Search Results

= Members only

Current search

215 results.

1 2 [3] 4 5

Electronic Record, Electronic Security

Author: Hagland, Mark

Source: Journal of AHIMA

Publication Date: February 2004


New technologies are enhancing the ability to protect patient information. But there’s more to successful implementation than just what’s inside the box.

Melanie Schattauer, RHIA, Jack Obert, and their colleagues at Mercy St. John’s Health System in Springfield, M....

New Standards Focus on Information Security

Author: Hanken, Mary Alice

Source: Journal of AHIMA

Publication Date: March 1998


The federal legislation for the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and the need in healthcare for security of confidential data have come together to heighten the interest in security standards for electronic health information systems. Th....

On the HIPAA Hook

Author: Hicks, Andrew

Source: Journal of AHIMA

Publication Date: April 2014



Some healthcare business associates are still asking if HITECH-HIPAA impacts them. The answer is just as important to their affiliated healthcare providers.


Thousands of companies are now legally obligated to comply with the HITECH-HIPAA regulations because of their busines....

HIPAA Audit and System Activity Review: Developing a Process that Focuses on the Greatest Risks First

Author: Hofler, Linda D.; Hardee, Joy; Dildy, Kenneth; Burleson, Deeanna; Grady, Jamie

Source: Journal of AHIMA

Publication Date: March 2005


The privacy and security rules require audits and system activity reviews. Here is one health system's process, a systematic approach that focuses on areas of greatest risk.
Ensuring the privacy and confidentiality of patient information is fundamental to HIM, but it has taken on a new le....

Stealth Software Deters PHI Theft

Author: Kawles, Terrance L.

Source: Journal of AHIMA

Publication Date: July 2003


As the leading edge of digital portability advances, the protections afforded the “portability” portion of HIPAA become strained. Under the final security standards, covered entities (CEs) must establish procedures and mechanisms to protect the confidentiality, integrity, and availab....

Safe at Home: Remote Coding Meets HIPAA

Author: Keough, Tim

Source: Journal of AHIMA

Publication Date: February 2004


Remote coding offers big benefits and unique security challenges. Here’s how one organization moves patient data securely across the Internet.

"Whatever, in connection with my professional practice, or not in connection with it, I see or hear, in the life of men, which ought....

Conducting a HIPAA Security Risk Assessment

Author: Klein, Jim

Source: AHIMA Convention

Publication Date: October 10, 2001


Introduction

Organizations covered under the Proposed Security Standards1 (the Draft Standard) are facing important regulatory compliance decisions for operational, technical, clinical, and administrative components of their enterprise. With the promulgation of the final Security Stand....

Performing a Baseline Security Assessment

Author: Lawson, Jayne W.

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
Performing a Baseline Security Assessment
Presented By Jayne W. Lawson, RHIA, Information Security Manager, Hartford Hospital Awareness and Accountability
Designate staff/team responsible for overseeing review process Determine sponsorship Educate h....

Cybersecurity 101

Author: Lucci, Susan; Walsh, Tom

Source: Journal of AHIMA

Publication Date: November 2015



One of the most alarming statistics in the news, which is growing with intent and severity, is the prevalence of cyber-attacks, particularly in healthcare. It is an alarming trend that has gained a good deal of attention. For example, in July 2015, UCLA reported that up to 4.5 million pati....

Automation for Privacy and Security Compliance

Author: McLendon, Kelly

Source: Journal of AHIMA

Publication Date: March 2012


There has been a lack of enforcement of the privacy and security rules ever since HIPAA's inception. As such the adoption of comprehensive HIPAA compliance programs has lagged behind EHR development and implementation.

This in turn has caused little funding to be budgeted by provide....

HIPAA Security Overview - Retired

Author: Miaoulis, William M

Source: AHIMA practice brief

Publication Date: November 2013


Editor’s note: This update replaces the April 2004 and the November 2010 practice briefs titled “A HIPAA Security Overview.”


The HIPAA security rule has remained unchanged since its implementation more than a decade ago. However, the Health Information Technology for Economic a....

HIPAA Electronic Transactions

Author: Miller, Susan A

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
HIPAA Electronic Transactions
Presented by Susan A. Miller, Esquire, Corporate Regulatory & Compliance Manager, IDX Systems Company HIPAA Summary
Title II, Subtitle F—Administrative Simplification of the Health Insurance Portability and Accoun....

HIPAA Security Standards Update

Author: Parmigiani, John

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
HIPAA Security Standards Update
Presented by John Parmigiani, Practice Director, Healthcare Computing Strategies Industry + Government = HIPAA Security Standards
Objectives
Establish a Healthcare Data/Systems Security Framework Identify Require....

Code Sets: Improving the Quality of Coded Data

Author: Prophet, Sue

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
Code Sets: Improving the Quality of Coded Data
The Healthcare Provider Perspective
Sue Prophet, RHIA, CCS
Director, Classification and Coding, AHIMA Current Problems with Use of Code Sets
Lack of acceptance of valid codes (e.g., V and E co....

Testimony of the American Health Information Management Association to the National Committee on Vital and Health Statistics on Medical Code Sets

Author: Prophet, Sue

Source: AHIMA testimony and comments

Publication Date: February 06, 2002

February 6, 2002
Opening Comments

Good morning Mr. Chairman, members and staff of the National Committee on Vital and Health Statistics (NCVHS) Standards and Security subcommittee, ladies and gentlemen.   I am Sue Prophet, director of coding policy and compliance for the American Heal....

How to Safely Recycle PCs

Author: Quinsey, Carol Ann

Source: Journal of AHIMA

Publication Date: June 2005


Securing the privacy of both protected health information and personal information should be a primary concern when personal computers have outlived their usefulness. Recycling or disposing of a computer safely can be a challenge.

It’s not enough to simply give an old computer....

Making Your Data Warehouse HIPAA Compliant

Author: Reinke, Brian

Source: In Confidence (newsletter)

Publication Date: July 02, 2002


Now a proven technology, data warehousing is entering into widespread use. Detailed patient records of many organizations are now being electronically archived using data warehousing. The goal of using this computer technology is to retain information for years so it can be used for various m....

HIPAA Marches On--Or Does It?

Author: Rode, Dan

Source: Journal of AHIMA

Publication Date: March 2005


HIPAA has taught us that standardization is hard. When the act was signed into law in 1996, the optimists among us believed that within four years the healthcare industry would be using a variety of uniform national administrative transactions, most associated with what we now call the revenue....

Understanding HIPAA Transactions and Code Sets

Author: Rode, Dan

Source: Journal of AHIMA

Publication Date: January 2001


The recently published final regulations for transactions and code sets under HIPAA are the light at the end of the tunnel in the quest for uniform healthcare standards-and the first step on a long road to HIPAA implementation. What are the standard transactions and code sets? This article tak....

HIPAA Compliance Extension Postpones Simplification Benefits

Author: Rode, Dan

Source: Journal of AHIMA

Publication Date: February 2002



Under the terms of the Health Insurance Portability and Accountability Act of 1996, February 2002 would mark the second anniversary of administrative simplification for all but the smallest of health plans, and one year of rules related to claims attachments. Instead, Congress just approve....

Take Another Look: Proposed Changes to Privacy Rule

Author: Rode, Dan

Source: Journal of AHIMA

Publication Date: May 2002


In late March, the Department of Health and Human Services (HHS) released proposed changes related to the HIPAA privacy standards. By the time you read this column, the 30-day comment period for these regulations will have already passed, although debate on these changes will still be in full....

Who's Covered by HIPAA (HIPAA on the Job)

Author: Rode, Dan

Source: Journal of AHIMA

Publication Date: March 2001




One of the mysteries of the administrative simplification section of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) is determining who is covered or comes under the requirements of the act. This article will examine HIPAA to unravel some of the mystery of &quo....

HHS Releases Final Rules for HIPAA Transactions, Code Sets

Author: Rode, Dan

Source: Journal of AHIMA

Publication Date: November 2000


HIM professionals have new HIPAA challenges to prepare for: this summer, the Department of Health and Human Services (HHS) released the highly anticipated final rule for certain transaction sets and codes.1 The rule was effective on October 16, 2000, and under HIPAA legislation, most....

1 2 [3] 4 5