Search Results

= Members only

Current search

540 results.

[1] 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 >>

Data Security Compliance in IT Asset Disposition

Author: Adam, Chris

Source: AHIMA Convention

Publication Date: September 28, 2010


Introduction

Stories about the theft of confidential data have made headlines all too frequently over the past few years. This reality is forcing some businesses to face up to an inconvenient truth: Many organizations have no reliable procedures to ensure that the computers and rel....

Guiding Privacy Decisions in an e-HIM Environment

Author: AHIMA

Source: AHIMA Advantage

Publication Date: August 2007


Technology facilitates the collection, management, sharing, and storing of health information. Yet we must ensure privacy and security of health information in order to ensure better usage. HIM professionals can use our skills and knowledge to help achieve solid footing on this issue. Who is le....

Performing a Breach Risk Assessment - Retired

Author: AHIMA

Source: AHIMA practice brief | Journal of AHIMA

Publication Date: September 2013


On August 24, 2009, the US Department of Health and Human Services (HHS) published 45 CFR Parts 160 and 164 Breach Notification for Unsecured Protected Health Information; Interim Final Rule to implement the breach notification provisions of the Health Information Technology for Economic and Cl....

Tips for Record Requests

Author: AHIMA

Source: Journal of AHIMA

Publication Date: April 2012


If patients have never requested their medical records from their doctor or hospital before, the process can seem complicated. However, a few basic steps can help streamline the process:

Read online or call the facility's HIM department for information specific to your request. This....

[1] 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 >>