540 results.
<< 14 15 16 17 18 19 20 21 [22] 23 24 25 26 27 28 29 >>
Integrating ARRA: Leveraging Current Compliance Efforts to Meet the New Privacy Provisions
Author: Nunn, Sandra L.
Source: Journal of AHIMA
Publication Date: October 2009
Within the American Recovery and Reinvestment Act, the section known as the HITECH Act provides a combination of incentives and penalties to reduce healthcare costs by automating healthcare records and streamlining health IT. It also broadens the definition of what healthcare information must....
Health Data Stewardship: What, Why, Who, How. An NCVHS Primer
Author:
Source: Government (U.S.)
Publication Date: September 15, 2009
Exploring Medical Identity Theft
Author: Mancilla, Desla; Moczygemba, Jackie
Source: Perspectives in Health Information Management
Publication Date: September 2009
Health Breach Notification Rule; Final Rule
Author: U.S. Federal Trade Commission
Source: Government (U.S.)
Publication Date: August 25, 2009
Model Breach Notification Letter: Content and Format
Author: AHIMA
Source: AHIMA
Publication Date: August 24, 2009
High-level guidance outlining the content requirements for breach notification letters is provided in section 13402, "Notification in the Case of Breach," of the American Recovery and Reinvestment Act and state-level data breach notification and reporting laws in 44 states, the District of Colu....
Path to Security Breach Notification Regulation
Author: Rhodes, Harry B.
Source: AHIMA
Publication Date: August 24, 2009
Forty-four states, the District of Columbia, Puerto Rico, and the Virgin Islands enacted data breach notification and reporting laws well before the Health Information Technology for Economic and Clinical Health (HITECH) Act of the American Recovery and Reinvestment Act (ARRA) set the first f....
Developing Breach Notification Policies and Procedures: An Overview of Mitigation and Response Planning
Author: Rhodes, Harry B.
Source: AHIMA
Publication Date: August 24, 2009
A successful breach notification plan encompasses more than just a method for promptly notifying the victims of a security breach event. To be effective the breach notification process must be part of a comprehensive information security plan. Three components are critical to a security breac....
Breach Notification for Unsecured Protected Health Information; Interim Final Rule
Author: U.S. Department of Health and Human Services. Office of the Secretary
Source: Government (U.S.)
Publication Date: August 24, 2009
Who Has Rights to a Deceased Patient’s Records?
Author: Dimick, Chris
Source: Journal of AHIMA - website
Publication Date: August 2009
August 4, 2009 @ 8:02 pm
A son calls the HIM department and requests his deceased father’s medical records. Shortly afterward, the man’s wife requests the records, also. Then a man calls identifying himself as the executor of the estate. Who is authorized to access th....
Security Breach Notification Chart
Author: Perkins Coie
Source: External web site
Publication Date: July 20, 2009
<< 14 15 16 17 18 19 20 21 [22] 23 24 25 26 27 28 29 >>