Search Results

= Members only

Current search

540 results.

1 2 3 4 5 6 7 [8] 9 10 11

Workflow for Breach Notification

Author: Walsh, Tom

Source: Journal of AHIMA

Publication Date: April 2010


Federal regulations that took effect in September 2009 require HIPAA covered entities and their business associates to notify individuals if their protected health information (PHI) was accessed or disclosed in an unauthorized manner or by unauthorized individuals. Certain exemptions apply, su....

Smart Training on Privacy and Security

Author: Bacik, Sandy

Source: Journal of AHIMA

Publication Date: July 2010


ARRA's modifications to the HIPAA privacy and security rules are setting off a new round of training in facilities large and small. Trainers must fit the new training into existing schedules that already include organizational policies and procedures, HIPAA, and other regulations such as the R....

Understanding the HIE Landscape

Author: AHIMA

Source: AHIMA practice brief

Publication Date: September 2010


The health information exchange (HIE) landscape has changed dramatically over the past five years. More HIEs are available to organizations and providers than ever before. Industry initiatives leveraging technological advances and the call for all Americans to have an electronic health record b....

HITECH Security – A Practical Approach

Author: Rudloff, Rob

Source: AHIMA Convention

Publication Date: September 28, 2010


Background


HITECH has introduced new security requirements around HIPAA including new breach requirements and associated penalties. This paper addresses the information security and privacy requirements and provides practical solutions to address them. Many organizations already....

Data Security Compliance in IT Asset Disposition

Author: Adam, Chris

Source: AHIMA Convention

Publication Date: September 28, 2010


Introduction

Stories about the theft of confidential data have made headlines all too frequently over the past few years. This reality is forcing some businesses to face up to an inconvenient truth: Many organizations have no reliable procedures to ensure that the computers and rel....

D.I.Y. R.O.I: Do It Yourself Release of Information

Author: Haas, Mark

Source: AHIMA Convention

Publication Date: September 29, 2010


BACKGROUND


The Massachusetts General Hospital (MGH) has seen a precipitous increase in the volume of release of information requests processed over the past five years. The Health Information Management department has struggled mightily with trying to handle this steady increas....

Low-Tech Threats in a High-Tech World

Author: Rollins, Genna

Source: Journal of AHIMA - website

Publication Date: April 2011



Despite the rise of health IT, healthcare providers still face daily privacy and security risks of the mundane variety—paper records are misplaced, improperly disclosed, or released without confidential information redacted. No matter the opportunities and risks that technology bring....

Privacy Rights Never Die: And Sometimes Complications Linger On

Author: AHIMA

Source: Journal of AHIMA

Publication Date: May 2011


The laws surrounding release of a deceased patient's records can lead to complex and frustrating situations in the HIM department. Just who has access rights depends on federal law, state law, and individual circumstances, illustrated by the two scenarios below.

Last summer the Office....

Privacy and the EHR

Author: Nelson, Debra S

Source: AHIMA Convention

Publication Date: October 02, 2011


Determining how to implement privacy regulations and policies in an electronic record environment can not only be daunting but also thought of quite late in the EHR implementation process. Daily processes and tasks such as reviewing the medical record with patients to processing requests for a....

How to Request Your Medical Records

Author: Dimick, Chris

Source: Journal of AHIMA - website

Publication Date: March 2012



If you’ve never requested your medical records from your doctor or hospital before, the process can seem complicated. However, understanding the law and the basic requirements will ease the process.

The Record Request Process


The basic process for requesting a medica....

Documentation Trends in the Health Record

Author: Dooling, Julie A

Source: Journal of AHIMA

Publication Date: March 2012


The meaningful use program is well under way, helping providers and organizations adopt EHRs to capture complete and comprehensive documentation. To qualify for incentives in stage 1, organizations have adjusted their documentation processes to meet certain objectives and measures and will con....

Automation for Privacy and Security Compliance

Author: McLendon, Kelly

Source: Journal of AHIMA

Publication Date: March 2012


There has been a lack of enforcement of the privacy and security rules ever since HIPAA's inception. As such the adoption of comprehensive HIPAA compliance programs has lagged behind EHR development and implementation.

This in turn has caused little funding to be budgeted by provide....

Tips for Record Requests

Author: AHIMA

Source: Journal of AHIMA

Publication Date: April 2012


If patients have never requested their medical records from their doctor or hospital before, the process can seem complicated. However, a few basic steps can help streamline the process:

Read online or call the facility's HIM department for information specific to your request. This....

HIPAA Compliance for Clinician Texting

Author: Greene, Adam H

Source: Journal of AHIMA

Publication Date: April 2012



The HIPAA privacy and security rules need not act as an obstacle to efficient communications, but keeping texting compliant requires planning and diligence.

Text (or SMS) messaging has become nearly ubiquitous on mobile devices. According to one survey, approximately 72 perce....

Ensuring Remote Coding Compliance

Author: Comfort, Angie

Source: Journal of AHIMA - Coding Notes

Publication Date: April 2012


More and more HIM department managers are turning to remote coding. However, before implementing this staffing model, managers must answer several questions regarding the privacy and security of patient information, including:
What are the compliance risks?
How will privacy and secu....

1 2 3 4 5 6 7 [8] 9 10 11