Search Results

= Members only

Current search

215 results.

1 2 3 4 5 6 [7] 8 9

CPT Category III Codes Cover New, Emerging Technologies: New Codes Developed to Address Issues in Light of HIPAA

Author: Beebe, Michael

Source: Journal of AHIMA - Coding Notes

Publication Date: October 2003


In 1998, the American Medical Association (AMA) initiated the CPT-5 Project. This project was a broad-based and comprehensive effort to make needed and practical enhancements to the CPT code set that would address challenges presented by emerging user needs and HIPAA. One of the initiatives tha....

Industry Awaits Phase 2 of HIPAA Audit Program

Author: Asmonga, Donald D.

Source: Journal of AHIMA

Publication Date: January 2015



The wait for the second round of mandated privacy and security audits from the Department of Health and Human Services’ (HHS) Office for Civil Rights (OCR) continues. OCR is currently working through final details for the revised audit plan as they await finalization of new technolog....

The Year That Was and the Year to Be

Author: Asmonga, Donald D.

Source: Journal of AHIMA

Publication Date: February 2011


The second session of the 111th Congress began with the Democrats in firm control of the House and Senate. Working from their position of power enabled the Democrats to pass healthcare reform.

Although Congress was mired in contentious debates, AHIMA still advocated for its public po....

Reporting Security Incidents

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: March 2005


HIPAA requires covered entities “implement policies and procedures to address security incidents.” There is one implementation specification: to “identify and respond to suspected or known security incidents; mitigate, to the extent practical, harmful effects of security inci....

What is Security Auditing?

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: November 2004


The HIPAA security rule includes a requirement for audit controls and to monitor and manage ongoing security for a variety of processes. But the requirement for internal audit was changed to “information security activity review,” and there is no other specific reference to auditin....

Getting Ready for HIPAA Privacy Rules

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: April 2000


What do the proposed privacy regulations mean to HIM professionals—and what can you do now to begin to prepare? The author takes an in-depth look at the proposed rules.
The Health Insurance Portability and Accountability Act (HIPAA) of 1996 is bringing significant changes to the ma....

Trouble with Audit Controls

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: October 2004


The 2004 Phoenix Health System/HIMSS HIPAA compliance survey indicates that providers find audit controls the most difficult of the HIPAA security standards to implement.
While it is recognized that every organization must conduct a risk analysis to determine the systems or activities th....

HIPAA Security Shopping List (HIPAA on the Job)

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: May 2004


Many information security officials are barraged with requests for the latest security tools. Such shopping lists often do not reflect a structured plan or a true risk analysis to justify their cost or human resource requirements. This column describes some of the latest tools, how you can ev....

1 2 3 4 5 6 [7] 8 9