
Author: Frawley, Kathleen A.; Asmonga, Donald D.
Source: Journal of AHIMA
Publication Date: October 1998
On August 12, the Department of Health and Human Services (HHS) published the notice of proposed rule making on standards for the security of individual health information and electronic signature use by health plans, healthcare clearinghouses and healthcare providers. These standards are part....
Security and Electronic Signature Standards: Proposed Rule
Author: U.S. Department of Health and Human Services
Source: Federal Register
Publication Date: August 12, 1998
New Standards Focus on Information Security
Author: Hanken, Mary Alice
Source: Journal of AHIMA
Publication Date: March 1998
The federal legislation for the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and the need in healthcare for security of confidential data have come together to heighten the interest in security standards for electronic health information systems. Th....
1 2 [3]