Search Results

= Members only

Current search

540 results.

1 2 3 4 5 6 7 8 9 [10] 11

Behavioral Health Data Exchange Consortium. ONC State Health Policy Consortium Project: Final Report

Author: RTI International

Source: Government (U.S.) | U.S. Office of the National Coordinator for HIT

Publication Date: June 2014

To overcome barriers to electronic exchange of behavioral health data, Behavioral Health Data Exchange (BHDE) Consortium participants created a set of common policies and procedures that aligned with federal regulations as well as the laws of the participating states. The objective of the consortium project was to execute at least one successful pilot demonstrating the ability of providers to exchange behavioral health data electronically across state lines. At the end of the project, data was exchanged between providers in Florida and Alabama, and the necessary frameworks for exchange were established in three additional states.

Navigating a Compliant Breach Management Process

Author: Downing, Katherine

Source: AHIMA practice brief | Journal of AHIMA

Publication Date: June 2014

The purpose of AHIMA’s new Breach Management Toolkit is to provide a comprehensive collection of resources and best practices to help healthcare organizations and health information management (HIM) professionals navigate their way through the Health Insurance Portability and Accountability Act (HIPAA) Breach Notification Rule and the overall breach management process. The toolkit is intended to raise awareness of the importance and responsibility of everyone within the organization to report HIPAA breaches to the appropriate designated personnel, as well as provide breach prevention education and training.

AHIMA Submits Comments on Substance Abuse and Mental Health Records

Author: Gordon, Lynne Thomas

Source: AHIMA testimony and comments

Publication Date: June 25, 2014

The American Health Information Management Association (AHIMA) is pleased to submit these comments on Substance Abuse and Mental Health Services Administration: Applicability of 42 CFR Part 2, Confidentiality of Alcohol and Drug Abuse Patient Records.

AHIMA is committed to promoting and advocating for high quality research, best practices and effective standards in health information and to actively contributing to the development and advancement of health information professionals worldwide. AHIMA’s enduring goal is quality healthcare through quality information. These comments provide AHIMA’s responses to several of SAMSHA’s questions.

Overcoming the Challenges of Adolescent EHRs

Author: Butler, Mary

Source: Journal of AHIMA - website

Publication Date: June 2014




In this web series, HIM professionals working in emerging roles give advice on tackling difficult HIM problems. This month features the conclusion to a two-part series discussing the unique challenges HIM professionals face in deploying EHRs customized to serve pediatric and adolesce....

HIPAA Breach Enforcement Roundup

Author: Cacciatore, Victoria; Downing, Katherine

Source: Journal of AHIMA

Publication Date: July 2014



Criminal attacks on healthcare systems have risen 100 percent since 2010, according to a recent Ponemon study.1 This makes it obvious that the privacy and security of patient health information is vulnerable and highly susceptible to data breach. The HIPAA Breach Notification Rule became e....

Law Changes Patient Access to Clinical Lab Reports

Author: McLendon, Kelly

Source: Journal of AHIMA

Publication Date: October 2014



The US Department of Health and Human Services (HHS) continues to look for avenues to allow greater patient access to their own health information so that they may be more active in their healthcare management. HHS recently created final rules that remove the Clinical Laboratory Improveme....

How to Respond to Subpoena and Discovery Requests

Author: Hedges, Ron

Source: Journal of AHIMA

Publication Date: November 2014



Health information management (HIM) professionals are frequently pulled into litigation due to their role as custodians of health records and protected health information. This role also can categorize them as parties to civil litigation, which obligates them to produce any relevant infor....

Evaluation of PHI Hunter in Natural Language Processing Research

Author: Redd, Andrew; Pickard, Steve; Meystre, Stephane; Scehnet, Jeffrey; Bolton, Dan; Heavirland, Julia; Weaver, Allison Lynn ; Hope, Carol; Garvin, Jennifer Hornung

Source: Perspectives in Health Information Management

Publication Date: January 2015


Abstract


Objectives: We introduce and evaluate a new, easily accessible tool using a common statistical analysis and business analytics software suite, SAS, which can be programmed to remove specific protected health information (PHI) from a text document. Removal of PHI is import....

The Year Ahead

Author: Butler, Mary

Source: Journal of AHIMA

Publication Date: January 2015



Human beings have been fascinated by birds—their flight patterns, colors, and songs—for centuries. In the ancient world, “augurs,” Roman practitioners of “augury,” looked for clues about the past and future by observing birds in flight, hoping for omens.....

Privacy or Convenience?

Author: AHIMA Staff

Source: Journal of AHIMA

Publication Date: February 2015


The tension between data privacy and consumers’ demand for their health information will become more strained in 2015, a new report predicts. As the number of privacy breaches in the healthcare sector has grown in recent years, so too has the desire of consumers to be one click away from....

Clearing the HIPAA Cobwebs: New ONC Chief Privacy Officer Lucia Savage Focuses on Balancing Privacy and Security with Expanding Interoperable EHR Exchange

Author: Dimick, Chris

Source: Journal of AHIMA

Publication Date: April 2015



The spiders of time have been hard at work on the US healthcare privacy and security rules, to the point that their place in health IT interoperability has become fogged and is inhibiting their proper role in the meaningful exchange of health information, according to Lucia Savage, JD, th....

Where to Begin with Cyber Defense

Author: Lewis, Sharon; McDonald, Kevin B

Source: Journal of AHIMA

Publication Date: April 2015



As data is made more readily available through a growing number of public and private channels, understanding the risks is critical. Patients expect organizations to take the steps required to protect their sensitive and personal information as it is being produced, processed, shared, and....

Evaluating the Information Governance Principles for Healthcare: Integrity and Protection

Author: Datskovsky, Galina; Hedges, Ron; Empel, Sofia; Washington, Lydia

Source: Journal of AHIMA

Publication Date: April 2015



Editor’s note: This is the second in a series of four articles that discuss the eight Information Governance Principles for Healthcare.


AHIMA’s new Information Governance Principles for Healthcare (IGPHC) provides a framework for healthcare organizations to enhance their ab....

Beware the Dark Side of the Web

Author: Journal of AHIMA Staff

Source: Journal of AHIMA

Publication Date: May 2015


Unless they know exactly what to look for, most Internet users wouldn’t know that a “Dark Web” exists or what it is—let alone the potential for harm that can be done with it.


But the dark side of the web is out there, and its proprietors want your medical information.

....

Evolving Role of the Privacy and Security Officer

Author: Bowen, Rita K.

Source: Journal of AHIMA

Publication Date: June 2015



Fifteen years ago, many individuals accepted the role of the privacy officer with a perception that it would be a role involving the education and training of individuals on HIPAA rules and regulations, developing policy, and responding to reported incidents. The security officer was focu....

Privacy Holes in the 'Hidden Healthcare System': Students' PHI-laden Education Records that are Stored and Shared Electronically Don’t Have the Same Safeguards as most EHRs

Author: DuBravec, Daniel A; Daigle, Matt

Source: Journal of AHIMA

Publication Date: June 2015



With student safety and privacy an increasing parental concern, school administrators nationwide are sitting on a powder keg of potential backlash because of a gray area of student privacy protections that Julia Lear, senior advisor for the Center of Health and Health Care in Schools at G....

Employee Confidentiality Training for the Electronic Health Record: A Systematic Review of Literature

Author: VanderMolen, Julia; Prince, Alesha; Neu, Emily; DeKraker, Rachael

Source: Educational Perspectives in Health Informatics and Information Management

Publication Date: October 2015


Abstract


Introduction: The healthcare industry is an ever-changing field, and in recent years, the introduction of the electronic health record (EHR) has enabled hospitals to store and retrieve detailed patient information for use by healthcare providers, and sometimes patients, d....

Cybersecurity 101

Author: Lucci, Susan; Walsh, Tom

Source: Journal of AHIMA

Publication Date: November 2015



One of the most alarming statistics in the news, which is growing with intent and severity, is the prevalence of cyber-attacks, particularly in healthcare. It is an alarming trend that has gained a good deal of attention. For example, in July 2015, UCLA reported that up to 4.5 million pati....

DIY Privacy Risk Assessments

Author: Butler, Mary

Source: Journal of AHIMA - website

Publication Date: November 2015


The HIM Problem


Completing regular privacy risk assessments is one of the most proactive ways of preventing healthcare privacy breaches. However, finding helpful tools for these assessments is hard to come by.


The HIM Problem Solver: Sharon Lewis, MBA, RHIA, CHPS, CP....

Shifting from Reactive to Proactive HIPAA Audits

Author: Brinda, Danika

Source: Journal of AHIMA

Publication Date: January 2016



Stories about workforce members inappropriately accessing health information continue to plague the Department of Health and Human Services’ Data Breach Portal—which lists US provider data breaches that affect more than 500 individuals. Recently two data breaches reported on th....

1 2 3 4 5 6 7 8 9 [10] 11