Search Results

= Members only

Current search

215 results.

<< 7 8 9 [10] 11 12 13 14 15 16 17 18 19 20 21 22

Performing a Baseline Security Assessment

Author: Lawson, Jayne W.

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
Performing a Baseline Security Assessment
Presented By Jayne W. Lawson, RHIA, Information Security Manager, Hartford Hospital Awareness and Accountability
Designate staff/team responsible for overseeing review process Determine sponsorship Educate h....

Conducting a HIPAA Security Risk Assessment

Author: Klein, Jim

Source: AHIMA Convention

Publication Date: October 10, 2001


Introduction

Organizations covered under the Proposed Security Standards1 (the Draft Standard) are facing important regulatory compliance decisions for operational, technical, clinical, and administrative components of their enterprise. With the promulgation of the final Security Stand....

Safe at Home: Remote Coding Meets HIPAA

Author: Keough, Tim

Source: Journal of AHIMA

Publication Date: February 2004


Remote coding offers big benefits and unique security challenges. Here’s how one organization moves patient data securely across the Internet.

"Whatever, in connection with my professional practice, or not in connection with it, I see or hear, in the life of men, which ought....

Stealth Software Deters PHI Theft

Author: Kawles, Terrance L.

Source: Journal of AHIMA

Publication Date: July 2003


As the leading edge of digital portability advances, the protections afforded the “portability” portion of HIPAA become strained. Under the final security standards, covered entities (CEs) must establish procedures and mechanisms to protect the confidentiality, integrity, and availab....

HIPAA Audit and System Activity Review: Developing a Process that Focuses on the Greatest Risks First

Author: Hofler, Linda D.; Hardee, Joy; Dildy, Kenneth; Burleson, Deeanna; Grady, Jamie

Source: Journal of AHIMA

Publication Date: March 2005


The privacy and security rules require audits and system activity reviews. Here is one health system's process, a systematic approach that focuses on areas of greatest risk.
Ensuring the privacy and confidentiality of patient information is fundamental to HIM, but it has taken on a new le....

<< 7 8 9 [10] 11 12 13 14 15 16 17 18 19 20 21 22