Search Results

= Members only

Current search

540 results.

1 2 3 4 [5] 6 7 8 9 10 11 12 13 14 15 16 >>

Shifting from Reactive to Proactive HIPAA Audits

Author: Brinda, Danika

Source: Journal of AHIMA

Publication Date: January 2016



Stories about workforce members inappropriately accessing health information continue to plague the Department of Health and Human Services’ Data Breach Portal—which lists US provider data breaches that affect more than 500 individuals. Recently two data breaches reported on th....

DIY Privacy Risk Assessments

Author: Butler, Mary

Source: Journal of AHIMA - website

Publication Date: November 2015


The HIM Problem


Completing regular privacy risk assessments is one of the most proactive ways of preventing healthcare privacy breaches. However, finding helpful tools for these assessments is hard to come by.


The HIM Problem Solver: Sharon Lewis, MBA, RHIA, CHPS, CP....

Cybersecurity 101

Author: Lucci, Susan; Walsh, Tom

Source: Journal of AHIMA

Publication Date: November 2015



One of the most alarming statistics in the news, which is growing with intent and severity, is the prevalence of cyber-attacks, particularly in healthcare. It is an alarming trend that has gained a good deal of attention. For example, in July 2015, UCLA reported that up to 4.5 million pati....

Employee Confidentiality Training for the Electronic Health Record: A Systematic Review of Literature

Author: VanderMolen, Julia; Prince, Alesha; Neu, Emily; DeKraker, Rachael

Source: Educational Perspectives in Health Informatics and Information Management

Publication Date: October 2015


Abstract


Introduction: The healthcare industry is an ever-changing field, and in recent years, the introduction of the electronic health record (EHR) has enabled hospitals to store and retrieve detailed patient information for use by healthcare providers, and sometimes patients, d....

Evolving Role of the Privacy and Security Officer

Author: Bowen, Rita K.

Source: Journal of AHIMA

Publication Date: June 2015



Fifteen years ago, many individuals accepted the role of the privacy officer with a perception that it would be a role involving the education and training of individuals on HIPAA rules and regulations, developing policy, and responding to reported incidents. The security officer was focu....

1 2 3 4 [5] 6 7 8 9 10 11 12 13 14 15 16 >>