Search Results

= Members only

Current search

215 results.

[1] 2 3

2004 HIPAA Privacy & Security Compliance Survey

Author: AHIMA

Source: AHIMA

Publication Date: April 12, 2004

The results of a survey conducted by AHIMA to assess the current state of HIPAA privacy within the healthcare industry. These results are being released in conjunction with the first annual National Health Information Privacy and Security Week.

Access Controls: Striking the Right Balance

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: January 2005


As healthcare organizations put the finishing touches on their HIPAA security compliance plans, many are finding that updating access controls is not easy. Clinicians often scoff at the word “control” in general and at “access control” in particular. Not all products ar....

AHIMA Advantage E-alert [Special edition]

Author: AHIMA

Source: AHIMA newsletter

Publication Date: February 13, 2003

HHS to Release Final HIPAA Security Rule February 20; HIPAA Transaction and Code Set Standards Modifications Announced

Are You Ready for a HIPAA Audit?

Author: Wiedemann, Lou Ann

Source: Journal of AHIMA

Publication Date: April 2017



Editor’s Note: The following is an excerpt from the new “External HIPAA Audit Readiness Toolkit” developed by AHIMA. The full toolkit is free for AHIMA members.


THE HITECH OMNIBUS Rule mandated that the US Department of Health and Human Services (HHS) condu....

Automation for Privacy and Security Compliance

Author: McLendon, Kelly

Source: Journal of AHIMA

Publication Date: March 2012


There has been a lack of enforcement of the privacy and security rules ever since HIPAA's inception. As such the adoption of comprehensive HIPAA compliance programs has lagged behind EHR development and implementation.

This in turn has caused little funding to be budgeted by provide....

By the Rules: Making Security Policies Stick

Author: Zender, Anne

Source: Journal of AHIMA

Publication Date: October 1999


Considerable attention has been paid to the development of organizationwide information security policies—especially what they should contain and how they should be put in place. But enforcing these policies isn't always easy. We asked four information security experts to give us....

CMS’s 2009 Security Assessment Process

Author: Dinh, Angela K.

Source: Journal of AHIMA

Publication Date: September 2009


In 2008 the Centers for Medicare and Medicaid Services (CMS) conducted 10 HIPAA security assessments in covered entities (CEs) nationwide. CMS’s stated purpose was not to identify flaws but to gain a true understanding of industry compliance with the HIPAA security rule.

CMS co....

Code Sets

Author: Brooks, Patricia E.

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
Code Sets
Presented by Pat Brooks, RHIA
HCFA Standards for Electronic Transactions
HCFA-0149-P Published May 7, 1998 Final not yet published To be enacted 2 years after final notice (3 years for small plans)
Proposed Initial Standards for....

Code Sets: Improving the Quality of Coded Data

Author: Prophet, Sue

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
Code Sets: Improving the Quality of Coded Data
The Healthcare Provider Perspective
Sue Prophet, RHIA, CCS
Director, Classification and Coding, AHIMA Current Problems with Use of Code Sets
Lack of acceptance of valid codes (e.g., V and E co....

Conducting a HIPAA Security Risk Assessment

Author: Klein, Jim

Source: AHIMA Convention

Publication Date: October 10, 2001


Introduction

Organizations covered under the Proposed Security Standards1 (the Draft Standard) are facing important regulatory compliance decisions for operational, technical, clinical, and administrative components of their enterprise. With the promulgation of the final Security Stand....

CPT Category III Codes Cover New, Emerging Technologies: New Codes Developed to Address Issues in Light of HIPAA

Author: Beebe, Michael

Source: Journal of AHIMA - Coding Notes

Publication Date: October 2003


In 1998, the American Medical Association (AMA) initiated the CPT-5 Project. This project was a broad-based and comprehensive effort to make needed and practical enhancements to the CPT code set that would address challenges presented by emerging user needs and HIPAA. One of the initiatives tha....

Cybersecurity 101

Author: Lucci, Susan; Walsh, Tom

Source: Journal of AHIMA

Publication Date: November 2015



One of the most alarming statistics in the news, which is growing with intent and severity, is the prevalence of cyber-attacks, particularly in healthcare. It is an alarming trend that has gained a good deal of attention. For example, in July 2015, UCLA reported that up to 4.5 million pati....

Early Word on HIPAA Claims Attachments

Author: Dougherty, Michelle

Source: Journal of AHIMA

Publication Date: October 2001


If we could look into a crystal ball and see into the future, it would be much easier to prepare for HIPAA, particularly the electronic transaction standards. Because of the rarity of crystal balls these days, we must rely on other predictors at our disposal, such as the white paper issued by t....

Electronic Record, Electronic Security

Author: Hagland, Mark

Source: Journal of AHIMA

Publication Date: February 2004


New technologies are enhancing the ability to protect patient information. But there’s more to successful implementation than just what’s inside the box.

Melanie Schattauer, RHIA, Jack Obert, and their colleagues at Mercy St. John’s Health System in Springfield, M....

Envisioning Consistent Coding for All

Author:

Source: AHIMA Advantage

Publication Date: April 2002


What if...a single entity oversaw all of the coding systems in use today? What if...all payers and providers were required to adhere to code set rules and guidelines in the same way? What if...there was one definitive set of coding rules, definitions, and guidelines that all users could easily....

Final Rule for HIPAA Security Standards: Analysis by the American Health Information Management Association Policy and Government Relations Team - February 2003

Author: AHIMA Policy and Government Relations Team

Source: AHIMA regulation analysis

Publication Date: February 28, 2003


Impact | This Analysis Includes | General Rules | Administrative Safeguards | Physical Safeguards | Technical Safeguards | Organizational Requirements | Policies, Procedures, and Documentation | Matrix | Introduction

After a wait of some four and one-half years, the Department of He....

Getting Ready for HIPAA Privacy Rules

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: April 2000


What do the proposed privacy regulations mean to HIM professionals—and what can you do now to begin to prepare? The author takes an in-depth look at the proposed rules.
The Health Insurance Portability and Accountability Act (HIPAA) of 1996 is bringing significant changes to the ma....

HHS Releases Final Rules for HIPAA Transactions, Code Sets

Author: Rode, Dan

Source: Journal of AHIMA

Publication Date: November 2000


HIM professionals have new HIPAA challenges to prepare for: this summer, the Department of Health and Human Services (HHS) released the highly anticipated final rule for certain transaction sets and codes.1 The rule was effective on October 16, 2000, and under HIPAA legislation, most....

HIPAA and the EHR: Making Technical Safeguard Changes

Author: Fodor, Joseph

Source: Journal of AHIMA

Publication Date: January 2004


As electronic health records (EHRs) become more commonplace in healthcare, changes, adjustments, and improvements will be inevitable. When designing, implementing, upgrading, or remediating an EHR system, your organization’s implementation team should consider the impact of complying wit....

HIPAA Audit and System Activity Review: Developing a Process that Focuses on the Greatest Risks First

Author: Hofler, Linda D.; Hardee, Joy; Dildy, Kenneth; Burleson, Deeanna; Grady, Jamie

Source: Journal of AHIMA

Publication Date: March 2005


The privacy and security rules require audits and system activity reviews. Here is one health system's process, a systematic approach that focuses on areas of greatest risk.
Ensuring the privacy and confidentiality of patient information is fundamental to HIM, but it has taken on a new le....

HIPAA Breach Enforcement Roundup

Author: Cacciatore, Victoria; Downing, Katherine

Source: Journal of AHIMA

Publication Date: July 2014



Criminal attacks on healthcare systems have risen 100 percent since 2010, according to a recent Ponemon study.1 This makes it obvious that the privacy and security of patient health information is vulnerable and highly susceptible to data breach. The HIPAA Breach Notification Rule became e....

HIPAA Compliance Extension Postpones Simplification Benefits

Author: Rode, Dan

Source: Journal of AHIMA

Publication Date: February 2002



Under the terms of the Health Insurance Portability and Accountability Act of 1996, February 2002 would mark the second anniversary of administrative simplification for all but the smallest of health plans, and one year of rules related to claims attachments. Instead, Congress just approve....

HIPAA Compliance for Clinician Texting

Author: Greene, Adam H

Source: Journal of AHIMA

Publication Date: April 2012



The HIPAA privacy and security rules need not act as an obstacle to efficient communications, but keeping texting compliant requires planning and diligence.

Text (or SMS) messaging has become nearly ubiquitous on mobile devices. According to one survey, approximately 72 perce....

HIPAA Electronic Transactions

Author: Miller, Susan A

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
HIPAA Electronic Transactions
Presented by Susan A. Miller, Esquire, Corporate Regulatory & Compliance Manager, IDX Systems Company HIPAA Summary
Title II, Subtitle F—Administrative Simplification of the Health Insurance Portability and Accoun....

[1] 2 3