540 results.
<< 14 15 16 17 18 19 20 21 [22] 23 24 25 26 27 28 29 >>
EHR: Benefits for Privacy and Security
Author: AHIMA Professional Practice Team
Source: AHIMA recognition week resources
Publication Date: February 02, 2005
Reaffirming Your HIPAA Compliance Efforts
Author: Woloszyn, William
Source: Journal of AHIMA
Publication Date: April 2005
Two years after the HIPAA privacy compliance date, is it time for your organization to reassess your efforts and recommit to enforcing HIPAA?
Revisiting HIPAA’s Roots
The HIPAA privacy regulation was created in response to public healthcare concerns about the privacy of pa....
Outsourcing ROI: Does it Make Sense for You?
Author: Bellenghi, G. Michael
Source: Journal of AHIMA
Publication Date: April 2005
Governed by state and federal regulations, release of information (ROI) is a time-consuming and sensitive process. Failure to fulfill requests accurately and on time can have painful ramifications, affecting quality of patient care and prompting irate phone calls and legal action or fines. Not....
Identity Theft and Fraud--the Impact on HIM Operations
Author: Davis, Nancy; Lemery, Chrisann; Roberts, Kim
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: April 2005
This practice brief has been retired. It is made available for historical purposes only.
ABC Medical Center Return Of Invalid Authorization for Release of Information
Author: Brandt, Mary D.
Source: AHIMA sample form
Publication Date: June 14, 2005
Sample form for sending to patient when critical information missing from the patient-submitted authorization form for release of information.
Amending Business Associate Contracts: Harmonizing Privacy and Security for Protected Health Information
Author: Patel, Nilay B.
Source: Journal of AHIMA
Publication Date: July 2005
With the April 21, 2005, and April 20, 2006 (for small health plans) HIPAA security regulation deadlines, covered entities may question what a revised contract for a business associate (BA) should contain and how it should be executed. Official guidance is scattered in the Federal Register and....
Is the “Insider Threat” Standing between You and HIPAA Compliance?
Author: Getgen, Kimberly
Source: AHIMA Convention
Publication Date: October 21, 2005
Introduction
The greatest risk for exposing patient-sensitive data will not come from hackers attacking your Web site or computer systems. Instead, it is much more likely that the threat will come from inside your organization, from trusted employees and business partners with access to s....
Tough Compliance Questions to Ask Your Business Associates
Author: Klasa, Marge
Source: AHIMA Convention
Publication Date: October 21, 2005
Introduction
Maintaining the privacy and security of patient health information (PHI) is not only best practice, it is a HIPAA mandate for all Covered Entities (CE).1 But how does the CE know if its Business Associates (BA) and vendors agree to protect and secure patients’ PH....
Using the SSN as a Patient Identifier
Author: AHIMA e-HIM Work Group on Regional Health Information Organizations (RHIOs)
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: March 2006
This practice brief has been retired. It is made available for historical purposes only.
Breaches of Confidential Health Information
Author: Markle Foundation; Connecting for Health
Source: External healthcare industry report | External - used with permission
Publication Date: April 06, 2006
This document is part of The Connecting for Health Common Framework, which is available in full and in its most current version
here. The Common Framework will be revised and expanded over time.
<< 14 15 16 17 18 19 20 21 [22] 23 24 25 26 27 28 29 >>