540 results.
<< 39 40 41 42 43 44 45 [46] 47 48 49 50 51 52 53 54
Black Market PHI Does Exist: Why It’s Time to Take Security Risk Assessments Seriously
Author:
Source: Journal of AHIMA
Publication Date: May 2014
Many health information management (HIM) experts have wondered whether there is protected health information (PHI) on the black market. In short, the answer is “yes.” According to a 2012 Ponemon Institute study, 90 percent of healthcare organizations surveyed have had at least....
Behavioral Health Data Exchange Consortium. ONC State Health Policy Consortium Project: Final Report
Author: RTI International
Source: Government (U.S.) | U.S. Office of the National Coordinator for HIT
Publication Date: June 2014
To overcome barriers to electronic exchange of behavioral health data, Behavioral Health Data Exchange (BHDE) Consortium participants created a set of common policies and procedures that aligned with federal regulations as well as the laws of the participating states. The objective of the consortium project was to execute at least one successful pilot demonstrating the ability of providers to exchange behavioral health data electronically across state lines. At the end of the project, data was exchanged between providers in
Florida and Alabama, and the necessary frameworks for exchange were established in three additional states.
Tighten the Bolts of Your ROI Processes
Author: Cacciatore, Victoria; Downing, Katherine
Source: Journal of AHIMA
Publication Date: June 2014
Release of information (ROI) has become a complex area for health information management (HIM) professionals. ROI staff and HIM management now must question and dissect every line on a request prior to release. Because of this, a quick reminder on some of the complex ROI risks is appropria....
Navigating a Compliant Breach Management Process
Author: Downing, Katherine
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: June 2014
The purpose of AHIMA’s new Breach Management Toolkit is to provide a comprehensive collection of resources and best practices to help healthcare organizations and health information management (HIM) professionals navigate their way through the Health Insurance Portability and Accountability Act (HIPAA) Breach Notification Rule and the overall breach management process. The toolkit is intended to raise awareness of the importance and responsibility of everyone within the organization to report HIPAA breaches to the appropriate designated personnel, as well as provide breach prevention education and training.
AHIMA Submits Comments on Substance Abuse and Mental Health Records
Author: Gordon, Lynne Thomas
Source: AHIMA testimony and comments
Publication Date: June 25, 2014
The American Health Information Management Association (AHIMA) is pleased to
submit these comments on Substance Abuse and Mental Health Services Administration: Applicability of 42 CFR Part 2, Confidentiality of Alcohol
and Drug Abuse Patient Records.
AHIMA is committed to promoting and
advocating for high quality research, best practices and effective standards in health information and to actively
contributing to the development and advancement of health information professionals worldwide. AHIMA’s enduring
goal is quality healthcare through quality information. These comments provide AHIMA’s
responses to several of SAMSHA’s questions.
Overcoming the Challenges of Adolescent EHRs
Author: Butler, Mary
Source: Journal of AHIMA - website
Publication Date: June 2014
In this web series, HIM professionals working in emerging roles give advice on tackling difficult HIM problems. This month features the conclusion to a two-part series discussing the unique challenges HIM professionals face in deploying EHRs customized to serve pediatric and adolesce....
HIPAA Breach Enforcement Roundup
Author: Cacciatore, Victoria; Downing, Katherine
Source: Journal of AHIMA
Publication Date: July 2014
Criminal attacks on healthcare systems have risen 100 percent since 2010, according to a recent Ponemon study.1 This makes it obvious that the privacy and security of patient health information is vulnerable and highly susceptible to data breach. The HIPAA Breach Notification Rule became e....
Who Are You? Authenticating Consumer Identity is Becoming Increasingly Important in Healthcare
Author:
Source: Journal of AHIMA
Publication Date: September 2014
For consumers in the United States, the answer to the question “Who are you?” is becoming increasingly important, especially in relation to one’s healthcare. Safe and secure access to a person’s health information hinges on how their online identity is established and used—especially as m....
HIPAA's Place in Court-Ordered Discovery: Determining What's Legal During Litigation Health Record Requests
Author: Hedges, Ron; Brady, Kevin
Source: Journal of AHIMA
Publication Date: September 2014
Every Health information management (HIM) professional, lawyer, and healthcare consumer should be familiar with the Health Insurance Portability and Accountability Act (HIPAA). For healthcare consumers, HIPAA offers protections and rights of access to personal health information. For HIM....
What Caused the Breach? An Examination of Use of Information Technology and Health Data Breaches
Author: Wikina, Suanu Bliss
Source: Perspectives in Health Information Management
Publication Date: October 2014
Abstract
Data breaches arising from theft, loss, unauthorized access/disclosure, improper disclosure, or hacking incidents involving personal health information continue to increase every year. As of September 2013, reported breaches affecting individuals reached close to 27 milli....
<< 39 40 41 42 43 44 45 [46] 47 48 49 50 51 52 53 54