Search Results

= Members only

Current search

540 results.

1 2 3 4 [5] 6 7 8 9 10 11

Managing HIPAA as Gatekeeper

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: September 2004


An unfortunate result of the HIPAA privacy rule is the emerging use of HIPAA as a gatekeeper, restricting the appropriate fl ow of protected health information (PHI). HIPAA is being cited as a reason not to disclose information without patient permission when needed for treatment, payment, or....

HIPAA and Privacy: After the Compliance Date

Author: Mikels, Debbie

Source: AHIMA Convention

Publication Date: October 15, 2004

Abstract

This article reviews successful strategies in preparing for HIPAA Privacy compliance. There are ongoing challenges organizations will face after the compliance date, such as managing research issues, identifying all business associates, and managing the accounting of disclosures....

Journal Q&A (11/04)

Author: AHIMA Professional Practice Team

Source: AHIMA Q and A

Publication Date: November 02, 2004


Q: As a covered entity, do I need to have satisfactory assurance (as required by HIPAA) that an individual has been notified when I am served with a search warrant for a patient's protected health information (PHI)?
A: No. A search warrant is issued by a judge and is considered the same a....

Reaffirming Your HIPAA Compliance Efforts

Author: Woloszyn, William

Source: Journal of AHIMA

Publication Date: April 2005


Two years after the HIPAA privacy compliance date, is it time for your organization to reassess your efforts and recommit to enforcing HIPAA?
Revisiting HIPAA’s Roots

The HIPAA privacy regulation was created in response to public healthcare concerns about the privacy of pa....

Outsourcing ROI: Does it Make Sense for You?

Author: Bellenghi, G. Michael

Source: Journal of AHIMA

Publication Date: April 2005


Governed by state and federal regulations, release of information (ROI) is a time-consuming and sensitive process. Failure to fulfill requests accurately and on time can have painful ramifications, affecting quality of patient care and prompting irate phone calls and legal action or fines. Not....

Subpoena by Any Other Name Might Not be Legal

Author: Whitney, Jo Ellen

Source: Journal of AHIMA

Publication Date: May 2007


Generally when an opposing party is seeking medical records from a care provider, the first request is accompanied by a subpoena, which can be difficult for an HIM department to assess in terms of what-if any-records can be produced.

A subpoena accompanied by a HIPAA-compliant consen....

Privacy Architecture and e-Consent

Author: Connor, Kathleen

Source: Journal of AHIMA

Publication Date: June 2007


As the US prepares to implement a nationwide health information network (NHIN), one issue that repeatedly surfaces is how to appropriately protect the privacy and security of electronic health information. Of particular concern is how such a system can accommodate the various legal restriction....

Guiding Privacy Decisions in an e-HIM Environment

Author: AHIMA

Source: AHIMA Advantage

Publication Date: August 2007


Technology facilitates the collection, management, sharing, and storing of health information. Yet we must ensure privacy and security of health information in order to ensure better usage. HIM professionals can use our skills and knowledge to help achieve solid footing on this issue. Who is le....

Privacy in the Spotlight

Author: Dimick, Chris

Source: Journal of AHIMA

Publication Date: November 2007


Varying privacy practices that pose barriers to health information exchange are putting HIM concerns in the national spotlight.
The 35-year-old Minnesota woman’s winter vacation in the neighboring state of Wisconsin was going great, until her ski snapped and the accident happened. B....

Breaking Down Privacy and Security Barriers to HIE

Author: Rhodes, Harry B.

Source: Journal of AHIMA

Publication Date: November 2007


As noted in the article “Confusion Continues over HIPAA Minimum Necessary Standards,” (J AHIMA, Nov-Dec 2007) the state-level research under the HISPC project identified a number of privacy and security barriers to health information exchange (HIE). Several reports came from this p....

Damage of Medical Identity Theft

Author:

Source: Journal of AHIMA

Publication Date: January 2008


HIM Professionals “Single Most Important Group” in Finding Solutions

Medical identity theft can wreck the lives of its victims and cost healthcare organizations money and time. But HIM professionals can help mitigate this growing problem, according to Pam Dixon, executive director of....

1 2 3 4 [5] 6 7 8 9 10 11