540 results.
<< 23 24 25 26 27 28 29 30 [31] 32 33 34 35 36 37 38 >>
Untangling Privacy
Author: Dimick, Chris
Source: Journal of AHIMA
Publication Date: February 2009
Health IT won’t advance far without resolving the complex issue of privacy protections. Can a complicated situation be teased apart thread by thread?
The debate on privacy has become very public.
Privacy advocates, health IT advocates, providers, HIM professionals, fe....
Sounding the Alarm: Knowing When to Notify Patients of a Data Breach Can Be Unclear
Author: Dimick, Chris
Source: Journal of AHIMA
Publication Date: February 2009
Forty-four states require organizations to alert customers and employees when data breaches occur. But ambiguity in the laws requires organizations to be capable of making good decisions on their own.
The laptop was missing.
Previously stationed in the EEG department of Nor....
Meeting the FTC’s Red Flag Requirements: How One Organization Developed Its Compliance Plan
Author: Davis, Nancy
Source: Journal of AHIMA
Publication Date: February 2009
Like many other privacy and security officers, I was vaguely aware of the Fair and Accurate Credit Transactions Act. I knew that the act, passed by Congress in 2003, was intended to provide consumers with protection from identity theft. I knew the Federal Trade Commission (FTC) was in charge o....
Surviving a CMS Security Investigation: Oregon Facility Shares an Early Look at the Process
Author: Hofman, Judi
Source: Journal of AHIMA
Publication Date: February 2009
Hospitals and other healthcare organizations are expecting greater scrutiny of their HIPAA compliance programs in 2009. Last year the Centers for Medicare and Medicaid Services (CMS) announced plans to ramp up its HIPAA enforcement efforts even before an Office of Inspector General report chid....
Patient’s Guide to HIPAA: How to Use the Law to Guard your Health Privacy
Author: Gellman, Robert
Source: External web site
Publication Date: March 31, 2009
Addressing California’s New Privacy Laws: One Organization’s Strategy to Handle Stringent Breach Notification Laws
Author: Birnbaum, Cassi L
Source: Journal of AHIMA
Publication Date: April 2009
Several well-publicized medical record breaches in California, including the unauthorized access of the governor’s wife’s record, led to sweeping changes in the oversight, reporting, and enforcement of penalties for privacy breaches in the state. Two new laws signed by Governor Sch....
Fighting Fraud with the Red Flags Rule: a How-To Guide for Business
Author: U.S. Federal Trade Commission
Source: Government (U.S.)
Publication Date: April 07, 2009
Medical Identity Theft: It's a Top Priority
Author: Burrington-Brown, Jill
Source: AHIMA recognition week resources | AHIMA presentation
Publication Date: April 13, 2009
Suggested Activities for Healthcare Professionals [and] for the Public
Author: AHIMA
Source: AHIMA recognition week resources
Publication Date: April 13, 2009
Health Information Privacy and Security Week, April 2009
Security Precautions Against Medical Identity Theft
Author: Dinh, Angela K.
Source: AHIMA recognition week resources
Publication Date: April 13, 2009
<< 23 24 25 26 27 28 29 30 [31] 32 33 34 35 36 37 38 >>