Search Results

= Members only

Current search

540 results.

<< 3 4 5 6 7 8 9 10 [11] 12 13 14 15 16 17 18 >>

Breaking Down Privacy and Security Barriers to HIE

Author: Rhodes, Harry B.

Source: Journal of AHIMA

Publication Date: November 2007


As noted in the article “Confusion Continues over HIPAA Minimum Necessary Standards,” (J AHIMA, Nov-Dec 2007) the state-level research under the HISPC project identified a number of privacy and security barriers to health information exchange (HIE). Several reports came from this p....

Evaluation of PHI Hunter in Natural Language Processing Research

Author: Redd, Andrew; Pickard, Steve; Meystre, Stephane; Scehnet, Jeffrey; Bolton, Dan; Heavirland, Julia; Weaver, Allison Lynn ; Hope, Carol; Garvin, Jennifer Hornung

Source: Perspectives in Health Information Management

Publication Date: January 2015


Abstract


Objectives: We introduce and evaluate a new, easily accessible tool using a common statistical analysis and business analytics software suite, SAS, which can be programmed to remove specific protected health information (PHI) from a text document. Removal of PHI is import....

Obtaining Satisfactory Assurance for PHI Disclosure

Author: Quinsey, Carol Ann

Source: Journal of AHIMA

Publication Date: June 2003


Obtaining “satisfactory assurance” in the privacy rule may sound like something new, but the concept has been around for a long time. Do you know what it means and how it affects your HIM department? This article will explain what obtaining satisfactory assurance means and how it can....

<< 3 4 5 6 7 8 9 10 [11] 12 13 14 15 16 17 18 >>