Search Results

= Members only

Current search

215 results.

1 2 3 [4] 5 6 7 8 9

Code Sets: Improving the Quality of Coded Data

Author: Prophet, Sue

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
Code Sets: Improving the Quality of Coded Data
The Healthcare Provider Perspective
Sue Prophet, RHIA, CCS
Director, Classification and Coding, AHIMA Current Problems with Use of Code Sets
Lack of acceptance of valid codes (e.g., V and E co....

Testimony of the American Health Information Management Association to the National Committee on Vital and Health Statistics on Medical Code Sets

Author: Prophet, Sue

Source: AHIMA testimony and comments

Publication Date: February 06, 2002

February 6, 2002
Opening Comments

Good morning Mr. Chairman, members and staff of the National Committee on Vital and Health Statistics (NCVHS) Standards and Security subcommittee, ladies and gentlemen.   I am Sue Prophet, director of coding policy and compliance for the American Heal....

HIPAA Security Standards Update

Author: Parmigiani, John

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
HIPAA Security Standards Update
Presented by John Parmigiani, Practice Director, Healthcare Computing Strategies Industry + Government = HIPAA Security Standards
Objectives
Establish a Healthcare Data/Systems Security Framework Identify Require....

HIPAA Electronic Transactions

Author: Miller, Susan A

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
HIPAA Electronic Transactions
Presented by Susan A. Miller, Esquire, Corporate Regulatory & Compliance Manager, IDX Systems Company HIPAA Summary
Title II, Subtitle F—Administrative Simplification of the Health Insurance Portability and Accoun....

HIPAA Security Overview - Retired

Author: Miaoulis, William M

Source: AHIMA practice brief

Publication Date: November 2013


Editor’s note: This update replaces the April 2004 and the November 2010 practice briefs titled “A HIPAA Security Overview.”


The HIPAA security rule has remained unchanged since its implementation more than a decade ago. However, the Health Information Technology for Economic a....

Automation for Privacy and Security Compliance

Author: McLendon, Kelly

Source: Journal of AHIMA

Publication Date: March 2012


There has been a lack of enforcement of the privacy and security rules ever since HIPAA's inception. As such the adoption of comprehensive HIPAA compliance programs has lagged behind EHR development and implementation.

This in turn has caused little funding to be budgeted by provide....

Cybersecurity 101

Author: Lucci, Susan; Walsh, Tom

Source: Journal of AHIMA

Publication Date: November 2015



One of the most alarming statistics in the news, which is growing with intent and severity, is the prevalence of cyber-attacks, particularly in healthcare. It is an alarming trend that has gained a good deal of attention. For example, in July 2015, UCLA reported that up to 4.5 million pati....

Performing a Baseline Security Assessment

Author: Lawson, Jayne W.

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
Performing a Baseline Security Assessment
Presented By Jayne W. Lawson, RHIA, Information Security Manager, Hartford Hospital Awareness and Accountability
Designate staff/team responsible for overseeing review process Determine sponsorship Educate h....

Conducting a HIPAA Security Risk Assessment

Author: Klein, Jim

Source: AHIMA Convention

Publication Date: October 10, 2001


Introduction

Organizations covered under the Proposed Security Standards1 (the Draft Standard) are facing important regulatory compliance decisions for operational, technical, clinical, and administrative components of their enterprise. With the promulgation of the final Security Stand....

Safe at Home: Remote Coding Meets HIPAA

Author: Keough, Tim

Source: Journal of AHIMA

Publication Date: February 2004


Remote coding offers big benefits and unique security challenges. Here’s how one organization moves patient data securely across the Internet.

"Whatever, in connection with my professional practice, or not in connection with it, I see or hear, in the life of men, which ought....

Stealth Software Deters PHI Theft

Author: Kawles, Terrance L.

Source: Journal of AHIMA

Publication Date: July 2003


As the leading edge of digital portability advances, the protections afforded the “portability” portion of HIPAA become strained. Under the final security standards, covered entities (CEs) must establish procedures and mechanisms to protect the confidentiality, integrity, and availab....

HIPAA Audit and System Activity Review: Developing a Process that Focuses on the Greatest Risks First

Author: Hofler, Linda D.; Hardee, Joy; Dildy, Kenneth; Burleson, Deeanna; Grady, Jamie

Source: Journal of AHIMA

Publication Date: March 2005


The privacy and security rules require audits and system activity reviews. Here is one health system's process, a systematic approach that focuses on areas of greatest risk.
Ensuring the privacy and confidentiality of patient information is fundamental to HIM, but it has taken on a new le....

1 2 3 [4] 5 6 7 8 9