540 results.
1 2 3 4 5 6 7 8 [9] 10 11 12 13 14 15 16 >>
Use of Language-Interpreter Consent Form
Author: Gore, Glennda
Source: AHIMA Foundation
Publication Date: January 08, 2002
In an effort to comply with the upcoming HIPAA confidentiality requirements, McAlester Regional Health Center has begun to review all policies and procedures concerning patient confidentiality and data security. During this process, the use of language interpreters was identified as one a....
"Need to Know" Access: Meeting HIPAA's Minimum Necessary Requirements
Author: Brandt, Mary D.
Source: In Confidence (newsletter)
Publication Date: February 02, 2002
Since the final HIPAA privacy regulations were published, there’s been a lot of discussion about “minimum necessary” requirements. Under the regulations, healthcare providers and payers must make reasonable efforts to limit the use or disclosure of protected health information to the minimum....
Understanding Release of Information in Long-Term Care Facilities
Author: Marsh, Carmilla
Source: Journal of AHIMA
Publication Date: February 2002
Release of information is a perennial challenge for HIM professionals in all care settings. However, long-term care offers some special challenges, especially in the light of the HIPAA privacy rule published in December 2000 (with a compliance date of April 2003). This article reviews the basi....
Make Your Telecommuting Program HIPAA Compliant (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: February 2002
An increasing number of healthcare workforce members are telecommuting. As transcriptionists, coders, customer service representatives, and others are working from home, many providers are weighing the benefits against potential privacy and security risks.
Who Is Working from Home....
Document Management Systems in the Healthcare Environment
Author: Odette, Rose
Source: In Confidence (newsletter)
Publication Date: February 02, 2002
Security is not a new concept for health information management departments. The amazing thing about HIPAA is everyone seems to think security and patient medical information are new and difficult concepts. The fact of the matter is that there have been medical record laws on the books for ye....
What Does It Take to be a Healthcare Information Security Manager?
Author: Wilder, Steven S.
Source: In Confidence (newsletter)
Publication Date: March 02, 2002
Many of us who have been in health-care administration for more than a few years can remember a day when “securing medical records” meant enacting adequate control over who had keys to the record storage room, or perhaps an engineered access control system, and appropriate policies....
Journal Q&A (3/02)
Author: AHIMA Staff
Source: AHIMA Q and A
Publication Date: March 02, 2002
Q: Does the individual to whom a patient has granted durable power of attorney for financial matters have the right to access and authorize use or disclosure of the patients protected health information (PHI) under HIPAA?
A: An individual granted durable power of attorney for....
Reasonable Approach to Physical Security (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: April 2002
Of all the components of HIPAA, physical security may be the most challenging and costly to address. After all, how do you move walls or create doors in open space? This article will show how physical security can be flexible, scalable, and reasonable for healthcare facilities.
What....
E-health: What's Outside the Privacy Rule's Jurisdiction?
Author: Choy, Angela; Pritts, Joy; Goldman, Janlori
Source: Journal of AHIMA
Publication Date: May 2002
E-healthfrom basic health information Web sites to online consultationsis flourishing. And though the government is trying to protect consumers under the HIPAA privacy rule, many Web sites arent covered. In this article, privacy experts explain which Web sites are covered an....
As Strong As the Weakest Link: Developing Chain of Trust Agreements
Author: Levinson, Curtis K.S.
Source: In Confidence (newsletter)
Publication Date: May 02, 2002
Chain of trust agreements (CTAs) have two separate components: law and technology. Though the legal and technical components function together, each requires individual subject matter expertise to correctly craft an effective CTA.
CTAs are of paramount importance to the healthcare commu....
1 2 3 4 5 6 7 8 [9] 10 11 12 13 14 15 16 >>