540 results.
<< 27 28 29 30 31 32 33 34 [35] 36 37 38 39 40 41 42 >>
Santa Barbara Blueprint: a Regional Health Data Network Takes the Plunge
Author: Schrader, Michael
Source: Journal of AHIMA
Publication Date: May 2004
In Santa Barbara County, a regional data-sharing network offers a model for the future of HIM infrastructures.
Located north of Los Angeles, Santa Barbara County is a favorite destination, known for its beaches, resorts, and vineyards. Local homeowners include Oprah Winfrey, Martin Shee....
HIPAA Privacy Implementation Issues in Pennsylvania Healthcare Facilities
Author: Firouzan, Patricia Anania; McKinnon, James
Source: Perspectives in Health Information Management
Publication Date: April 2004
Abstract
A 20-question survey was sent in the mail to HIM directors in Pennsylvania healthcare facilities to solicit feedback regarding implementation issues of the HIPAA privacy rule requirements. Questions focused on gathering basic demographic data, information on HIM involveme....
First Anniversary of HIPAA Privacy: Celebrate and Recommit
Author: Kloss, Linda L
Source: Journal of AHIMA
Publication Date: April 2004
The past year has been a remarkable one for highly public challenges to privacy of personal health information. Access to records has been sought for presidential candidates and in high-profile cases such as Michael Jackson, Rush Limbaugh, and Kobe Bryant. The Department of Justice is attempti....
Special Considerations for Business Associate Agreements: Substance Abuse Treatment, Federal Law Present Challenges
Author: Haines, Pamela T.
Source: Journal of AHIMA
Publication Date: April 2004
If you are writing business associate agreements for a healthcare provider these days, you have probably discovered there are often no magic words or formulas that will produce an agreement. Although sample forms available from various sources may be helpful, generally no two business associat....
Release of Information Reimbursement Laws and Regulations (2004 update)
Author: Hjort, Beth M.
Source: AHIMA practice brief
Publication Date: March 2004
This practice brief has been retired. It is made available for historical purposes only.
Assessing Privacy Risk in Outsourcing
Author: Davino, Margaret
Source: Journal of AHIMA
Publication Date: March 2004
Healthcare providers can outsource transcription, but they can’t outsource their obligation to safeguard privacy. Here’s how to minimize risk.
Healthcare providers are faced with multiple pressures, many of them financial. The need for management to meet financial constraints....
Electronic Record, Electronic Security
Author: Hagland, Mark
Source: Journal of AHIMA
Publication Date: February 2004
New technologies are enhancing the ability to protect patient information. But there’s more to successful implementation than just what’s inside the box.
Melanie Schattauer, RHIA, Jack Obert, and their colleagues at Mercy St. John’s Health System in Springfield, M....
Proof Is in the Policy
Author: Walsh, Tom
Source: Journal of AHIMA
Publication Date: February 2004
Proving security compliance later requires establishing documentation now. HIM professionals have a valuable role to play.
HIM professionals played central roles in their organization’s privacy efforts, ensuring that appropriate policies, procedures, and documents were in plac....
HIPAA and the EHR: Making Technical Safeguard Changes
Author: Fodor, Joseph
Source: Journal of AHIMA
Publication Date: January 2004
As electronic health records (EHRs) become more commonplace in healthcare, changes, adjustments, and improvements will be inevitable. When designing, implementing, upgrading, or remediating an EHR system, your organizations implementation team should consider the impact of complying wit....
How Law, Investigation, Ethics Connect to HIPAA
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: November 02, 2003
Part nine in a 10-part series.
This article is the ninth of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. The information security domain of law, investigation, and ethics covers these topics in depth and provides a p....
<< 27 28 29 30 31 32 33 34 [35] 36 37 38 39 40 41 42 >>