215 results.
1 2 [3]
Ready for the Transactions Rule? Get Started with Code Sets (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: July 2003
Reasonable Approach to Physical Security (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: April 2002
Reassessing Your Security Practices in a Health IT Environment: a Guide for Small Health Care Practices
Author: U.S. Office of the National Coordinator for Health Information Technology; U.S. Office for Civil Rights
Source: Government (U.S.)
Publication Date: December 16, 2008
Reporting Security Incidents
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: March 2005
Rethinking Initial HIPAA Efforts (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: November 2003
Running out of Room for Data: HIPAA Requires Healthcare Organizations to Re-assess Data Storage
Author: Brick, Frank
Source: Journal of AHIMA
Publication Date: April 2006
Safe at Home: Remote Coding Meets HIPAA
Author: Keough, Tim
Source: Journal of AHIMA
Publication Date: February 2004
Safeguarding ePHI from Fire the Dry Way
Author: Brown, Karen
Source: Journal of AHIMA
Publication Date: March 2005
Safeguards for Remote Access
Author: AHIMA Privacy and Security Practice Council
Source: Journal of AHIMA
Publication Date: July 2007
Sample - Interview and Document Request for HIPAA Security Onsite Investigations and Compliance Reviews
Author: U.S. Centers for Medicare & Medicaid Services
Source: Government (U.S.)
Publication Date: May 02, 2008
Securing Executive Support for Security (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: February 2004
Security 101 for Covered Entities
Author: U.S. Centers for Medicare & Medicaid Services
Source: Government (U.S.)
Publication Date: November 23, 2004
Security and Electronic Signature Standards: Proposed Rule
Author: U.S. Department of Health and Human Services
Source: Federal Register
Publication Date: August 12, 1998
Security and HIPAA: Protecting Your Operations
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: August 02, 2003
Security Audits (2003 update)
Author: Hjort, Beth M.
Source: AHIMA practice brief
Publication Date: November 2003
Security Audits of Electronic Health Information (2011 update)
Author: AHIMA
Source: AHIMA practice brief
Publication Date: March 2011
Security Awareness: The Right Messages
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: April 2004
Security Risk Analysis and Management: an Overview
Author: Amatayakul, Margret
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: October 2003
Security Risk Analysis and Management: an Overview (2011 update)
Author: Walsh, Tom
Source: AHIMA practice brief
Publication Date: January 2011
Security Risk Analysis and Management: An Overview (2013 update)
Author: Walsh, Tom
Source: AHIMA practice brief
Publication Date: November 2013
Security Standards: Administrative Safeguards
Author: U.S. Centers for Medicare & Medicaid Services
Source: Government (U.S.)
Publication Date: November 23, 2004
Security Standards: Implementation for the Small Provider
Author: U.S. Centers for Medicare & Medicaid Services
Source: Government (U.S.)
Publication Date: December 10, 2007
Security Standards: Organizational, Policies and Procedures and Documentation Requirements
Author: U.S. Centers for Medicare & Medicaid Services
Source: Government (U.S.)
Publication Date: May 02, 2005
Security Standards: Physical Safeguards
Author: U.S. Centers for Medicare & Medicaid Services
Source: Government (U.S.)
Publication Date: February 28, 2005
Security Standards: Technical Safeguards
Author: U.S. Centers for Medicare & Medicaid Services
Source: Government (U.S.)
Publication Date: February 28, 2005
Security @ the Edge
Author: Boroditsky, Marc
Source: In Confidence (newsletter)
Publication Date: November 02, 2000
Selecting Strong Passwords (HIPAA on the Job)
Author: Amatayakul, Margret; Walsh, Tom
Source: Journal of AHIMA
Publication Date: October 2001
Shifting from Reactive to Proactive HIPAA Audits
Author: Brinda, Danika
Source: Journal of AHIMA
Publication Date: January 2016
Simplification at Last? HHS Rolls out Operating Rules for HIPAA Transaction Standards
Author: Dimick, Chris
Source: Journal of AHIMA
Publication Date: February 2012
Sorting Out Employee Sanctions
Author: Burrington-Brown, Jill
Source: Journal of AHIMA
Publication Date: June 2003
Spoliation of Medical Evidence
Author: Tomes, Jonathan P.
Source: Journal of AHIMA
Publication Date: October 2005
Standards for Electronic Transactions...Final Rule and Notice
Author: U.S. Centers for Medicare & Medicaid Services
Source: Federal Register
Publication Date: August 17, 2000
Standards Organizations Plan Collaboration
Author:
Source: Journal of AHIMA
Publication Date: June 2000
State of HIPAA Privacy and Security Compliance 2005
Author: AHIMA
Source: AHIMA report
Publication Date: April 11, 2005
Stealth Software Deters PHI Theft
Author: Kawles, Terrance L.
Source: Journal of AHIMA
Publication Date: July 2003
Study Reveals Risk of Unsecured PHI in E-mail Communications
Author: Reams, Cary
Source: In Confidence (newsletter)
Publication Date: November 02, 2003
Take Another Look: Proposed Changes to Privacy Rule
Author: Rode, Dan
Source: Journal of AHIMA
Publication Date: May 2002
Taking Charge of Issues in Auditing for HIPAA Security Rule Compliance
Author: Travis, John
Source: AHIMA Convention
Publication Date: October 21, 2005
Testimony of the American Health Information Management Association to the National Committee on Vital and Health Statistics on Medical Code Sets
Author: Prophet, Sue
Source: AHIMA testimony and comments
Publication Date: February 06, 2002
Testimony of the California Health Information Association to the Joint Hearing of the Select Committee on International Trade Policy and State Legislation and the Senate Business and Professions Committee
Author: LaMoureaux, LaVonne
Source: AHIMA testimony and comments
Publication Date: March 09, 2004
The State of HIPAA Privacy and Security Compliance, 2006
Author: AHIMA
Source: AHIMA report
Publication Date: April 19, 2006
The Year That Was and the Year to Be
Author: Asmonga, Donald D.
Source: Journal of AHIMA
Publication Date: February 2011
Think You're Ready? Don't Forget the Self-insured Health Plan (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: March 2003
Three Short Years: Organizations Lagging in 5010 and ICD-10 Progress
Author: Dimick, Chris
Source: Journal of AHIMA
Publication Date: September 2010
Tracking the Industry’s Progress: AHIMA Survey on ICD-10 and 5010 Compliance
Author: AHIMA
Source: AHIMA
Publication Date: September 21, 2011
Transactions Delay Prompts Concern Among Covered Entities
Author: Rode, Dan
Source: Journal of AHIMA
Publication Date: March 2002
Transactions Extension: No Reason to Procrastinate (HIPAA on the Job)
Author: Amatayakul, Margret; Lazarus, Steven S.
Source: Journal of AHIMA
Publication Date: March 2002
Transactions Standards
Author: Braithwaite, Bill
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
Translating the Language of Security (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: June 2003
Trouble with Audit Controls
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: October 2004
Uncovering the Enemy Within: Utilizing Incident Response, Forensics
Author: Derhak, Mike
Source: In Confidence (newsletter)
Publication Date: September 02, 2003
Understanding Chain of Trust and Business Partner Agreements (HIPAA on the Job)
Author: Cassidy, Bonnie S.
Source: Journal of AHIMA
Publication Date: October 2000
Understanding HIPAA Enforcement: Trust, but Verify
Author: Apple, Gordon J.
Source: In Confidence (newsletter)
Publication Date: June 02, 2003
Understanding HIPAA's Transaction and Code Set Standards (HIPAA on the Job)
Author: Cassidy, Bonnie S.
Source: Journal of AHIMA
Publication Date: July 2000
Understanding HIPAA Transactions and Code Sets
Author: Rode, Dan
Source: Journal of AHIMA
Publication Date: January 2001
Understanding Telecommunications, Network Security, and HIPAA
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: May 02, 2003
United under HIPAA: a Comparison of Arrangements and Agreements (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: September 2002
Updated Toolkit for Security Strategies
Author: Cooper, Ted
Source: Journal of AHIMA
Publication Date: July 2004
Using Aliases to Protect Privacy in Healthcare
Author: Barrett, Charlotte S; Beidler, Aurae; Davis, Nancy; Glondys, Barbara
Source: Journal of AHIMA
Publication Date: November 2016
Value of HIM in Privacy and Security Compliance
Author: Amatayakul, Margret; Work, Mitch
Source: Journal of AHIMA
Publication Date: May 2007
What is Security Auditing?
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: November 2004
When to Send a Breach Notification: New HIPAA Rules Revise “Harm” Standard
Author: Warner, Diana
Source: Journal of AHIMA
Publication Date: April 2013
Who's Covered by HIPAA (HIPAA on the Job)
Author: Rode, Dan
Source: Journal of AHIMA
Publication Date: March 2001
Wrestling the HIPAA Security Regulations: Two Experts' Advice
Author: Austin, Steven
Source: Journal of AHIMA
Publication Date: February 2001
You Can't Throw IT in the Dumpster Anymore: Tips for Finding a Qualified Electronic Waste Disposal Service
Author: Harford, Joseph P.; Rizzo, Karen
Source: Journal of AHIMA
Publication Date: January 2006
1 2 [3]