Search Results

= Members only

Current search

540 results.

[1] 2 3 4 5 6 7 8

Standards for Safety, Security, and Interoperability of Medical Devices in an Integrated Health Information Environment

Author: Williams, Patricia A.H

Source: Journal of AHIMA

Publication Date: April 2017



Information sharing between healthcare organizations increasingly includes the use of electronic health records (EHRs) as well as data from medical devices that have been integrated into existing networks. When exchanging such data, providers should be mindful not only of the interoperabil....

Turning Your HIM Expertise Into a Resource

Author: Gordon, Lynne Thomas

Source: Journal of AHIMA

Publication Date: April 2017



In 1941, author Edna Huffman, writing about the management and storage of medical records, introduced readers to “the newest development in storage methods and the method that will conserve the greatest amount of space, known as microphotography.” She described how medical reco....

Statistically, What’s the Chance of a Breach?

Author: Wiedemann, Lou Ann

Source: Journal of AHIMA

Publication Date: March 2017



According to the Department of Health and Human Services Office for Civil Rights (OCR), from January 2016 to November 2016 approximately 169,013,996 people were affected by 1,737 healthcare breaches. The Ponemon Institute estimates that data breaches could cost the healthcare industry as m....

Keep Out: Unsecured PHI Inside

Author: Journal of AHIMA Staff

Source: Journal of AHIMA

Publication Date: March 2017


Crumbling, decaying, and abandoned hospitals aren’t just physically dangerous examples of urban decrepitude—they also could be prime targets for medical identity thieves who know what they’re doing.


Take the case of Chicago, IL’s Edgewater Medical Center, a....

Seat at the Table: Testimony to NCVHS

Author: Martin, Melissa

Source: Journal of AHIMA

Publication Date: September 2016



Back in June I had the opportunity to represent both AHIMA members and the HIM profession while testifying at a National Committee on Vital and Health Statistics (NCVHS) hearing on the need for a better definition of the minimum necessary standards. I would like to share with you some hig....

Information Governance for Offsite Data Security

Author: Saharia, Devendra

Source: Journal of AHIMA

Publication Date: April 2016



Disruptive technology can turn any industry on its head—virtually overnight. Just five years ago, summoning a taxi was an inefficient, time-consuming effort that often involved dialing up a dispatcher, who contacted a driver, who would then make their way to your location, perhaps in an h....

From 'Confidentiality Police' to 'Privacy Officer'

Author: Martin, Melissa

Source: Journal of AHIMA

Publication Date: April 2016



Privacy and security has been one of the most interesting aspects of my job. I often tell folks the role of privacy comes very easily to HIM professionals because we were the “Confidentiality Police” long before the title “Privacy Officer” was widely accepted. Prior to HIPAA, HIM professi....

Bringing Physician Practices into the HIM Fold: Guidance on Making a Smooth Transition and Ensuring the MD/Hospital/HIM Relationship Remains Mutually Beneficial

Author: Lee, Christine

Source: Journal of AHIMA

Publication Date: April 2016



According to the American Medical Association (AMA), physician practices continued a slow but steady transition toward hospital ownership in 2015. In their July 2015 study, the AMA reported a decrease in physician-owned practices alongside a continual increase in physicians working direct....

OCR Clarifies Policy on Medical Record Request Fees

Author: Greene, Adam H

Source: Journal of AHIMA

Publication Date: April 2016



In 2009, CONGRESS passed the Health Information Technology for Economic and Clinical Health (HITECH) Act, which granted individuals a right to have a copy of their records sent to a third party, according to 42 U.S.C. § 17935(e) of the regulation.


Unfortunately, many attorn....

Shifting from Reactive to Proactive HIPAA Audits

Author: Brinda, Danika

Source: Journal of AHIMA

Publication Date: January 2016



Stories about workforce members inappropriately accessing health information continue to plague the Department of Health and Human Services’ Data Breach Portal—which lists US provider data breaches that affect more than 500 individuals. Recently two data breaches reported on th....

DIY Privacy Risk Assessments

Author: Butler, Mary

Source: Journal of AHIMA - website

Publication Date: November 2015


The HIM Problem


Completing regular privacy risk assessments is one of the most proactive ways of preventing healthcare privacy breaches. However, finding helpful tools for these assessments is hard to come by.


The HIM Problem Solver: Sharon Lewis, MBA, RHIA, CHPS, CP....

Cybersecurity 101

Author: Lucci, Susan; Walsh, Tom

Source: Journal of AHIMA

Publication Date: November 2015



One of the most alarming statistics in the news, which is growing with intent and severity, is the prevalence of cyber-attacks, particularly in healthcare. It is an alarming trend that has gained a good deal of attention. For example, in July 2015, UCLA reported that up to 4.5 million pati....

Employee Confidentiality Training for the Electronic Health Record: A Systematic Review of Literature

Author: VanderMolen, Julia; Prince, Alesha; Neu, Emily; DeKraker, Rachael

Source: Educational Perspectives in Health Informatics and Information Management

Publication Date: October 2015


Abstract


Introduction: The healthcare industry is an ever-changing field, and in recent years, the introduction of the electronic health record (EHR) has enabled hospitals to store and retrieve detailed patient information for use by healthcare providers, and sometimes patients, d....

Evolving Role of the Privacy and Security Officer

Author: Bowen, Rita K.

Source: Journal of AHIMA

Publication Date: June 2015



Fifteen years ago, many individuals accepted the role of the privacy officer with a perception that it would be a role involving the education and training of individuals on HIPAA rules and regulations, developing policy, and responding to reported incidents. The security officer was focu....

Privacy Holes in the 'Hidden Healthcare System': Students' PHI-laden Education Records that are Stored and Shared Electronically Don’t Have the Same Safeguards as most EHRs

Author: DuBravec, Daniel A; Daigle, Matt

Source: Journal of AHIMA

Publication Date: June 2015



With student safety and privacy an increasing parental concern, school administrators nationwide are sitting on a powder keg of potential backlash because of a gray area of student privacy protections that Julia Lear, senior advisor for the Center of Health and Health Care in Schools at G....

Beware the Dark Side of the Web

Author: Journal of AHIMA Staff

Source: Journal of AHIMA

Publication Date: May 2015


Unless they know exactly what to look for, most Internet users wouldn’t know that a “Dark Web” exists or what it is—let alone the potential for harm that can be done with it.


But the dark side of the web is out there, and its proprietors want your medical information.

....

Clearing the HIPAA Cobwebs: New ONC Chief Privacy Officer Lucia Savage Focuses on Balancing Privacy and Security with Expanding Interoperable EHR Exchange

Author: Dimick, Chris

Source: Journal of AHIMA

Publication Date: April 2015



The spiders of time have been hard at work on the US healthcare privacy and security rules, to the point that their place in health IT interoperability has become fogged and is inhibiting their proper role in the meaningful exchange of health information, according to Lucia Savage, JD, th....

Where to Begin with Cyber Defense

Author: Lewis, Sharon; McDonald, Kevin B

Source: Journal of AHIMA

Publication Date: April 2015



As data is made more readily available through a growing number of public and private channels, understanding the risks is critical. Patients expect organizations to take the steps required to protect their sensitive and personal information as it is being produced, processed, shared, and....

Evaluating the Information Governance Principles for Healthcare: Integrity and Protection

Author: Datskovsky, Galina; Hedges, Ron; Empel, Sofia; Washington, Lydia

Source: Journal of AHIMA

Publication Date: April 2015



Editor’s note: This is the second in a series of four articles that discuss the eight Information Governance Principles for Healthcare.


AHIMA’s new Information Governance Principles for Healthcare (IGPHC) provides a framework for healthcare organizations to enhance their ab....

Privacy or Convenience?

Author: AHIMA Staff

Source: Journal of AHIMA

Publication Date: February 2015


The tension between data privacy and consumers’ demand for their health information will become more strained in 2015, a new report predicts. As the number of privacy breaches in the healthcare sector has grown in recent years, so too has the desire of consumers to be one click away from....

The Year Ahead

Author: Butler, Mary

Source: Journal of AHIMA

Publication Date: January 2015



Human beings have been fascinated by birds—their flight patterns, colors, and songs—for centuries. In the ancient world, “augurs,” Roman practitioners of “augury,” looked for clues about the past and future by observing birds in flight, hoping for omens.....

Evaluation of PHI Hunter in Natural Language Processing Research

Author: Redd, Andrew; Pickard, Steve; Meystre, Stephane; Scehnet, Jeffrey; Bolton, Dan; Heavirland, Julia; Weaver, Allison Lynn ; Hope, Carol; Garvin, Jennifer Hornung

Source: Perspectives in Health Information Management

Publication Date: January 2015


Abstract


Objectives: We introduce and evaluate a new, easily accessible tool using a common statistical analysis and business analytics software suite, SAS, which can be programmed to remove specific protected health information (PHI) from a text document. Removal of PHI is import....

[1] 2 3 4 5 6 7 8