540 results.
1 2 3 4 5 [6]
HIPAA Administrative Simplification: Standards for Privacy of Individually Identifiable Health Information
Author: U.S. Office for Civil Rights
Source: Government (U.S.) | U.S. Department of Health & Human Services
Publication Date: October 07, 2009
Guidance Regarding Methods for De-identification of Protected Health Information in Accordance with the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule
Author: U.S. Office for Civil Rights
Source: Government (U.S.) | U.S. Department of Health & Human Services
Publication Date: September 04, 2012
Sample Notice - Confidentiality of Alcohol and Drug Abuse Patient Records
Author: U.S. Office of Management and Budget
Source: AHIMA sample form
Publication Date: October 01, 2000
Medical Identity Theft Town Hall Transcript
Author: U.S. Office of the National Coordinator for Health Information Technology
Source: Government (U.S.)
Publication Date: October 15, 2008
Guide to Privacy and Security of Electronic Health Information
Author: U.S. Office of the National Coordinator for Health Information Technology
Source: Government (U.S.)
Publication Date: April 15, 2015
Medical Identity Theft Town Hall Audio
Author: U.S. Office of the National Coordinator for Health Information Technology
Source: Government (U.S.)
Publication Date: October 15, 2008
Reassessing Your Security Practices in a Health IT Environment: a Guide for Small Health Care Practices
Author: U.S. Office of the National Coordinator for Health Information Technology; U.S. Office for Civil Rights
Source: Government (U.S.)
Publication Date: December 16, 2008
Nationwide Privacy and Security Framework for Electronic Exchange of Individually Identifiable Health Information
Author: U.S. Office of the National Coordinator for Health Information Technology; U.S. Office for Civil Rights
Source: Government (U.S.)
Publication Date: December 16, 2008
Employee Confidentiality Training for the Electronic Health Record: A Systematic Review of Literature
Author: VanderMolen, Julia; Prince, Alesha; Neu, Emily; DeKraker, Rachael
Source: Educational Perspectives in Health Informatics and Information Management
Publication Date: October 2015
Working Offshore: the Case for Transcription and Coding
Author: von Grey, Michael L.; Iwinski, David Jr.
Source: AHIMA Convention
Publication Date: October 15, 2004
Ownership of Health Information in the Information Age
Author: Waller, Adele A.; Alcantara, Oscar L.
Source: Journal of AHIMA
Publication Date: March 1998
Workflow for Breach Notification
Author: Walsh, Tom
Source: Journal of AHIMA
Publication Date: April 2010
Proof Is in the Policy
Author: Walsh, Tom
Source: Journal of AHIMA
Publication Date: February 2004
Untangling HIE: Patchwork Regulations, Standards Complicate Health Information Exchange
Author: Warner, Diana
Source: Journal of AHIMA
Publication Date: May 2012
Regulations Governing Research (2013 update) - Retired
Author: Warner, Diana
Source: AHIMA practice brief
Publication Date: May 2013
When to Send a Breach Notification: New HIPAA Rules Revise “Harm” Standard
Author: Warner, Diana
Source: Journal of AHIMA
Publication Date: April 2013
Catching Up with HIPAA: Managing Noncompliance
Author: Weintraub, Abner E.
Source: Journal of AHIMA
Publication Date: May 2003
Patient Education: Developing a Hidden HIPAA Opportunity
Author: Weintraub, Abner E.
Source: In Confidence (newsletter)
Publication Date: July 02, 2003
Release of Information for Marketing Purposes (1998)
Author: Welch, Julie J.
Source: AHIMA practice brief
Publication Date: January 1998
Data Theft and State Law: When Data Breaches Occur, 34 States Require Organizations to Speak Up
Author: Wernick, Alan S.
Source: Journal of AHIMA
Publication Date: November 2006
Subpoena by Any Other Name Might Not be Legal
Author: Whitney, Jo Ellen
Source: Journal of AHIMA
Publication Date: May 2007
Statistically, What’s the Chance of a Breach?
Author: Wiedemann, Lou Ann
Source: Journal of AHIMA
Publication Date: March 2017
What Caused the Breach? An Examination of Use of Information Technology and Health Data Breaches
Author: Wikina, Suanu Bliss
Source: Perspectives in Health Information Management
Publication Date: October 2014
What Does It Take to be a Healthcare Information Security Manager?
Author: Wilder, Steven S.
Source: In Confidence (newsletter)
Publication Date: March 02, 2002
Transitioning to a Principle Based Privacy Compliance
Author: Williams, Jutta; Thomason, Mary
Source: AHIMA Convention
Publication Date: October 02, 2011
Standards for Safety, Security, and Interoperability of Medical Devices in an Integrated Health Information Environment
Author: Williams, Patricia A.H
Source: Journal of AHIMA
Publication Date: April 2017
Reaffirming Your HIPAA Compliance Efforts
Author: Woloszyn, William
Source: Journal of AHIMA
Publication Date: April 2005
Release of Information: the Basics
Author: Yaggie, Elaine
Source: Journal of AHIMA
Publication Date: May 2001
Instituting an Enterprise-wide PHI Disclosure Management Strategy
Author: Zeiour, Collette; Twiggs, Mariela
Source: Journal of AHIMA
Publication Date: April 2015
Information Security--A Database View
Author: Zender, Anne
Source: Journal of AHIMA
Publication Date: March 1998
Homeland Security and HIM
Author:
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: June 2004
Protect your patients, protect your practice: What you need to know about the Red Flags Rule
Author:
Source: External web site
Publication Date: July 02, 2009
Synching up Privacy and Security
Author:
Source: AHIMA Today
Publication Date: October 13, 2008
ROI on ROI: Speakers Describe a Release of Information Shared Services Model that Splits Work and Revenue
Author:
Source: AHIMA Today
Publication Date: October 06, 2009
Health Data Stewardship: What, Why, Who, How. An NCVHS Primer
Author:
Source: Government (U.S.)
Publication Date: September 15, 2009
HIM Can Help in the Battle Against Medical Identity Theft
Author:
Source: AHIMA Today
Publication Date: October 07, 2009
Black Market PHI Does Exist: Why It’s Time to Take Security Risk Assessments Seriously
Author:
Source: Journal of AHIMA
Publication Date: May 2014
Who Are You? Authenticating Consumer Identity is Becoming Increasingly Important in Healthcare
Author:
Source: Journal of AHIMA
Publication Date: September 2014
Damage of Medical Identity Theft
Author:
Source: Journal of AHIMA
Publication Date: January 2008
Staff Discovery Tools
Author:
Source: AHIMA web extra
Publication Date: February 02, 2003
1 2 3 4 5 [6]