Search Results

= Members only

Current search

215 results.

[1] 2 3 4 5

Who's Covered by HIPAA (HIPAA on the Job)

Author: Rode, Dan

Source: Journal of AHIMA

Publication Date: March 2001




One of the mysteries of the administrative simplification section of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) is determining who is covered or comes under the requirements of the act. This article will examine HIPAA to unravel some of the mystery of &quo....

What is Security Auditing?

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: November 2004


The HIPAA security rule includes a requirement for audit controls and to monitor and manage ongoing security for a variety of processes. But the requirement for internal audit was changed to “information security activity review,” and there is no other specific reference to auditin....

Updated Toolkit for Security Strategies

Author: Cooper, Ted

Source: Journal of AHIMA

Publication Date: July 2004


The first version of the Computer-based Patient Record Institute (CPRI) toolkit “Managing Information Security in Health Care” was published on the Web in May 1999 in response to the proposed HIPAA security and electronic signature standard of October 1998. The toolkit is intended....

Understanding HIPAA Transactions and Code Sets

Author: Rode, Dan

Source: Journal of AHIMA

Publication Date: January 2001


The recently published final regulations for transactions and code sets under HIPAA are the light at the end of the tunnel in the quest for uniform healthcare standards-and the first step on a long road to HIPAA implementation. What are the standard transactions and code sets? This article tak....

Trouble with Audit Controls

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: October 2004


The 2004 Phoenix Health System/HIMSS HIPAA compliance survey indicates that providers find audit controls the most difficult of the HIPAA security standards to implement.
While it is recognized that every organization must conduct a risk analysis to determine the systems or activities th....

Transactions Standards

Author: Braithwaite, Bill

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
Transactions Standards

Presented by Bill Braithwaite, MD, PhD, FACMI, Senior Advisor on Health Information Policy, US Dept. of HSS
Transaction Standards
NPRM published in 1998 (5/7/98 - 7/6/98) Adopts ASC X12N standards for transactions (e....

Transactions Delay Prompts Concern Among Covered Entities

Author: Rode, Dan

Source: Journal of AHIMA

Publication Date: March 2002


AHIMA recently attended a meeting of healthcare providers, payers, and staff representatives of the National Committee on Vital and Health Statistics (NCVHS) and the Centers for Medicare and Medicaid Services (CMS). Organized by the Association for Electronic Health Care Transactions, the meet....

The Year That Was and the Year to Be

Author: Asmonga, Donald D.

Source: Journal of AHIMA

Publication Date: February 2011


The second session of the 111th Congress began with the Democrats in firm control of the House and Senate. Working from their position of power enabled the Democrats to pass healthcare reform.

Although Congress was mired in contentious debates, AHIMA still advocated for its public po....

Testimony of the American Health Information Management Association to the National Committee on Vital and Health Statistics on Medical Code Sets

Author: Prophet, Sue

Source: AHIMA testimony and comments

Publication Date: February 06, 2002

February 6, 2002
Opening Comments

Good morning Mr. Chairman, members and staff of the National Committee on Vital and Health Statistics (NCVHS) Standards and Security subcommittee, ladies and gentlemen.   I am Sue Prophet, director of coding policy and compliance for the American Heal....

Take Another Look: Proposed Changes to Privacy Rule

Author: Rode, Dan

Source: Journal of AHIMA

Publication Date: May 2002


In late March, the Department of Health and Human Services (HHS) released proposed changes related to the HIPAA privacy standards. By the time you read this column, the 30-day comment period for these regulations will have already passed, although debate on these changes will still be in full....

Stealth Software Deters PHI Theft

Author: Kawles, Terrance L.

Source: Journal of AHIMA

Publication Date: July 2003


As the leading edge of digital portability advances, the protections afforded the “portability” portion of HIPAA become strained. Under the final security standards, covered entities (CEs) must establish procedures and mechanisms to protect the confidentiality, integrity, and availab....

State of HIPAA Privacy and Security Compliance 2005

Author: AHIMA

Source: AHIMA report

Publication Date: April 11, 2005

The results of a survey to assess the current state of HIPAA privacy and security within the healthcare industry.

AHIMA releases the results of this research in conjunction with the second annual National Health Information Privacy and Security Week, April 10-16, 2005. AHIMA is sponsoring National Health Information Privacy and Security Week to raise awareness among healthcare professionals, their employers, the media, and the public regarding the importance of protecting the privacy, confidentiality, and security of personal health information (PHI).

Standards Organizations Plan Collaboration

Author:

Source: Journal of AHIMA

Publication Date: June 2000


In March, the National Committee on Vital and Health Statistics (NCVHS) Subcommittee on Standards and Security reached an agreement with six standard-setting organizations. The six organizations include the Accredited Standards Committee X12, Dental Content Committee, Health Level Seven,....

Spoliation of Medical Evidence

Author: Tomes, Jonathan P.

Source: Journal of AHIMA

Publication Date: October 2005


To avoid the improper destruction or alteration of records, HIM departments must follow a retention schedule, train personnel, and ensure that corrections leave original entries intact.
Although the legal concept known as spoliation of evidence has been a part of the American legal syste....

Sorting Out Employee Sanctions

Author: Burrington-Brown, Jill

Source: Journal of AHIMA

Publication Date: June 2003


Has your organization addressed sanctions related to privacy and security issues? Both the final privacy rule and final security rule address this issue. The privacy rule states that the covered entity must “have and apply appropriate sanctions against members of its workforce who fail to....

Shifting from Reactive to Proactive HIPAA Audits

Author: Brinda, Danika

Source: Journal of AHIMA

Publication Date: January 2016



Stories about workforce members inappropriately accessing health information continue to plague the Department of Health and Human Services’ Data Breach Portal—which lists US provider data breaches that affect more than 500 individuals. Recently two data breaches reported on th....

Security @ the Edge

Author: Boroditsky, Marc

Source: In Confidence (newsletter)

Publication Date: November 02, 2000


With the pending impact of the Health Insurance Portability and Accountability Act (HIPAA) requirements and the high hopes for fully automated e-medical informatics, healthcare information professionals must gain an appreciation for the edge of their networks. More than ever before, the edge....

Security Awareness: The Right Messages

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: April 2004


How many of you have warned your e-mail users about “phishers”—e-mail that appears to come from a trusted source asking the recipient to click on a link to update personal details? But the site is really a fake, and the e-mail is a scam to steal personal information.

[1] 2 3 4 5