Search Results

= Members only

Current search

540 results.

1 2 3 4 [5] 6 7 8

Untangling Privacy

Author: Dimick, Chris

Source: Journal of AHIMA

Publication Date: February 2009


Health IT won’t advance far without resolving the complex issue of privacy protections. Can a complicated situation be teased apart thread by thread?

The debate on privacy has become very public.

Privacy advocates, health IT advocates, providers, HIM professionals, fe....

Medical Identity Theft and the Red Flags Rule

Author: Apgar, Chris

Source: Journal of AHIMA - website

Publication Date: April 2009


Continuing our Health Information Privacy and Security Week series, today Chris Apgar, CISSP, president of Apgar & Associates LLC, takes a look at medical identity theft within the context of the Red Flags Rule.

Much is reported in the news about identity theft including new cat....

Guidance Specifying the Technologies and Methodologies That Render Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals for Purposes of the Breach Notification Requirements ... [of ARRA]

Author: U.S. Department of Health and Human Services. Office of the Secretary

Source: Government (U.S.)

Publication Date: April 27, 2009

[Federal Register: April 27, 2009 (Volume 74, Number 79)] [Rules and Regulations] [Page 19006-19010] From the Federal Register Online via GPO Access [wais.access.gpo.gov] [DOCID:fr27ap09-11] ======================================================================= ------------------------------------....

Sequestering EHR Data in IT Systems

Author: Miaoulis, William M

Source: Journal of AHIMA

Publication Date: May 2009


There can be three situations under which healthcare organizations may need to sequester (or segregate) certain data within a medical record: placing a legal hold in connection with litigation, limiting disclosures of a record pursuant to a request by a patient, and restricting access to sensi....

Model Breach Notification Letter: Content and Format

Author: AHIMA

Source: AHIMA

Publication Date: August 24, 2009


High-level guidance outlining the content requirements for breach notification letters is provided in section 13402, "Notification in the Case of Breach," of the American Recovery and Reinvestment Act and state-level data breach notification and reporting laws in 44 states, the District of Colu....

Path to Security Breach Notification Regulation

Author: Rhodes, Harry B.

Source: AHIMA

Publication Date: August 24, 2009


Forty-four states, the District of Columbia, Puerto Rico, and the Virgin Islands enacted data breach notification and reporting laws well before the Health Information Technology for Economic and Clinical Health (HITECH) Act of the American Recovery and Reinvestment Act (ARRA) set the first f....

Accounting of Disclosures: ARRA’s Impact

Author: Rhodes, Harry B.

Source: AHIMA Convention

Publication Date: October 05, 2009


The accounting of disclosures requirement is one of the most difficult HIPAA privacy rule compliance issues to implement. Following the August 2002 modifications to the privacy rule requirements, the accounting for disclosures requirement has stood out as the HIPAA requirement demanding the big....

HIM Can Help in the Battle Against Medical Identity Theft

Author:

Source: AHIMA Today

Publication Date: October 07, 2009


The woman rushed into the emergency department at Massachusetts General Hospital (MGH) in extreme pain. She presented her insurance card and name to registration and was quickly examined by medical staff. Doctors determined the woman needed an emergency appendectomy. But staff soon realized tha....

Few Requests for Today’s Accountings

Author: AHIMA

Source: Journal of AHIMA

Publication Date: February 2010


HIPAA’s Accounting of Disclosure Provisions Led to Few Patient Requests; Now ARRA Is Upping the Ante

Provisions within the American Recovery and Reinvestment Act extend HIPAA’s accounting of disclosure regulations for providers who maintain electronic health records. The provisions a....

Elements of a Breach Notification Letter

Author: Hjort, Beth M.

Source: Journal of AHIMA

Publication Date: February 2010


This month covered entities are subject to penalties for noncompliance with new federal privacy and security breach notification laws issued by the Department of Health and Human Services.

HHS issued an interim final rule titled “Breach Notification for Unsecured Protected Health Info....

Smart Training on Privacy and Security (expanded version)

Author: Bacik, Sandy

Source: Journal of AHIMA

Publication Date: April 2010



There is plenty of privacy and security training to be done, and many trainers struggle to get resources from their organizations and attention from their audiences. Sandy Bacik, CISSP, ISSMP, CISM, CGEIT, is a principal consultant at EnerNex and a former chief security officer. Here she o....

Snap Judgment

Author: AHIMA Professional Ethics Committee

Source: Journal of AHIMA - website

Publication Date: April 01, 2010





Anyone who is a member of AHIMA or holds its credentials agrees to abide by its code of ethics.


The code sets forth professional values and ethical principles, and it offers guidelines to which professionals aspire. “Ethical behaviors result from a pe....

Workflow for Breach Notification

Author: Walsh, Tom

Source: Journal of AHIMA

Publication Date: April 2010


Federal regulations that took effect in September 2009 require HIPAA covered entities and their business associates to notify individuals if their protected health information (PHI) was accessed or disclosed in an unauthorized manner or by unauthorized individuals. Certain exemptions apply, su....

Smart Training on Privacy and Security

Author: Bacik, Sandy

Source: Journal of AHIMA

Publication Date: July 2010


ARRA's modifications to the HIPAA privacy and security rules are setting off a new round of training in facilities large and small. Trainers must fit the new training into existing schedules that already include organizational policies and procedures, HIPAA, and other regulations such as the R....

Understanding the HIE Landscape

Author: AHIMA

Source: AHIMA practice brief

Publication Date: September 2010


The health information exchange (HIE) landscape has changed dramatically over the past five years. More HIEs are available to organizations and providers than ever before. Industry initiatives leveraging technological advances and the call for all Americans to have an electronic health record b....

HITECH Security – A Practical Approach

Author: Rudloff, Rob

Source: AHIMA Convention

Publication Date: September 28, 2010


Background


HITECH has introduced new security requirements around HIPAA including new breach requirements and associated penalties. This paper addresses the information security and privacy requirements and provides practical solutions to address them. Many organizations already....

Data Security Compliance in IT Asset Disposition

Author: Adam, Chris

Source: AHIMA Convention

Publication Date: September 28, 2010


Introduction

Stories about the theft of confidential data have made headlines all too frequently over the past few years. This reality is forcing some businesses to face up to an inconvenient truth: Many organizations have no reliable procedures to ensure that the computers and rel....

D.I.Y. R.O.I: Do It Yourself Release of Information

Author: Haas, Mark

Source: AHIMA Convention

Publication Date: September 29, 2010


BACKGROUND


The Massachusetts General Hospital (MGH) has seen a precipitous increase in the volume of release of information requests processed over the past five years. The Health Information Management department has struggled mightily with trying to handle this steady increas....

1 2 3 4 [5] 6 7 8