215 results.
1 2 3 4 5 6 7 [8] 9
Enhanced Protections for Uses of Health Data: a Stewardship Framework for ‘Secondary Uses’ of Electronically Collected and Transmitted Health Data
Author: National Committee on Vital and Health Statistics (NCVHS)
Source: Government (U.S.)
Publication Date: December 19, 2007
Electronic Record, Electronic Security
Author: Hagland, Mark
Source: Journal of AHIMA
Publication Date: February 2004
Early Word on HIPAA Claims Attachments
Author: Dougherty, Michelle
Source: Journal of AHIMA
Publication Date: October 2001
DSMOs Shed Light on Future Coding Systems, Data Sets
Author: Scichilone, Rita A
Source: Journal of AHIMA - Coding Notes
Publication Date: July 2002
Diverse Local Group Collaborates on Compliance Issues: Workgroup Focuses on Code Sets, Transactions
Author: Becker, Joanne
Source: Journal of AHIMA - Coding Notes
Publication Date: February 2003
Developing a Framework for a Security Assessment
Author: Parisien, Darryl
Source: In Confidence (newsletter)
Publication Date: September 02, 2001
Destroying Data the DoD Way: Military Standards Help Ensure Compliance for Electronic Data Security
Author: Keating, Angie Singer
Source: Journal of AHIMA
Publication Date: July 2005
Destination 10: Healthcare Organization Preparation for ICD-10-CM and ICD-10-PCS (2004 update)
Author: AHIMA Coding Products and Services Team
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: March 2004
Departmental Information Systems and HIPAA: Easing the Tension (part 2)
Author: Nulan, Craig A.
Source: In Confidence (newsletter)
Publication Date: June 02, 2002
Departmental Information Systems and HIPAA: Easing the Tension (part 1)
Author: Nulan, Craig A.
Source: In Confidence (newsletter)
Publication Date: May 02, 2002
Data Mapping for HIPAA Transactions (HIPAA on the Job)
Author: Amatayakul, Margret; Bisterfeldt, Joan
Source: Journal of AHIMA
Publication Date: July 2001
Cybersecurity 101
Author: Lucci, Susan; Walsh, Tom
Source: Journal of AHIMA
Publication Date: November 2015
Cumulative In Confidence Index
Author:
Source: In Confidence (newsletter)
Publication Date: August 09, 2002
Cracking Encryption: Despite Benefits, Technology Still Not Widely Used to Combat Multi-Million Dollar Breaches
Author: Butler, Mary
Source: Journal of AHIMA
Publication Date: April 2015
CPT Category III Codes Cover New, Emerging Technologies: New Codes Developed to Address Issues in Light of HIPAA
Author: Beebe, Michael
Source: Journal of AHIMA - Coding Notes
Publication Date: October 2003
Conducting a HIPAA Security Risk Assessment
Author: Klein, Jim
Source: AHIMA Convention
Publication Date: October 10, 2001
Code Sets: Improving the Quality of Coded Data: Insurance Industry Perspective
Author: Bonnell, Claudia
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
Code Sets: Improving the Quality of Coded Data
Author: Prophet, Sue
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
Code Sets: Improving the Quality of Coded Data
Author: Dixon-Lee, Claire
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
Code Sets
Author: Brooks, Patricia E.
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
CMS’s 2009 Security Assessment Process
Author: Dinh, Angela K.
Source: Journal of AHIMA
Publication Date: September 2009
By the Rules: Making Security Policies Stick
Author: Zender, Anne
Source: Journal of AHIMA
Publication Date: October 1999
Building Privacy: Security Architecture, Models Under HIPAA
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: July 02, 2003
Black Market PHI Does Exist: Why It’s Time to Take Security Risk Assessments Seriously
Author:
Source: Journal of AHIMA
Publication Date: May 2014
Basics of Risk Analysis and Risk Management
Author: U.S. Centers for Medicare & Medicaid Services
Source: Government (U.S.)
Publication Date: August 18, 2005
1 2 3 4 5 6 7 [8] 9