Search Results

= Members only

Current search

215 results.

[1] 2 3 4 5

By the Rules: Making Security Policies Stick

Author: Zender, Anne

Source: Journal of AHIMA

Publication Date: October 1999


Considerable attention has been paid to the development of organizationwide information security policies—especially what they should contain and how they should be put in place. But enforcing these policies isn't always easy. We asked four information security experts to give us....

Privacy and Security: Are Two Hats Better Than One?

Author: Woloszyn, William

Source: Journal of AHIMA

Publication Date: June 2002



Who, me? Work as both a privacy officer and a security officer? It may seem impossible, but it can be done. While the roles of privacy officer and security officer are often presented as two distinct jobs in relation to HIPAA, if a lack of resources or personnel demand it, a daring HIM pro....

Are You Ready for a HIPAA Audit?

Author: Wiedemann, Lou Ann

Source: Journal of AHIMA

Publication Date: April 2017



Editor’s Note: The following is an excerpt from the new “External HIPAA Audit Readiness Toolkit” developed by AHIMA. The full toolkit is free for AHIMA members.


THE HITECH OMNIBUS Rule mandated that the US Department of Health and Human Services (HHS) condu....

Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification Rules Under the Health Information Technology for Economic and Clinical Health Act and the Genetic Information Nondiscrimination Act; Other Modifications to the HIPAA Rules; Final Rule

Author: U.S. Office for Civil Rights

Source: U.S. Department of Health & Human Services | U.S. Office for Civil Rights

Publication Date: January 2013

Rule modifies HIPAA by implementing statutory amendments under HITECH to strengthen the privacy and security protection for individuals’ health information; modifies the Breach Notification Rule under the HITECH Act, modifes the HIPAA Privacy Rule to strengthen the privacy protections for genetic information and makes certain other modifications to the HIPAA Privacy, Security, Breach Notification, and Enforcement Rules (the HIPAA Rules) to improve their workability and effectiveness and to increase flexibility for and decrease burden on regulated entities.

Preparing the Physician Office for HIPAA

Author: Uppena, Mary

Source: Journal of AHIMA - Coding Notes

Publication Date: February 2001




Change has been a constant factor in coding and reimbursement with the intensified focus on billing, compliance, and cost control. Out of necessity, coding professionals in physician settings have learned to be organized, adaptable, and armed with the latest information. The mandates....

Spoliation of Medical Evidence

Author: Tomes, Jonathan P.

Source: Journal of AHIMA

Publication Date: October 2005


To avoid the improper destruction or alteration of records, HIM departments must follow a retention schedule, train personnel, and ensure that corrections leave original entries intact.
Although the legal concept known as spoliation of evidence has been a part of the American legal syste....

Preparing for the Next Big April

Author: Thomason, Mary

Source: Journal of AHIMA

Publication Date: April 2004


Yesterday’s privacy compliance preparations can contribute to meeting tomorrow’s security mandates. One organization is tackling risk analysis with both matrix and memories.
The 2003 HIPAA privacy rule implementation is still fresh in many minds throughout healthcare organiza....

Information Security

Author: Tang, Paul C.

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
Information Security
Presented by Paul Tang, MD Information Systems Security
NRC Definition Security is the protection of information systems against unauthorized access to or modification of information, whether in storage, processing, or transit,....

On the Line: Professional Practice Solutions

Author: Smith, Cheryl M.

Source: Journal of AHIMA

Publication Date: February 2001




Q: Where can I find information on the interpretation of Joint Commission on Accreditation of Healthcare Organization standards?

Q: How does the Health Insurance Portability and Accountability Act of 1996 (HIPAA) define health information in the final rule for healthcare elec....

Information Governance for Offsite Data Security

Author: Saharia, Devendra

Source: Journal of AHIMA

Publication Date: April 2016



Disruptive technology can turn any industry on its head—virtually overnight. Just five years ago, summoning a taxi was an inefficient, time-consuming effort that often involved dialing up a dispatcher, who contacted a driver, who would then make their way to your location, perhaps in an h....

How Law, Investigation, Ethics Connect to HIPAA

Author: Ruano, Michael

Source: In Confidence (newsletter)

Publication Date: November 02, 2003


Part nine in a 10-part series.
This article is the ninth of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. The information security domain of law, investigation, and ethics covers these topics in depth and provides a p....

Security and HIPAA: Protecting Your Operations

Author: Ruano, Michael

Source: In Confidence (newsletter)

Publication Date: August 02, 2003


Part six in a 10-part series.
This article is the sixth of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. The information security domain of operations security includes the topics of controls, protections, monitoring,....

[1] 2 3 4 5