Search Results

= Members only

Current search

540 results.

[1] 2 3 4 5 6 7 8 9 10 11

Standards for Safety, Security, and Interoperability of Medical Devices in an Integrated Health Information Environment

Author: Williams, Patricia A.H

Source: Journal of AHIMA

Publication Date: April 2017



Information sharing between healthcare organizations increasingly includes the use of electronic health records (EHRs) as well as data from medical devices that have been integrated into existing networks. When exchanging such data, providers should be mindful not only of the interoperabil....

Turning Your HIM Expertise Into a Resource

Author: Gordon, Lynne Thomas

Source: Journal of AHIMA

Publication Date: April 2017



In 1941, author Edna Huffman, writing about the management and storage of medical records, introduced readers to “the newest development in storage methods and the method that will conserve the greatest amount of space, known as microphotography.” She described how medical reco....

Statistically, What’s the Chance of a Breach?

Author: Wiedemann, Lou Ann

Source: Journal of AHIMA

Publication Date: March 2017



According to the Department of Health and Human Services Office for Civil Rights (OCR), from January 2016 to November 2016 approximately 169,013,996 people were affected by 1,737 healthcare breaches. The Ponemon Institute estimates that data breaches could cost the healthcare industry as m....

Keep Out: Unsecured PHI Inside

Author: Journal of AHIMA Staff

Source: Journal of AHIMA

Publication Date: March 2017


Crumbling, decaying, and abandoned hospitals aren’t just physically dangerous examples of urban decrepitude—they also could be prime targets for medical identity thieves who know what they’re doing.


Take the case of Chicago, IL’s Edgewater Medical Center, a....

Seat at the Table: Testimony to NCVHS

Author: Martin, Melissa

Source: Journal of AHIMA

Publication Date: September 2016



Back in June I had the opportunity to represent both AHIMA members and the HIM profession while testifying at a National Committee on Vital and Health Statistics (NCVHS) hearing on the need for a better definition of the minimum necessary standards. I would like to share with you some hig....

Information Governance for Offsite Data Security

Author: Saharia, Devendra

Source: Journal of AHIMA

Publication Date: April 2016



Disruptive technology can turn any industry on its head—virtually overnight. Just five years ago, summoning a taxi was an inefficient, time-consuming effort that often involved dialing up a dispatcher, who contacted a driver, who would then make their way to your location, perhaps in an h....

From 'Confidentiality Police' to 'Privacy Officer'

Author: Martin, Melissa

Source: Journal of AHIMA

Publication Date: April 2016



Privacy and security has been one of the most interesting aspects of my job. I often tell folks the role of privacy comes very easily to HIM professionals because we were the “Confidentiality Police” long before the title “Privacy Officer” was widely accepted. Prior to HIPAA, HIM professi....

Bringing Physician Practices into the HIM Fold: Guidance on Making a Smooth Transition and Ensuring the MD/Hospital/HIM Relationship Remains Mutually Beneficial

Author: Lee, Christine

Source: Journal of AHIMA

Publication Date: April 2016



According to the American Medical Association (AMA), physician practices continued a slow but steady transition toward hospital ownership in 2015. In their July 2015 study, the AMA reported a decrease in physician-owned practices alongside a continual increase in physicians working direct....

OCR Clarifies Policy on Medical Record Request Fees

Author: Greene, Adam H

Source: Journal of AHIMA

Publication Date: April 2016



In 2009, CONGRESS passed the Health Information Technology for Economic and Clinical Health (HITECH) Act, which granted individuals a right to have a copy of their records sent to a third party, according to 42 U.S.C. § 17935(e) of the regulation.


Unfortunately, many attorn....

Shifting from Reactive to Proactive HIPAA Audits

Author: Brinda, Danika

Source: Journal of AHIMA

Publication Date: January 2016



Stories about workforce members inappropriately accessing health information continue to plague the Department of Health and Human Services’ Data Breach Portal—which lists US provider data breaches that affect more than 500 individuals. Recently two data breaches reported on th....

DIY Privacy Risk Assessments

Author: Butler, Mary

Source: Journal of AHIMA - website

Publication Date: November 2015


The HIM Problem


Completing regular privacy risk assessments is one of the most proactive ways of preventing healthcare privacy breaches. However, finding helpful tools for these assessments is hard to come by.


The HIM Problem Solver: Sharon Lewis, MBA, RHIA, CHPS, CP....

Cybersecurity 101

Author: Lucci, Susan; Walsh, Tom

Source: Journal of AHIMA

Publication Date: November 2015



One of the most alarming statistics in the news, which is growing with intent and severity, is the prevalence of cyber-attacks, particularly in healthcare. It is an alarming trend that has gained a good deal of attention. For example, in July 2015, UCLA reported that up to 4.5 million pati....

Employee Confidentiality Training for the Electronic Health Record: A Systematic Review of Literature

Author: VanderMolen, Julia; Prince, Alesha; Neu, Emily; DeKraker, Rachael

Source: Educational Perspectives in Health Informatics and Information Management

Publication Date: October 2015


Abstract


Introduction: The healthcare industry is an ever-changing field, and in recent years, the introduction of the electronic health record (EHR) has enabled hospitals to store and retrieve detailed patient information for use by healthcare providers, and sometimes patients, d....

Evolving Role of the Privacy and Security Officer

Author: Bowen, Rita K.

Source: Journal of AHIMA

Publication Date: June 2015



Fifteen years ago, many individuals accepted the role of the privacy officer with a perception that it would be a role involving the education and training of individuals on HIPAA rules and regulations, developing policy, and responding to reported incidents. The security officer was focu....

[1] 2 3 4 5 6 7 8 9 10 11