Search Results

= Members only

Current search

540 results.

1 [2] 3 4 5 6 7 8

Computer Recycling: Are you Legally Prepared

Author: Harford, Joseph P.

Source: Journal of AHIMA

Publication Date: March 2003


None of these methods of disposal address healthcare organizations’ environmental or legal responsibilities. But how do you know if your organization is legally positioned to handle disposal of computer equipment? This article will address these concerns.

What Is Legal?
<....

Creating Privacy Rule Implementation Efficiency

Author: Hughes, Gwen

Source: Journal of AHIMA

Publication Date: October 2002


Many HIM professionals will be called upon to perform an extraordinary feat during the next six months. They will be asked to bring one or more organizations into compliance with the HIPAA privacy rule by April 14, 2003. While this task is challenging in organizations that began such efforts a....

Cryptography and HIPAA: Breaking the Code

Author: Ruano, Michael

Source: In Confidence (newsletter)

Publication Date: June 02, 2003


Part four in a 10-part series.
This article is the fourth of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. The information security domain of cryptography is probably the most complex and mathematical of all the domai....

Cybersecurity 101

Author: Lucci, Susan; Walsh, Tom

Source: Journal of AHIMA

Publication Date: November 2015



One of the most alarming statistics in the news, which is growing with intent and severity, is the prevalence of cyber-attacks, particularly in healthcare. It is an alarming trend that has gained a good deal of attention. For example, in July 2015, UCLA reported that up to 4.5 million pati....

Damage of Medical Identity Theft

Author:

Source: Journal of AHIMA

Publication Date: January 2008


HIM Professionals “Single Most Important Group” in Finding Solutions

Medical identity theft can wreck the lives of its victims and cost healthcare organizations money and time. But HIM professionals can help mitigate this growing problem, according to Pam Dixon, executive director of....

Data Ownership Evolves with Technology

Author: Demster, Barbara

Source: Journal of AHIMA

Publication Date: September 2012


Technology has transformed the world of health information management (HIM), bringing about change for many of the field’s longstanding professional concepts and work methods. The classic rule of ownership in the words-on-paper era of health records was that “the paper (physical medium) belong....

Data Security Compliance in IT Asset Disposition

Author: Adam, Chris

Source: AHIMA Convention

Publication Date: September 28, 2010


Introduction

Stories about the theft of confidential data have made headlines all too frequently over the past few years. This reality is forcing some businesses to face up to an inconvenient truth: Many organizations have no reliable procedures to ensure that the computers and rel....

Dilemma of Patient Health Record Security

Author: Demster, Barbara

Source: In Confidence (newsletter)

Publication Date: January 02, 2002


E-health privacy and security can be confusing and overwhelming issues when one is new to the world of technology and the Internet.
Many perceive the Internet as a clearly defined entity in a universe called cyberspace.We see “e-health” defined as Internet-related healthcare activities,....

DIY Privacy Risk Assessments

Author: Butler, Mary

Source: Journal of AHIMA - website

Publication Date: November 2015


The HIM Problem


Completing regular privacy risk assessments is one of the most proactive ways of preventing healthcare privacy breaches. However, finding helpful tools for these assessments is hard to come by.


The HIM Problem Solver: Sharon Lewis, MBA, RHIA, CHPS, CP....

D.I.Y. R.O.I: Do It Yourself Release of Information

Author: Haas, Mark

Source: AHIMA Convention

Publication Date: September 29, 2010


BACKGROUND


The Massachusetts General Hospital (MGH) has seen a precipitous increase in the volume of release of information requests processed over the past five years. The Health Information Management department has struggled mightily with trying to handle this steady increas....

Documentation Trends in the Health Record

Author: Dooling, Julie A

Source: Journal of AHIMA

Publication Date: March 2012


The meaningful use program is well under way, helping providers and organizations adopt EHRs to capture complete and comprehensive documentation. To qualify for incentives in stage 1, organizations have adjusted their documentation processes to meet certain objectives and measures and will con....

Download Two Apps and Text Me in the Morning: Physicians are Increasingly Prescribing mHealth Apps, but Privacy and Security Worries Remain

Author: AHIMA

Source: Journal of AHIMA

Publication Date: May 2014



While physicians are increasingly likely to pull out their prescription pad and say, in all earnestness, “There’s a new app for that,” recent research suggests the decision to do so is fraught. A survey of 1,500 physicians found that while 37 percent have prescribed an app, 42 percent ref....

Electronic Record, Electronic Security

Author: Hagland, Mark

Source: Journal of AHIMA

Publication Date: February 2004


New technologies are enhancing the ability to protect patient information. But there’s more to successful implementation than just what’s inside the box.

Melanie Schattauer, RHIA, Jack Obert, and their colleagues at Mercy St. John’s Health System in Springfield, M....

Elements of a Breach Notification Letter

Author: Hjort, Beth M.

Source: Journal of AHIMA

Publication Date: February 2010


This month covered entities are subject to penalties for noncompliance with new federal privacy and security breach notification laws issued by the Department of Health and Human Services.

HHS issued an interim final rule titled “Breach Notification for Unsecured Protected Health Info....

Employee Confidentiality Training for the Electronic Health Record: A Systematic Review of Literature

Author: VanderMolen, Julia; Prince, Alesha; Neu, Emily; DeKraker, Rachael

Source: Educational Perspectives in Health Informatics and Information Management

Publication Date: October 2015


Abstract


Introduction: The healthcare industry is an ever-changing field, and in recent years, the introduction of the electronic health record (EHR) has enabled hospitals to store and retrieve detailed patient information for use by healthcare providers, and sometimes patients, d....

Ensuring Remote Coding Compliance

Author: Comfort, Angie

Source: Journal of AHIMA - Coding Notes

Publication Date: April 2012


More and more HIM department managers are turning to remote coding. However, before implementing this staffing model, managers must answer several questions regarding the privacy and security of patient information, including:
What are the compliance risks?
How will privacy and secu....

Evaluating the Information Governance Principles for Healthcare: Integrity and Protection

Author: Datskovsky, Galina; Hedges, Ron; Empel, Sofia; Washington, Lydia

Source: Journal of AHIMA

Publication Date: April 2015



Editor’s note: This is the second in a series of four articles that discuss the eight Information Governance Principles for Healthcare.


AHIMA’s new Information Governance Principles for Healthcare (IGPHC) provides a framework for healthcare organizations to enhance their ab....

Evaluation of PHI Hunter in Natural Language Processing Research

Author: Redd, Andrew; Pickard, Steve; Meystre, Stephane; Scehnet, Jeffrey; Bolton, Dan; Heavirland, Julia; Weaver, Allison Lynn ; Hope, Carol; Garvin, Jennifer Hornung

Source: Perspectives in Health Information Management

Publication Date: January 2015


Abstract


Objectives: We introduce and evaluate a new, easily accessible tool using a common statistical analysis and business analytics software suite, SAS, which can be programmed to remove specific protected health information (PHI) from a text document. Removal of PHI is import....

Evolving Role of the Privacy and Security Officer

Author: Bowen, Rita K.

Source: Journal of AHIMA

Publication Date: June 2015



Fifteen years ago, many individuals accepted the role of the privacy officer with a perception that it would be a role involving the education and training of individuals on HIPAA rules and regulations, developing policy, and responding to reported incidents. The security officer was focu....

1 [2] 3 4 5 6 7 8