Search Results

= Members only

Current search

215 results.

1 [2] 3

HIPAA Marches On--Or Does It?

Author: Rode, Dan

Source: Journal of AHIMA

Publication Date: March 2005


HIPAA has taught us that standardization is hard. When the act was signed into law in 1996, the optimists among us believed that within four years the healthcare industry would be using a variety of uniform national administrative transactions, most associated with what we now call the revenue....

HIPAA Security: Don't Disband the Committee Just Yet

Author: Brown, Stephen C.

Source: Journal of AHIMA

Publication Date: May 2005


By now, every healthcare organization has faced the initial security compliance responsibilities associated with HIPAA. However, the compliance road has not yet been fully traveled. The nature of the rule makes compliance a recursive effort of reassessment, continual auditing, regular educatio....

HIPAA Security Overview - Retired

Author: Miaoulis, William M

Source: AHIMA practice brief

Publication Date: November 2013


Editor’s note: This update replaces the April 2004 and the November 2010 practice briefs titled “A HIPAA Security Overview.”


The HIPAA security rule has remained unchanged since its implementation more than a decade ago. However, the Health Information Technology for Economic a....

HIPAA Security Shopping List (HIPAA on the Job)

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: May 2004


Many information security officials are barraged with requests for the latest security tools. Such shopping lists often do not reflect a structured plan or a true risk analysis to justify their cost or human resource requirements. This column describes some of the latest tools, how you can ev....

HIPAA Security Standards Update

Author: Parmigiani, John

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
HIPAA Security Standards Update
Presented by John Parmigiani, Practice Director, Healthcare Computing Strategies Industry + Government = HIPAA Security Standards
Objectives
Establish a Healthcare Data/Systems Security Framework Identify Require....

How Law, Investigation, Ethics Connect to HIPAA

Author: Ruano, Michael

Source: In Confidence (newsletter)

Publication Date: November 02, 2003


Part nine in a 10-part series.
This article is the ninth of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. The information security domain of law, investigation, and ethics covers these topics in depth and provides a p....

How to Safely Recycle PCs

Author: Quinsey, Carol Ann

Source: Journal of AHIMA

Publication Date: June 2005


Securing the privacy of both protected health information and personal information should be a primary concern when personal computers have outlived their usefulness. Recycling or disposing of a computer safely can be a challenge.

It’s not enough to simply give an old computer....

Industry Awaits Phase 2 of HIPAA Audit Program

Author: Asmonga, Donald D.

Source: Journal of AHIMA

Publication Date: January 2015



The wait for the second round of mandated privacy and security audits from the Department of Health and Human Services’ (HHS) Office for Civil Rights (OCR) continues. OCR is currently working through final details for the revised audit plan as they await finalization of new technolog....

Information Governance for Offsite Data Security

Author: Saharia, Devendra

Source: Journal of AHIMA

Publication Date: April 2016



Disruptive technology can turn any industry on its head—virtually overnight. Just five years ago, summoning a taxi was an inefficient, time-consuming effort that often involved dialing up a dispatcher, who contacted a driver, who would then make their way to your location, perhaps in an h....

Information Security

Author: Tang, Paul C.

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
Information Security
Presented by Paul Tang, MD Information Systems Security
NRC Definition Security is the protection of information systems against unauthorized access to or modification of information, whether in storage, processing, or transit,....

Journal Q&A (2/04)

Author: AHIMA Professional Practice Team

Source: AHIMA Q and A

Publication Date: February 02, 2004

Q: Can you explain the difference between the terms “addressable” and “required” as they are used in the final security rule?
A: The final security rule and the privacy rule use the terms “standards” and “implementation specifications.” Standards....

Kaiser Permanente Approach

Author: Cooper, Ted

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
Organizing the Effort
Case Study: The Kaiser Permanente Approach
Presented by Ted Cooper, MD, National Director, Confidentiality & Security, Kaiser Permanente Kaiser Permanente
Kaiser Foundation Health Plan Kaiser Foundation Hospitals Region....

Kick Starting the Security Risk Analysis

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: July 2004


Many covered entities are just now starting to approach the compliance aspects of the HIPAA security rule. Why discuss “compliance aspects” and not standards or controls, as we did when preparing for the privacy rule? Privacy and security are long-standing concepts to healthcare,....

Lessons Learned from a Security Assessment

Author: Cummings, Judy

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
Lessons Learned from a Security Assessment
Presented by Judy Cummings, Senior Manager, Strategic Development
Sharp Healthcare Information Systems Presentation Overview
After this presentation, you will know these things about a security assessm....

Making Your Data Warehouse HIPAA Compliant

Author: Reinke, Brian

Source: In Confidence (newsletter)

Publication Date: July 02, 2002


Now a proven technology, data warehousing is entering into widespread use. Detailed patient records of many organizations are now being electronically archived using data warehousing. The goal of using this computer technology is to retain information for years so it can be used for various m....

Measuring HIPAA's Impact (HIPAA on the Job)

Author: Fuller, Sandra R.

Source: Journal of AHIMA

Publication Date: February 2001




As children, most of us stood against a door frame while our parents recorded our height and the date on the wall. These marks climbed each year as reminders of the changes we were experiencing. When relatives visited, we proudly showed off our progress to adulthood.

These....

Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification Rules Under the Health Information Technology for Economic and Clinical Health Act and the Genetic Information Nondiscrimination Act; Other Modifications to the HIPAA Rules; Final Rule

Author: U.S. Office for Civil Rights

Source: U.S. Department of Health & Human Services | U.S. Office for Civil Rights

Publication Date: January 2013

Rule modifies HIPAA by implementing statutory amendments under HITECH to strengthen the privacy and security protection for individuals’ health information; modifies the Breach Notification Rule under the HITECH Act, modifes the HIPAA Privacy Rule to strengthen the privacy protections for genetic information and makes certain other modifications to the HIPAA Privacy, Security, Breach Notification, and Enforcement Rules (the HIPAA Rules) to improve their workability and effectiveness and to increase flexibility for and decrease burden on regulated entities.

Moving Toward a Unified Information Security Program

Author: Ruano, Michael

Source: Journal of AHIMA

Publication Date: January 2003


Is your organization up to the challenge of creating a unified information security program?


A unified information security program has been all but mandated for healthcare organizations by the federal government. HIPAA requires that electronic, paper, and oral patient identif....

NCVHS Groups Explore CPR, Privacy Rule Possibilities

Author: Rode, Dan

Source: Journal of AHIMA

Publication Date: October 2001




HIPAA's fifth anniversary was marked by meetings of two key subcommittees of the National Committee on Vital and Health Statistics (NCVHS): the standards (transactions) and security subcommittee and the privacy and confidentiality subcommittee. At the security subcommittee, experts fr....

New Standards Focus on Information Security

Author: Hanken, Mary Alice

Source: Journal of AHIMA

Publication Date: March 1998


The federal legislation for the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and the need in healthcare for security of confidential data have come together to heighten the interest in security standards for electronic health information systems. Th....

On the HIPAA Hook

Author: Hicks, Andrew

Source: Journal of AHIMA

Publication Date: April 2014



Some healthcare business associates are still asking if HITECH-HIPAA impacts them. The answer is just as important to their affiliated healthcare providers.


Thousands of companies are now legally obligated to comply with the HITECH-HIPAA regulations because of their busines....

On the Line: Professional Practice Solutions

Author: Dougherty, Michelle

Source: Journal of AHIMA

Publication Date: November 2001


Q: Where can I find the updated data elements and data definitions for the Uniform Hospital Discharge Data Set (UHDDS)?

Q: Where can I find an easy-to-use glossary for terms in the HIPAA regulations?

Michelle Dougherty (michelle.dougherty@ahima.org) is an HIM practice manager....

On the Line: Professional Practice Solutions

Author: Smith, Cheryl M.

Source: Journal of AHIMA

Publication Date: February 2001




Q: Where can I find information on the interpretation of Joint Commission on Accreditation of Healthcare Organization standards?

Q: How does the Health Insurance Portability and Accountability Act of 1996 (HIPAA) define health information in the final rule for healthcare elec....

Organizing the Effort

Author: Grant, Karen G.

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
Organizing the Effort
Presented by Karen G. Grant, RHIA, Corporate Director, Health Information Services, Partners HealthCare System Goals
To maintain a secure and continuously available technology infrastructure for Partners HealthCare System Compl....

Performing a Baseline Security Assessment

Author: Lawson, Jayne W.

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
Performing a Baseline Security Assessment
Presented By Jayne W. Lawson, RHIA, Information Security Manager, Hartford Hospital Awareness and Accountability
Designate staff/team responsible for overseeing review process Determine sponsorship Educate h....

Preparing for the Next Big April

Author: Thomason, Mary

Source: Journal of AHIMA

Publication Date: April 2004


Yesterday’s privacy compliance preparations can contribute to meeting tomorrow’s security mandates. One organization is tackling risk analysis with both matrix and memories.
The 2003 HIPAA privacy rule implementation is still fresh in many minds throughout healthcare organiza....

Preparing the Physician Office for HIPAA

Author: Uppena, Mary

Source: Journal of AHIMA - Coding Notes

Publication Date: February 2001




Change has been a constant factor in coding and reimbursement with the intensified focus on billing, compliance, and cost control. Out of necessity, coding professionals in physician settings have learned to be organized, adaptable, and armed with the latest information. The mandates....

Primer on Encryption

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: June 2004


Encryption is an addressable implementation specification under HIPAA’s access control and transmission security standards. Many providers are grappling with just how to address these specifications:
Is there a difference between the two specifications, and if so, what is the diff....

Privacy and Security: Are Two Hats Better Than One?

Author: Woloszyn, William

Source: Journal of AHIMA

Publication Date: June 2002



Who, me? Work as both a privacy officer and a security officer? It may seem impossible, but it can be done. While the roles of privacy officer and security officer are often presented as two distinct jobs in relation to HIPAA, if a lack of resources or personnel demand it, a daring HIM pro....

1 [2] 3