Search Results

= Members only

Current search

540 results.

1 2 3 4 5 6 [7] 8 9 10 11

Untangling Privacy

Author: Dimick, Chris

Source: Journal of AHIMA

Publication Date: February 2009


Health IT won’t advance far without resolving the complex issue of privacy protections. Can a complicated situation be teased apart thread by thread?

The debate on privacy has become very public.

Privacy advocates, health IT advocates, providers, HIM professionals, fe....

Medical Identity Theft and the Red Flags Rule

Author: Apgar, Chris

Source: Journal of AHIMA - website

Publication Date: April 2009


Continuing our Health Information Privacy and Security Week series, today Chris Apgar, CISSP, president of Apgar & Associates LLC, takes a look at medical identity theft within the context of the Red Flags Rule.

Much is reported in the news about identity theft including new cat....

Guidance Specifying the Technologies and Methodologies That Render Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals for Purposes of the Breach Notification Requirements ... [of ARRA]

Author: U.S. Department of Health and Human Services. Office of the Secretary

Source: Government (U.S.)

Publication Date: April 27, 2009

[Federal Register: April 27, 2009 (Volume 74, Number 79)] [Rules and Regulations] [Page 19006-19010] From the Federal Register Online via GPO Access [wais.access.gpo.gov] [DOCID:fr27ap09-11] ======================================================================= ------------------------------------....

Sequestering EHR Data in IT Systems

Author: Miaoulis, William M

Source: Journal of AHIMA

Publication Date: May 2009


There can be three situations under which healthcare organizations may need to sequester (or segregate) certain data within a medical record: placing a legal hold in connection with litigation, limiting disclosures of a record pursuant to a request by a patient, and restricting access to sensi....

Model Breach Notification Letter: Content and Format

Author: AHIMA

Source: AHIMA

Publication Date: August 24, 2009


High-level guidance outlining the content requirements for breach notification letters is provided in section 13402, "Notification in the Case of Breach," of the American Recovery and Reinvestment Act and state-level data breach notification and reporting laws in 44 states, the District of Colu....

Path to Security Breach Notification Regulation

Author: Rhodes, Harry B.

Source: AHIMA

Publication Date: August 24, 2009


Forty-four states, the District of Columbia, Puerto Rico, and the Virgin Islands enacted data breach notification and reporting laws well before the Health Information Technology for Economic and Clinical Health (HITECH) Act of the American Recovery and Reinvestment Act (ARRA) set the first f....

Accounting of Disclosures: ARRA’s Impact

Author: Rhodes, Harry B.

Source: AHIMA Convention

Publication Date: October 05, 2009


The accounting of disclosures requirement is one of the most difficult HIPAA privacy rule compliance issues to implement. Following the August 2002 modifications to the privacy rule requirements, the accounting for disclosures requirement has stood out as the HIPAA requirement demanding the big....

HIM Can Help in the Battle Against Medical Identity Theft

Author:

Source: AHIMA Today

Publication Date: October 07, 2009


The woman rushed into the emergency department at Massachusetts General Hospital (MGH) in extreme pain. She presented her insurance card and name to registration and was quickly examined by medical staff. Doctors determined the woman needed an emergency appendectomy. But staff soon realized tha....

Few Requests for Today’s Accountings

Author: AHIMA

Source: Journal of AHIMA

Publication Date: February 2010


HIPAA’s Accounting of Disclosure Provisions Led to Few Patient Requests; Now ARRA Is Upping the Ante

Provisions within the American Recovery and Reinvestment Act extend HIPAA’s accounting of disclosure regulations for providers who maintain electronic health records. The provisions a....

Elements of a Breach Notification Letter

Author: Hjort, Beth M.

Source: Journal of AHIMA

Publication Date: February 2010


This month covered entities are subject to penalties for noncompliance with new federal privacy and security breach notification laws issued by the Department of Health and Human Services.

HHS issued an interim final rule titled “Breach Notification for Unsecured Protected Health Info....

Smart Training on Privacy and Security (expanded version)

Author: Bacik, Sandy

Source: Journal of AHIMA

Publication Date: April 2010



There is plenty of privacy and security training to be done, and many trainers struggle to get resources from their organizations and attention from their audiences. Sandy Bacik, CISSP, ISSMP, CISM, CGEIT, is a principal consultant at EnerNex and a former chief security officer. Here she o....

Snap Judgment

Author: AHIMA Professional Ethics Committee

Source: Journal of AHIMA - website

Publication Date: April 01, 2010





Anyone who is a member of AHIMA or holds its credentials agrees to abide by its code of ethics.


The code sets forth professional values and ethical principles, and it offers guidelines to which professionals aspire. “Ethical behaviors result from a pe....

1 2 3 4 5 6 [7] 8 9 10 11