215 results.
[1] 2 3
2004 HIPAA Privacy & Security Compliance Survey
Author: AHIMA
Source: AHIMA
Publication Date: April 12, 2004
The results of a survey conducted by AHIMA to assess the current state of HIPAA privacy within the healthcare industry. These results are being released in conjunction with the first annual National Health Information Privacy and Security Week.
2010 Healthcare Calendar: The Deadlines and Initiatives to Prepare for This Year
Author: Rode, Dan
Source: Journal of AHIMA
Publication Date: January 2010
Last year saw movement on major HIM issues, starting in January with the publication of the ICD-10-CM/PCS final rule. This was quickly followed by the American Recovery and Reinvestment Act (ARRA), which has dominated healthcare discussions all year, matched only by the healthcare reform d....
26.2-mile Security Rule: Is Your Organization Gaining on Compliance or Just Running in Place?
Author: Walsh, Tom
Source: Journal of AHIMA
Publication Date: March 2005
The race to security compliance is a marathon, not a dash. Here’s how to gauge your progress.
With implementation of the HIPAA security rule next month, many organizations are preparing to sprint toward the deadline. However, compliance is more like a marathon than a 100-meter dash....
Access Controls: Striking the Right Balance
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: January 2005
As healthcare organizations put the finishing touches on their HIPAA security compliance plans, many are finding that updating access controls is not easy. Clinicians often scoff at the word “control” in general and at “access control” in particular. Not all products ar....
AHIMA Advantage E-alert [Special edition]
Author: AHIMA
Source: AHIMA newsletter
Publication Date: February 13, 2003
HHS to Release Final HIPAA Security Rule February 20; HIPAA Transaction and Code Set Standards Modifications Announced
AHIMA Comments on FY03 Medicare OP-PPS
Author: Rode, Dan; Prophet-Bowman, Sue
Source: AHIMA testimony and comments
Publication Date: October 03, 2002
October 3, 2002
Thomas A. Scully
Administrator
Centers for Medicare & Medicaid Services
Department of Health and Human Services
Attention: CMS-1206-P
PO Box 8018
Baltimore, Maryland 21244-8018
Re: File Code CMS-1206-P<....
AHIMA Letter to the Secretaries of HHS and DoD on Security and Privacy of Protected Health Information
Author: Rode, Dan
Source: AHIMA testimony and comments
Publication Date: January 06, 2003
January 6, 2003
Donald H. Rumsfeld
Secretary
Department of Defense
1000 Defense Pentagon
Washington, DC 20301-1000
Tommy G. Thompson
Secretary
Department of Health and Human Services
Room 615-F, Hubert H Humphrey Building
200 Independ....
AHIMA's Statement Regarding Replacement of ICD-9-CM Procedural Coding System
Author: Kloss, Linda L
Source: AHIMA testimony and comments
Publication Date: May 17, 2001
Thursday, May 17, 2001
Good morning, I am Linda Kloss, chief executive officer of the American Health Information Management Association (AHIMA). On behalf of the Association, I thank you for this opportunity to provide input on replacing the ICD-9-CM procedural coding system with ICD-10-....
Aligning ICD-10: Federal Initiatives Recognize the Value of Integration
Author: Rode, Dan
Source: Journal of AHIMA
Publication Date: June 2011
The theme of this month's Journal is very timely on two accounts. First, the process for implementing ICD-10-CM/PCS is heating up as the industry is now six months from what many consider the first national milestone: the January 2012 compliance deadline for the HIPAA 5010 transaction upgrade.....
Analysis of Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification Rules under HITECH and GINA; Other Modifications to the HIPAA Rules
Author: AHIMA
Source: AHIMA regulation analysis
Publication Date: January 25, 2013
Analysis of the Final Rule: HIPAA Administrative Simplification: Modification to Medical Data Code Set Standards to Adopt ICD-10-CM and ICD-10-PCS
Author: Rode, Dan
Source: AHIMA regulation analysis
Publication Date: February 02, 2009
Analysis of the Final Rule, January 16, 2009, Health Insurance Reform: Modifications to the Health Insurance Portability and Accountability Act (HIPAA) Electronic Transaction Standards
Author: Rode, Dan
Source: AHIMA regulation analysis
Publication Date: February 02, 2009
Are You Ready for a HIPAA Audit?
Author: Wiedemann, Lou Ann
Source: Journal of AHIMA
Publication Date: April 2017
Editor’s Note: The following is an excerpt from the new “External HIPAA Audit Readiness Toolkit” developed by AHIMA. The full toolkit is free for AHIMA members.
THE HITECH OMNIBUS Rule mandated that the US Department of Health and Human Services (HHS) condu....
At Close Range: Protecting Privacy Through Proximity Access Control
Author: Brostoff, George
Source: In Confidence (newsletter)
Publication Date: May 02, 2000
What if a healthcare workstation could automatically recognize who was requesting access to its information and resources? What if users could be positively identified by simply approaching the workstation, or if workstations “knew” when authorized employees walked away, instantly closing con....
Automation for Privacy and Security Compliance
Author: McLendon, Kelly
Source: Journal of AHIMA
Publication Date: March 2012
There has been a lack of enforcement of the privacy and security rules ever since HIPAA's inception. As such the adoption of comprehensive HIPAA compliance programs has lagged behind EHR development and implementation.
This in turn has caused little funding to be budgeted by provide....
Basics of Risk Analysis and Risk Management
Author: U.S. Centers for Medicare & Medicaid Services
Source: Government (U.S.)
Publication Date: August 18, 2005
Black Market PHI Does Exist: Why It’s Time to Take Security Risk Assessments Seriously
Author:
Source: Journal of AHIMA
Publication Date: May 2014
Many health information management (HIM) experts have wondered whether there is protected health information (PHI) on the black market. In short, the answer is “yes.” According to a 2012 Ponemon Institute study, 90 percent of healthcare organizations surveyed have had at least....
Building Privacy: Security Architecture, Models Under HIPAA
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: July 02, 2003
Part five in a 10-part series.
This article is the fifth of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. The information security domain of security architecture and models speaks to computer architectures, security....
By the Rules: Making Security Policies Stick
Author: Zender, Anne
Source: Journal of AHIMA
Publication Date: October 1999
Considerable attention has been paid to the development of organizationwide information security policiesespecially what they should contain and how they should be put in place. But enforcing these policies isn't always easy. We asked four information security experts to give us....
CMS’s 2009 Security Assessment Process
Author: Dinh, Angela K.
Source: Journal of AHIMA
Publication Date: September 2009
In 2008 the Centers for Medicare and Medicaid Services (CMS) conducted 10 HIPAA security assessments in covered entities (CEs) nationwide. CMS’s stated purpose was not to identify flaws but to gain a true understanding of industry compliance with the HIPAA security rule.
CMS co....
Code Sets
Author: Brooks, Patricia E.
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
2000 HIPAA Conference Presentation
Code Sets
Presented by Pat Brooks, RHIA
HCFA Standards for Electronic Transactions
HCFA-0149-P Published May 7, 1998 Final not yet published To be enacted 2 years after final notice (3 years for small plans)
Proposed Initial Standards for....
Code Sets: Improving the Quality of Coded Data
Author: Prophet, Sue
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
2000 HIPAA Conference Presentation
Code Sets: Improving the Quality of Coded Data
The Healthcare Provider Perspective
Sue Prophet, RHIA, CCS
Director, Classification and Coding, AHIMA Current Problems with Use of Code Sets
Lack of acceptance of valid codes (e.g., V and E co....
Code Sets: Improving the Quality of Coded Data
Author: Dixon-Lee, Claire
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
2000 HIPAA Conference Presentation
Code Sets: Improving the Quality of Coded Data
Presented by Claire Dixon-Lee, PhD, RHIA Future of Code Sets
Data Content Standardization Data Elements including formats and definitions Code Sets and values
Maximum defined data set Computer-....
Code Sets: Improving the Quality of Coded Data: Insurance Industry Perspective
Author: Bonnell, Claudia
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
2000 HIPAA Conference Presentation
Code Sets: Improving the Quality of Coded Data
The Insurance Industry Perspective
Presented by Claudia Bonnell, RN, MLS
Project Manager, Medical Information, Blue Cross and Blue Shield Association What Do You Want to Know?
The potential p....
Conducting a HIPAA Security Risk Assessment
Author: Klein, Jim
Source: AHIMA Convention
Publication Date: October 10, 2001
Introduction
Organizations covered under the Proposed Security Standards1 (the Draft Standard) are facing important regulatory compliance decisions for operational, technical, clinical, and administrative components of their enterprise. With the promulgation of the final Security Stand....
CPT Category III Codes Cover New, Emerging Technologies: New Codes Developed to Address Issues in Light of HIPAA
Author: Beebe, Michael
Source: Journal of AHIMA - Coding Notes
Publication Date: October 2003
In 1998, the American Medical Association (AMA) initiated the CPT-5 Project. This project was a broad-based and comprehensive effort to make needed and practical enhancements to the CPT code set that would address challenges presented by emerging user needs and HIPAA. One of the initiatives tha....
Cracking Encryption: Despite Benefits, Technology Still Not Widely Used to Combat Multi-Million Dollar Breaches
Author: Butler, Mary
Source: Journal of AHIMA
Publication Date: April 2015
In movies and on television lately, Hollywood has made encryption and decryption look exciting, glamorous, and world-saving. The film The Imitation Game and the BBC show The Bletchley Circle chronicle how British code breakers decrypted military strategy codes from the Nazi encryption tool....
Cumulative In Confidence Index
Author:
Source: In Confidence (newsletter)
Publication Date: August 09, 2002
Cybersecurity 101
Author: Lucci, Susan; Walsh, Tom
Source: Journal of AHIMA
Publication Date: November 2015
One of the most alarming statistics in the news, which is growing with intent and severity, is the prevalence of cyber-attacks, particularly in healthcare. It is an alarming trend that has gained a good deal of attention. For example, in July 2015, UCLA reported that up to 4.5 million pati....
Data Mapping for HIPAA Transactions (HIPAA on the Job)
Author: Amatayakul, Margret; Bisterfeldt, Joan
Source: Journal of AHIMA
Publication Date: July 2001
If you have been focusing primarily on HIPAA’s privacy and security regulations, not transactions requirements, this "HIPAA on the Job" is a must-read. Ensuring that you have all the required data content in your electronic systems is key to your organization’s compliance with the t....
Departmental Information Systems and HIPAA: Easing the Tension (part 1)
Author: Nulan, Craig A.
Source: In Confidence (newsletter)
Publication Date: May 02, 2002
This is the first article in a two-part series. Look for part two in the June issue of In Confidence.
Healthcare has an interesting quandary in the areas of HIPAA privacy and security compliance. First, there is the unarguable tension between minimum necessary information access and use....
Departmental Information Systems and HIPAA: Easing the Tension (part 2)
Author: Nulan, Craig A.
Source: In Confidence (newsletter)
Publication Date: June 02, 2002
Part two in a two-part series.
Part one of this article from the May 2002 issue of In Confidence focused on finding a balance between the needs of the information systems department and the requirements of HIPAA. The article offered tips on conducting an administrative certification as....
Destination 10: Healthcare Organization Preparation for ICD-10-CM and ICD-10-PCS (2004 update)
Author: AHIMA Coding Products and Services Team
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: March 2004
This practice brief has been retired. It is made available for historical purposes only.
Destroying Data the DoD Way: Military Standards Help Ensure Compliance for Electronic Data Security
Author: Keating, Angie Singer
Source: Journal of AHIMA
Publication Date: July 2005
The unauthorized use of confidential or sensitive information contained on computer hard drives is a serious problem facing most healthcare organizations. Organizations that do not require proper hard-drive sanitation as part of their total information destruction program face regulatory viola....
Developing a Framework for a Security Assessment
Author: Parisien, Darryl
Source: In Confidence (newsletter)
Publication Date: September 02, 2001
Is your organization taking the necessary actions to comply with the security regulations of HIPAA? Do you believe you have more time to comply? If you think you do, you might want to do a little more research. Take note that United States Code Title 42 Section 1320d-2 states:
Each pers....
Diverse Local Group Collaborates on Compliance Issues: Workgroup Focuses on Code Sets, Transactions
Author: Becker, Joanne
Source: Journal of AHIMA - Coding Notes
Publication Date: February 2003
Sometimes starting small can mean big results. A few months ago, I joined Iowas regional HIPAA Strategic National Implementation Process (SNIP) workgroup. The goal of local and regional SNIP workgroups is to create as much collaboration as possible to ensure compliance by all covered ent....
DSMOs Shed Light on Future Coding Systems, Data Sets
Author: Scichilone, Rita A
Source: Journal of AHIMA - Coding Notes
Publication Date: July 2002
The future of coding systems in healthcare transactions is brighter than many might think. Because of the rapid changes in healthcare services, technology, and the industry as a whole, there are more coding systems emerging that may affect the work of clinical coding professionals in the futur....
Early Word on HIPAA Claims Attachments
Author: Dougherty, Michelle
Source: Journal of AHIMA
Publication Date: October 2001
If we could look into a crystal ball and see into the future, it would be much easier to prepare for HIPAA, particularly the electronic transaction standards. Because of the rarity of crystal balls these days, we must rely on other predictors at our disposal, such as the white paper issued by t....
Electronic Record, Electronic Security
Author: Hagland, Mark
Source: Journal of AHIMA
Publication Date: February 2004
New technologies are enhancing the ability to protect patient information. But there’s more to successful implementation than just what’s inside the box.
Melanie Schattauer, RHIA, Jack Obert, and their colleagues at Mercy St. John’s Health System in Springfield, M....
Enhanced Protections for Uses of Health Data: a Stewardship Framework for ‘Secondary Uses’ of Electronically Collected and Transmitted Health Data
Author: National Committee on Vital and Health Statistics (NCVHS)
Source: Government (U.S.)
Publication Date: December 19, 2007
Enhancing Protections for Uses of Health Data: a Stewardship Framework. Summary for Policy Makers
Author: National Committee on Vital and Health Statistics (NCVHS)
Source: Government (U.S.)
Publication Date: April 24, 2008
Ensuring Your Business Associates Provide ‘Satisfactory Assurances’
Author: Lewis, Sharon; McLendon, Kelly
Source: Journal of AHIMA
Publication Date: October 2015
HIPAA uses the term “satisfactory assurances” four times in the text of its Privacy and Security Rules. Each time the statement is used it describes a covered entity’s (CE) responsibility to obtain satisfactory assurances from a business associate who creates, receives, maintains, or tran....
Environmental Scan: Unique Health Plan Identifier And Operating Rules for Health Information Transactions
Author: Amatayakul, Margret
Source: U.S. National Committee for Vital and Health Statistics
Publication Date: July 11, 2010
Envisioning Consistent Coding for All
Author:
Source: AHIMA Advantage
Publication Date: April 2002
What if...a single entity oversaw all of the coding systems in use today? What if...all payers and providers were required to adhere to code set rules and guidelines in the same way? What if...there was one definitive set of coding rules, definitions, and guidelines that all users could easily....
Establishing Security Safeguards to Meet the Privacy Rule: What You Need to Know
Author: Gallagher, Lisa; Yale, Ken
Source: In Confidence (newsletter)
Publication Date: August 02, 2003
The HIPAA privacy rule requires that a covered entity (CE) institute appropriate administrative, technical, and physical measures to reasonably safeguard the privacy of protected health information (PHI). In order to keep information “private,” it must be kept safe or secure. Therefore, logic....
Exploring HIPAA's Security Domains: Security Management Practices
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: March 02, 2003
Part one in a 10-part series.
This article is the first of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. This first domain of security management practices is the most general and introduces some topics t....
Final Rule for Healthcare Electronic Transactions and Code Sets
Author: AHIMA Policy and Government Relations Team
Source: AHIMA regulation analysis
Publication Date: September 02, 2000
The long-anticipated final rule for healthcare electronic transactions and code sets was released on Thursday, August 17, 2000. This final rule (Rule) is the first of several anticipated for release by the Secretary of the Department of Health and Human Services (DHHS) over the next four month....
Final Rule for HIPAA Security Standards: Analysis by the American Health Information Management Association Policy and Government Relations Team - February 2003
Author: AHIMA Policy and Government Relations Team
Source: AHIMA regulation analysis
Publication Date: February 28, 2003
Impact | This Analysis Includes | General Rules | Administrative Safeguards | Physical Safeguards | Technical Safeguards | Organizational Requirements | Policies, Procedures, and Documentation | Matrix | Introduction
After a wait of some four and one-half years, the Department of He....
Final Security Regulations Present Challenges, Opportunities for HIM
Author: Rode, Dan
Source: Journal of AHIMA
Publication Date: May 2003
With the release of the final HIPAA security regulations in February, HIM has taken yet another step toward the transition from paper to the electronic health record (EHR). This article discusses key areas of security compliance and how your organization can be prepared.
When PHI Go....
Finding Quality HIPAA Security Resources (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: January 2004
Many of us struggled to understand the HIPAA privacy rule and initially had few resources to turn to for help. As your organization begins planning for security rule compliance, however, many of you may be finding that you’re overwhelmed with the volume of potential resources available.....
Five Steps to Reading the HIPAA Rules (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: September 2001
HIPAA's administrative simplification regulations appear to be anything but simple. Part of the Health Insurance Portability and Accountability Act of 1996, these provisions are intended to achieve efficiency and effectiveness and promote use of information systems. There are definite....
Getting Ready for HIPAA Privacy Rules
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: April 2000
What do the proposed privacy regulations mean to HIM professionalsand what can you do now to begin to prepare? The author takes an in-depth look at the proposed rules.
The Health Insurance Portability and Accountability Act (HIPAA) of 1996 is bringing significant changes to the ma....
Guidance on Compliance with HIPAA Transactions and Code Sets after the October 16, 2003, Implementation Deadline
Author: U.S. Centers for Medicare & Medicaid Services
Source: Government (U.S.)
Publication Date: July 24, 2003
Guidelines for a Compliant Business Associate Agreement (2016)
Author: AHIMA Work Group
Source: AHIMA practice brief
Publication Date: October 2016
This update supersedes the November 2013 practice brief, Guidelines for a Compliant Business Associate Agreement.
The Privacy Rule portion of the Health Insurance Portability and Accountability Act (HIPAA) defines a "business associate (BA) as a person or entity that performs....
Guidelines for a Compliant Business Associate Agreement - Retired
Author: AHIMA
Source: AHIMA practice brief
Publication Date: November 2013
This 2013 practice brief version has been retired and is retained here for historical purposes. Read the 2016 updated version of this Practice Brief here.
The Privacy Rule portion of the Health Insurance Portability and Accountability Act (HIPAA) of 1996 defines a "business....
Handling Security Breaches Under HIPAA: a Legal Perspective
Author: Gradle, Brian D.
Source: In Confidence (newsletter)
Publication Date: August 02, 2003
If you were to ask health information managers for a one-word response to HIPAA, the majority of the replies would likely be “privacy.”However, simply because the compliance date for the final security rule (which was published by the government in February and applies to electronic informati....
Health Insurance Portability and Accountability Act (HIPAA) X12N 837 Health Care Claim Implementation Guide (IG) Editing Additional Instruction
Author: U.S. Centers for Medicare & Medicaid Services
Source: Government (U.S.)
Publication Date: March 25, 2004
Health Insurance Reform: Modifications to Electronic Data Transaction Standards and Code Sets; Final Rule
Author: U.S. Centers for Medicare & Medicaid Services
Source: Government (U.S.)
Publication Date: February 20, 2003
Health Insurance Reform: Modifications to the Health Insurance Portability and Accountability Act Electronic Transaction Standards. Proposed Rule
Author: U.S. Department of Health and Human Services. Office of the Secretary
Source: Government (U.S.)
Publication Date: August 22, 2008
Health Insurance Reform: Security Standards; Final Rule
Author: U.S. Centers for Medicare & Medicaid Services
Source: Government (U.S.)
Publication Date: February 20, 2003
HHS Publishes Notice of Proposed Rule Making for Security, Electronic Signature Standards
Author: Frawley, Kathleen A.; Asmonga, Donald D.
Source: Journal of AHIMA
Publication Date: October 1998
On August 12, the Department of Health and Human Services (HHS) published the notice of proposed rule making on standards for the security of individual health information and electronic signature use by health plans, healthcare clearinghouses and healthcare providers. These standards are part....
HHS Releases Final Rules for HIPAA Transactions, Code Sets
Author: Rode, Dan
Source: Journal of AHIMA
Publication Date: November 2000
HIM professionals have new HIPAA challenges to prepare for: this summer, the Department of Health and Human Services (HHS) released the highly anticipated final rule for certain transaction sets and codes.1 The rule was effective on October 16, 2000, and under HIPAA legislation, most....
HHS Steps up HIPAA Audits: Now Is the Time to Review Security Policies and Procedures
Author: Greene, Adam H
Source: Journal of AHIMA
Publication Date: October 2011
Now Is the Time to Review Security Policies and Procedures
In June 2011 the Department of Health and Human Services awarded KPMG a $9.2-million contract to create an audit protocol and audit organizational compliance with the HIPAA privacy and security requirements.1 The co....
HIM on the Front Lines of Change: Marching Toward the National Health Information Infrastructure
Author: Rollins, Gina
Source: Journal of AHIMA
Publication Date: January 2003
What will it take to get the much-needed national health information infrastructure (NHII) up and running? Plenty of support from HIM professionals is vital, plus renewed attention to standards and information technology. Learn how each of these factors contribute to making the NHII a reality.....
HIPAA Acknowledgments: the Need for a Standard Transaction Acknowledgment
Author: WebMD
Source: External web site
Publication Date: November 24, 2004
HIPAA Administrative Simplification: Standards for Electronic Health Care Claims Attachments CMS-0050-P
Author: Rode, Dan
Source: AHIMA testimony and comments
Publication Date: January 20, 2006
January 20, 2006
Honorable Michael O. Leavitt
Secretary
Department of Health and Human Services
CMS-0050-P
Hubert H. Humphrey Building
Room 445-G
200 Independence Avenue, SW
Washington, DC 20201
Re: HIPAA Administrative Simplification: Standards for E....
HIPAA and Electronic HIM Systems
Author: McLendon, Kelly
Source: AHIMA Convention
Publication Date: September 23, 2002
HIPAA and the EHR: Making Technical Safeguard Changes
Author: Fodor, Joseph
Source: Journal of AHIMA
Publication Date: January 2004
As electronic health records (EHRs) become more commonplace in healthcare, changes, adjustments, and improvements will be inevitable. When designing, implementing, upgrading, or remediating an EHR system, your organizations implementation team should consider the impact of complying wit....
HIPAA Audit and System Activity Review: Developing a Process that Focuses on the Greatest Risks First
Author: Hofler, Linda D.; Hardee, Joy; Dildy, Kenneth; Burleson, Deeanna; Grady, Jamie
Source: Journal of AHIMA
Publication Date: March 2005
The privacy and security rules require audits and system activity reviews. Here is one health system's process, a systematic approach that focuses on areas of greatest risk.
Ensuring the privacy and confidentiality of patient information is fundamental to HIM, but it has taken on a new le....
HIPAA Breach Enforcement Roundup
Author: Cacciatore, Victoria; Downing, Katherine
Source: Journal of AHIMA
Publication Date: July 2014
Criminal attacks on healthcare systems have risen 100 percent since 2010, according to a recent Ponemon study.1 This makes it obvious that the privacy and security of patient health information is vulnerable and highly susceptible to data breach. The HIPAA Breach Notification Rule became e....
HIPAA Compliance Extension Postpones Simplification Benefits
Author: Rode, Dan
Source: Journal of AHIMA
Publication Date: February 2002
Under the terms of the Health Insurance Portability and Accountability Act of 1996, February 2002 would mark the second anniversary of administrative simplification for all but the smallest of health plans, and one year of rules related to claims attachments. Instead, Congress just approve....
HIPAA Compliance for Clinician Texting
Author: Greene, Adam H
Source: Journal of AHIMA
Publication Date: April 2012
The HIPAA privacy and security rules need not act as an obstacle to efficient communications, but keeping texting compliant requires planning and diligence.
Text (or SMS) messaging has become nearly ubiquitous on mobile devices. According to one survey, approximately 72 perce....
HIPAA Compliance in U.S. Hospitals: A Self-Report of Progress Toward the Security Rule
Author: Having, Karen; Davis, Diane C.
Source: Perspectives in Health Information Management
Publication Date: November 2005
Abstract
In January 2004, a random sampling of 1,000 U.S. hospitals was surveyed by researchers at a midwestern university to determine perceived level of compliance with the security requirements of the federal Health Insurance Portability and Accountability Act (HIPAA). Exa....
HIPAA Electronic Transactions
Author: Miller, Susan A
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
2000 HIPAA Conference Presentation
HIPAA Electronic Transactions
Presented by Susan A. Miller, Esquire, Corporate Regulatory & Compliance Manager, IDX Systems Company HIPAA Summary
Title II, Subtitle FAdministrative Simplification of the Health Insurance Portability and Accoun....
HIPAA Electronic Transactions and Code Sets Model Compliance Plan
Author: U.S. Centers for Medicare & Medicaid Services
Source: Government (U.S.)
Publication Date: March 27, 2002
HIPAA Implementation: the Case for a Rational Roll-out Plan
Author: WebMD
Source: External web site
Publication Date: July 19, 2004
HIPAA Marches On--Or Does It?
Author: Rode, Dan
Source: Journal of AHIMA
Publication Date: March 2005
HIPAA has taught us that standardization is hard. When the act was signed into law in 1996, the optimists among us believed that within four years the healthcare industry would be using a variety of uniform national administrative transactions, most associated with what we now call the revenue....
HIPAA Mighty and Flawed: Regulation has Wide-Reaching Impact on the Healthcare Industry
Author: Solove, Daniel J
Source: Journal of AHIMA
Publication Date: April 2013
How HIPAA has performed overall as a privacy law is open to interpretation, but most agree it has had a wide-reaching impact on the healthcare industry. In comparison to the dozens of federal privacy laws for various industries, HIPAA is one of the most comprehensive and detailed.
HIPAA Privacy and Security Training (2002)
Author: Hjort, Beth M.
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: April 2002
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
HIPAA Privacy and Security Training (2003 update)
Author: Hjort, Beth M.
Source: AHIMA practice brief
Publication Date: November 2003
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
HIPAA Privacy and Security Training (2010 update)
Author: AHIMA
Source: AHIMA practice brief
Publication Date: November 2010
This practice brief has been retired. It is made available for historical purposes only.
HIPAA Reins in Shadow Charts, Independent Databases (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: October 2003
Shadow charts, independent databases, or orphan systems, as they are sometimes called, are among the most controversial and difficult to manage forms of protected health information (PHI) that exist. Yet some providers are having success using HIPAAs privacy and security stan....
HIPAA Requirements for Secure Record Storage and Data Transfer
Author: Rosenbaum, Arnold S.; Nelson, Gina A.
Source: AHIMA Convention
Publication Date: October 15, 2004
HHS Secretary Tommy Thompson released the Final Regulations for Security Standards in final form in February 2003. The security standards were developed to help safeguard confidential health information, which is being processed increasingly by computers.
The mandates require covered ent....
HIPAA, Security, and Electronic Signature: A Closer Look
Author: Ballam, Holly
Source: Journal of AHIMA
Publication Date: March 1999
A recent notice of proposed rule making for an electronic signature standard, if adopted, will affect the way health information is managed for years to come. Here's what you need to know about electronic signature and what the proposed standard may mean for HIM.
The Health....
HIPAA Security Compliance: What Comes Next?
Author: Dinh, Angela K.
Source: External - used with permission
Publication Date: May 02, 2008
This article, written by an AHIMA HIM Practice Director and published in the Journal of Healthcare Compliance (May/June 2008) offers six tips to help organizations stay current, strive for compliance, and prepare for the future.
HIPAA Security Context, Concepts, and Misconceptions
Author: Baker, Dixie B.
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
HIPAA Security: Don't Disband the Committee Just Yet
Author: Brown, Stephen C.
Source: Journal of AHIMA
Publication Date: May 2005
By now, every healthcare organization has faced the initial security compliance responsibilities associated with HIPAA. However, the compliance road has not yet been fully traveled. The nature of the rule makes compliance a recursive effort of reassessment, continual auditing, regular educatio....
HIPAA Security FAQs
Author: U.S. Centers for Medicare & Medicaid Services
Source: Government (U.S.)
Publication Date: August 16, 2004
Please be advised that these FAQs were generated from a database that is updated frequently. For the most up-to-date information, please visit http://questions.cms.hhs.gov.
Date: 9/30/2004
Question #1889: Are covered entities protected when they make disclosures t....
HIPAA Security Guidance
Author: U.S. Centers for Medicare & Medicaid Services
Source: Government (U.S.)
Publication Date: January 03, 2007
HIPAA Security Overview
Author: Quinsey, Carol Ann
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: April 2004
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
HIPAA Security Overview (2010 update)
Author: AHIMA
Source: AHIMA practice brief
Publication Date: November 2010
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
HIPAA Security Overview - Retired
Author: Miaoulis, William M
Source: AHIMA practice brief
Publication Date: November 2013
Editor’s note: This update replaces the April 2004 and the November 2010 practice briefs titled “A HIPAA Security Overview.”
The HIPAA security rule has remained unchanged since its implementation more than a decade ago. However, the Health Information Technology for Economic a....
HIPAA Security Redux: A Re-evaluation Process and Recommended Areas to Review
Author: Adler, M. Peter
Source: Journal of AHIMA
Publication Date: November 2007
Remember the mad scramble to create a compliance plan before the HIPAA security rule deadline? It’s time to revisit that plan.
Publication of the HIPAA security rule created a flurry of discussions, debate, and activity as healthcare professionals grappled wi....
HIPAA Security Shopping List (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: May 2004
Many information security officials are barraged with requests for the latest security tools. Such shopping lists often do not reflect a structured plan or a true risk analysis to justify their cost or human resource requirements. This column describes some of the latest tools, how you can ev....
HIPAA Security Standards Update
Author: Parmigiani, John
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
2000 HIPAA Conference Presentation
HIPAA Security Standards Update
Presented by John Parmigiani, Practice Director, Healthcare Computing Strategies Industry + Government = HIPAA Security Standards
Objectives
Establish a Healthcare Data/Systems Security Framework Identify Require....
HIPAA Security Standards: Working With Your Information Technology Vendors
Author: Brandt, Mary D.
Source: AHIMA Convention
Publication Date: October 10, 2001
"Information security? I don't need to worry about that. My information technology (IT) vendor will take care of it."
You probably haven't made this comment, but I've heard it many times. It would certainly be convenient if we could delegate responsibility for secur....
HIPAA Transactions and Code Sets Toolkit for Physicians and Other Providers of Professional Healthcare Services
Author: Amatayakul, Margret
Source: External web site
Publication Date: 2003
HIPAA Transaction Standards Force OASIS Changes for Home Health
Author: Abraham, Prinny
Source: AHIMA community resource
Publication Date: July 24, 2003
Most Home Health Agencies bill Medicare electronically for skilled care provided to beneficiaries. OASIS (Outcome and Assessment Information Set) is the standard instrument used to determine correct case mix assignment under Medicare prospective payment system regulations. The diagnoses used on....
HIPAA: Understanding the Requirements (HIPAA on the Job)
Author: Cassidy, Bonnie S.
Source: Journal of AHIMA
Publication Date: April 2000
(Editor's note: This is the first in a series of special inserts intended to help HIM professionals educate themselves about the Health Insurance Portability and Accountability Act [HIPAA] of 1996. In this installment, we take a look at this groundbreaking legislation from a nuts-and-bolts pe....
How Law, Investigation, Ethics Connect to HIPAA
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: November 02, 2003
Part nine in a 10-part series.
This article is the ninth of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. The information security domain of law, investigation, and ethics covers these topics in depth and provides a p....
[1] 2 3