215 results.
[1] 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 >>
By the Rules: Making Security Policies Stick
Author: Zender, Anne
Source: Journal of AHIMA
Publication Date: October 1999
Considerable attention has been paid to the development of organizationwide information security policiesespecially what they should contain and how they should be put in place. But enforcing these policies isn't always easy. We asked four information security experts to give us....
Next Steps? First Steps? Getting a Grip on HIPAA Security Standards
Author: Zender, Anne
Source: Journal of AHIMA
Publication Date: April 2000
How ready are healthcare organizations to put the proposed security regulations connected to HIPAA into effect? What are the next steps-or, in some cases, first steps-HIM professionals should take? Our panel of experts offers some advice.
So you thought preparing for Y2K was a lot o....
Privacy and Security: Are Two Hats Better Than One?
Author: Woloszyn, William
Source: Journal of AHIMA
Publication Date: June 2002
Who, me? Work as both a privacy officer and a security officer? It may seem impossible, but it can be done. While the roles of privacy officer and security officer are often presented as two distinct jobs in relation to HIPAA, if a lack of resources or personnel demand it, a daring HIM pro....
Are You Ready for a HIPAA Audit?
Author: Wiedemann, Lou Ann
Source: Journal of AHIMA
Publication Date: April 2017
Editor’s Note: The following is an excerpt from the new “External HIPAA Audit Readiness Toolkit” developed by AHIMA. The full toolkit is free for AHIMA members.
THE HITECH OMNIBUS Rule mandated that the US Department of Health and Human Services (HHS) condu....
Managing External Reviewer Requests in the EHR: Considerations, Requirements, and Associated Expenses
Author: Wiedemann, Lou Ann
Source: Journal of AHIMA
Publication Date: March 2011
Managing third-party requests for health information is a routine function for every HIM department. HIM professionals regularly receive record requests from third parties for a variety of reasons, such as revenue integrity audits or admission validation reviews.
Historically, fulfi....
HIPAA Implementation: the Case for a Rational Roll-out Plan
Author: WebMD
Source: External web site
Publication Date: July 19, 2004
HIPAA Acknowledgments: the Need for a Standard Transaction Acknowledgment
Author: WebMD
Source: External web site
Publication Date: November 24, 2004
When to Send a Breach Notification: New HIPAA Rules Revise “Harm” Standard
Author: Warner, Diana
Source: Journal of AHIMA
Publication Date: April 2013
The HITECH Act’s omnibus HIPAA modification final rule, released January 25, 2013, finalized sweeping changes to privacy and security regulations. Though much of the proposed rule was adopted, the omnibus rule included major changes made to the “harm threshold” standard i....
Security Risk Analysis and Management: An Overview (2013 update)
Author: Walsh, Tom
Source: AHIMA practice brief
Publication Date: November 2013
Editor’s note: This update replaces the January 2011 practice brief “Security Risk Analysis and Management: An Overview.”
Managing risks is an essential step in operating any business. It’s impossible to eliminate all threats; however, healthcare organizati....
Security Risk Analysis and Management: an Overview (2011 update)
Author: Walsh, Tom
Source: AHIMA practice brief
Publication Date: January 2011
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
[1] 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 >>