540 results.
<< 39 40 41 42 43 44 45 46 [47] 48 49 50 51 52 53 54
Comparative Cost of Inadequate Protection: Healthcare Breaches Ranked the Most Expensive
Author: AHIMA Staff
Source: Journal of AHIMA
Publication Date: October 2014
The US healthcare industry has the unfortunate distinction of having the highest per capita cost of data breaches, recent reports suggest.
A May 2014 Ponemon Institute analysis found that the per capita cost of a healthcare breach was $359 per record. The overall mean across indus....
Law Changes Patient Access to Clinical Lab Reports
Author: McLendon, Kelly
Source: Journal of AHIMA
Publication Date: October 2014
The US Department of Health and Human Services (HHS) continues to look for avenues to allow greater patient access to their own health information so that they may be more active in their healthcare management. HHS recently created final rules that remove the Clinical Laboratory Improveme....
Ins and Outs of Social Media in Healthcare and HIM
Author: Butler, Mary
Source: Journal of AHIMA - website
Publication Date: October 2014
Joanna Belbey, a social media compliance specialist for Actiance, spoke with the Journal for the November/December eCompliance issue about the role of social media and telemedicine in healthcare. As telehealth and social media continues to be an evolving force in healthcare, Bel....
How to Respond to Subpoena and Discovery Requests
Author: Hedges, Ron
Source: Journal of AHIMA
Publication Date: November 2014
Health information management (HIM) professionals are frequently pulled into litigation due to their role as custodians of health records and protected health information. This role also can categorize them as parties to civil litigation, which obligates them to produce any relevant infor....
Security Starts at Admissions, But Can’t End After Discharge
Author: Morper, Mike
Source: Journal of AHIMA
Publication Date: November 2014
Admissions and discharge processes can be rife with vulnerabilities and potential HIPAA violations. It is important to address security vulnerabilities and potential compliance problems in the patient admissions and discharge processes. A focus on file destination control, encryption, aut....
Evaluation of PHI Hunter in Natural Language Processing Research
Author: Redd, Andrew; Pickard, Steve; Meystre, Stephane; Scehnet, Jeffrey; Bolton, Dan; Heavirland, Julia; Weaver, Allison Lynn ; Hope, Carol; Garvin, Jennifer Hornung
Source: Perspectives in Health Information Management
Publication Date: January 2015
Abstract
Objectives: We introduce and evaluate a new, easily accessible tool using a common statistical analysis and business analytics software suite, SAS, which can be programmed to remove specific protected health information (PHI) from a text document. Removal of PHI is import....
This is Going on Your Permanent Record: HIPAA and the Right To Be Forgotten
Author: AHIMA Staff
Source: Journal of AHIMA
Publication Date: January 2015
To many American technology observers, courts in Japan and the European Union could be setting a controversial precedent in a series of rulings regarding the “the right to be forgotten.”
Courts in these jurisdictions have ruled against Google and Yahoo and in favor of individuals....
The Year Ahead
Author: Butler, Mary
Source: Journal of AHIMA
Publication Date: January 2015
Human beings have been fascinated by birds—their flight patterns, colors, and songs—for centuries. In the ancient world, “augurs,” Roman practitioners of “augury,” looked for clues about the past and future by observing birds in flight, hoping for omens.....
Optimizing PHI Disclosure Management in the Age of Compliance
Author: Don, Hardwick; Twiggs, Mariela; Braden, James H
Source: Journal of AHIMA
Publication Date: February 2015
A mere two decades ago, healthcare providers didn’t face significant penalties for improperly disclosing protected health information (PHI). Since then, regulations surrounding the privacy and security of PHI have evolved to include strict requirements and corresponding steep financial pe....
FDA Offers Guidance on Cybersecurity and Medical Devices
Author: Thomas, Liisa; Udofia, Idara
Source: Journal of AHIMA
Publication Date: February 2015
The Food and Drug Administration (FDA) has joined other regulators in sounding a call for data protection and security in our rapidly digitizing world.
Studies reveal that many health providers’ devices or systems have been breached without their knowledge of such breach o....
<< 39 40 41 42 43 44 45 46 [47] 48 49 50 51 52 53 54