Search Results

= Members only

Current search

540 results.

<< 15 16 17 18 19 20 21 22 [23] 24 25 26 27 28 29 30 >>

Sequestering EHR Data in IT Systems

Author: Miaoulis, William M

Source: Journal of AHIMA

Publication Date: May 2009


There can be three situations under which healthcare organizations may need to sequester (or segregate) certain data within a medical record: placing a legal hold in connection with litigation, limiting disclosures of a record pursuant to a request by a patient, and restricting access to sensi....

Guidance Specifying the Technologies and Methodologies That Render Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals for Purposes of the Breach Notification Requirements ... [of ARRA]

Author: U.S. Department of Health and Human Services. Office of the Secretary

Source: Government (U.S.)

Publication Date: April 27, 2009

[Federal Register: April 27, 2009 (Volume 74, Number 79)] [Rules and Regulations] [Page 19006-19010] From the Federal Register Online via GPO Access [wais.access.gpo.gov] [DOCID:fr27ap09-11] ======================================================================= ------------------------------------....

Medical Identity Theft and the Red Flags Rule

Author: Apgar, Chris

Source: Journal of AHIMA - website

Publication Date: April 2009


Continuing our Health Information Privacy and Security Week series, today Chris Apgar, CISSP, president of Apgar & Associates LLC, takes a look at medical identity theft within the context of the Red Flags Rule.

Much is reported in the news about identity theft including new cat....

<< 15 16 17 18 19 20 21 22 [23] 24 25 26 27 28 29 30 >>