540 results.
[1] 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 >>
Standards for Safety, Security, and Interoperability of Medical Devices in an Integrated Health Information Environment
Author: Williams, Patricia A.H
Source: Journal of AHIMA
Publication Date: April 2017
Information sharing between healthcare organizations increasingly includes the use of electronic health records (EHRs) as well as data from medical devices that have been integrated into existing networks. When exchanging such data, providers should be mindful not only of the interoperabil....
Is HIPAA Outdated? While Coverage Gaps and Growing Breaches Raise Industry Concern, Others Argue HIPAA is Still Effective
Author: Butler, Mary
Source: Journal of AHIMA
Publication Date: April 2017
A Beverly Hills plastic surgeon, let’s call him Dr. Hollywood, has a thriving business—an impeccable office, gracious and welcoming staff, and top of the line equipment and devices. His clientele is primarily celebrities and other wealthy socialites who can afford to pay out of....
Turning Your HIM Expertise Into a Resource
Author: Gordon, Lynne Thomas
Source: Journal of AHIMA
Publication Date: April 2017
In 1941, author Edna Huffman, writing about the management and storage of medical records, introduced readers to “the newest development in storage methods and the method that will conserve the greatest amount of space, known as microphotography.” She described how medical reco....
Things Privacy Officers Can Do Today to Defend Against a Cyberattack
Author: Arvin, Marti
Source: Journal of AHIMA
Publication Date: April 2017
One might ask why a privacy officer even needs to worry about defending against a cyberattack—isn’t that the role of the chief information security officer and the chief information officer? The answer is no. Cyberattacks are not always about technology. The privacy officer is not generall....
Statistically, What’s the Chance of a Breach?
Author: Wiedemann, Lou Ann
Source: Journal of AHIMA
Publication Date: March 2017
According to the Department of Health and Human Services Office for Civil Rights (OCR), from January 2016 to November 2016 approximately 169,013,996 people were affected by 1,737 healthcare breaches. The Ponemon Institute estimates that data breaches could cost the healthcare industry as m....
Keep Out: Unsecured PHI Inside
Author: Journal of AHIMA Staff
Source: Journal of AHIMA
Publication Date: March 2017
Crumbling, decaying, and abandoned hospitals aren’t just physically dangerous examples of urban decrepitude—they also could be prime targets for medical identity thieves who know what they’re doing.
Take the case of Chicago, IL’s Edgewater Medical Center, a....
Advancing HIM and Privacy Roles Through Information Governance
Author: Downing, Katherine
Source: Journal of AHIMA
Publication Date: February 2017
Healthcare organizations are under constant attack from cybercriminals due to the richness of information they collect, store, and disseminate that can also be used for multiple types of fraud and identity theft. Stolen credit card information only lasts until the victim cancels the card,....
Mobile Device Security: Perspectives of Future Healthcare Workers
Author: Hewitt, Barbara; Dolezel, Diane; McLeod, Alexander
Source: Perspectives in Health Information Management
Publication Date: January 2017
Abstract
Healthcare data breaches on mobile devices continue to increase, yet the healthcare industry has not adopted mobile device security standards. This increase is disturbing because individuals are often accessing patients’ protected health information on personal mobi....
Using Aliases to Protect Privacy in Healthcare
Author: Barrett, Charlotte S; Beidler, Aurae; Davis, Nancy; Glondys, Barbara
Source: Journal of AHIMA
Publication Date: November 2016
Developing policies and standard procedures when working with patient aliases is one way to both respect patient privacy but also ensure the accuracy and integrity of patient data.
As defined in AHIMA’s Pocket Glossary, an “alias” is “a name added to,....
Guidelines for a Compliant Business Associate Agreement (2016)
Author: AHIMA Work Group
Source: AHIMA practice brief
Publication Date: October 2016
This update supersedes the November 2013 practice brief, Guidelines for a Compliant Business Associate Agreement.
The Privacy Rule portion of the Health Insurance Portability and Accountability Act (HIPAA) defines a "business associate (BA) as a person or entity that performs....
[1] 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 >>