Search Results

= Members only

Current search

540 results.

1 2 [3] 4 5 6 7 8

Few Requests for Today’s Accountings

Author: AHIMA

Source: Journal of AHIMA

Publication Date: February 2010


HIPAA’s Accounting of Disclosure Provisions Led to Few Patient Requests; Now ARRA Is Upping the Ante

Provisions within the American Recovery and Reinvestment Act extend HIPAA’s accounting of disclosure regulations for providers who maintain electronic health records. The provisions a....

Frequently Asked Questions: Confidentiality

Author: AHIMA Staff

Source: AHIMA Q and A

Publication Date: October 2002


How and Where Can I Obtain Copies of My State's Disclosure Laws?

My Physician Passed Away, and I'd Like to Know Where I Can Locate the Medical Records Originated at His/Her Office.

I Need to Locate Immunization Records for College and Am Unable to Locate My Physician. Wh....

From 'Confidentiality Police' to 'Privacy Officer'

Author: Martin, Melissa

Source: Journal of AHIMA

Publication Date: April 2016



Privacy and security has been one of the most interesting aspects of my job. I often tell folks the role of privacy comes very easily to HIM professionals because we were the “Confidentiality Police” long before the title “Privacy Officer” was widely accepted. Prior to HIPAA, HIM professi....

From DNA to Data Privacy

Author: Fuller, Barbara P.; Jeffries, Jane

Source: Journal of AHIMA

Publication Date: March 2001




Genetic research is revolutionizing healthcare by predicting diseases and revealing cures. At the same time, the information presents new challenges to HIM professionals charged with keeping this vital data from the wrong hands. Here's a look at the role genetic information is playin....

Guidance Specifying the Technologies and Methodologies That Render Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals for Purposes of the Breach Notification Requirements ... [of ARRA]

Author: U.S. Department of Health and Human Services. Office of the Secretary

Source: Government (U.S.)

Publication Date: April 27, 2009

[Federal Register: April 27, 2009 (Volume 74, Number 79)] [Rules and Regulations] [Page 19006-19010] From the Federal Register Online via GPO Access [wais.access.gpo.gov] [DOCID:fr27ap09-11] ======================================================================= ------------------------------------....

Guiding Privacy Decisions in an e-HIM Environment

Author: AHIMA

Source: AHIMA Advantage

Publication Date: August 2007


Technology facilitates the collection, management, sharing, and storing of health information. Yet we must ensure privacy and security of health information in order to ensure better usage. HIM professionals can use our skills and knowledge to help achieve solid footing on this issue. Who is le....

Handling Release of Information Over the Phone

Author: Hjort, Beth M.

Source: In Confidence (newsletter)

Publication Date: November 02, 2003


Q: Hospitals must have sensitive yet confidential policies for handling concerned family and friends with questions about loved ones within their facilities. How can a covered entity (CE) be confident about appropriate telephone release of information when it’s so difficult to validate a call....

Handling Sensitive Information in an NHIN

Author: Dimick, Chris

Source: Journal of AHIMA

Publication Date: February 2008


The topic of sensitive health data and how to keep it private in the electronic age is one of the most complex issues facing the development of a nationwide, interoperable health information exchange network.

Physicians need accurate medical records to provide adequate care. Yet pati....

HIM Can Help in the Battle Against Medical Identity Theft

Author:

Source: AHIMA Today

Publication Date: October 07, 2009


The woman rushed into the emergency department at Massachusetts General Hospital (MGH) in extreme pain. She presented her insurance card and name to registration and was quickly examined by medical staff. Doctors determined the woman needed an emergency appendectomy. But staff soon realized tha....

HIPAA and Privacy: After the Compliance Date

Author: Mikels, Debbie

Source: AHIMA Convention

Publication Date: October 15, 2004

Abstract

This article reviews successful strategies in preparing for HIPAA Privacy compliance. There are ongoing challenges organizations will face after the compliance date, such as managing research issues, identifying all business associates, and managing the accounting of disclosures....

HIPAA and the EHR: Making Technical Safeguard Changes

Author: Fodor, Joseph

Source: Journal of AHIMA

Publication Date: January 2004


As electronic health records (EHRs) become more commonplace in healthcare, changes, adjustments, and improvements will be inevitable. When designing, implementing, upgrading, or remediating an EHR system, your organization’s implementation team should consider the impact of complying wit....

HIPAA Breach Enforcement Roundup

Author: Cacciatore, Victoria; Downing, Katherine

Source: Journal of AHIMA

Publication Date: July 2014



Criminal attacks on healthcare systems have risen 100 percent since 2010, according to a recent Ponemon study.1 This makes it obvious that the privacy and security of patient health information is vulnerable and highly susceptible to data breach. The HIPAA Breach Notification Rule became e....

HIPAA Changes Call for Revising BA Agreements

Author: McDavid, Jan P

Source: Journal of AHIMA

Publication Date: May 2013



Business associates (BAs) of HIPAA-covered entities like hospitals and doctor's offices should already be intimately acquainted with HIPAA's privacy and security regulations. BAs should already have business associate agreements with every covered entity with whom they work and assume resp....

HIPAA Compliance for Clinician Texting

Author: Greene, Adam H

Source: Journal of AHIMA

Publication Date: April 2012



The HIPAA privacy and security rules need not act as an obstacle to efficient communications, but keeping texting compliant requires planning and diligence.

Text (or SMS) messaging has become nearly ubiquitous on mobile devices. According to one survey, approximately 72 perce....

HITECH Frequently Asked Privacy, Security Questions: Part 3

Author: Rose, Angela Dinh; Greene, Adam H

Source: Journal of AHIMA | AHIMA Q and A

Publication Date: March 2014

This article concludes a three-part series discussing the most commonly asked questions regarding compliance requirements surrounding the final HITECH Omnibus Rule, released in January 2013. It highlights the updated requirements and provides answers to questions regarding decedent protected health information (PHI), the release of immunization records to schools, and the enhanced request for restrictions requirements.

HITECH Security – A Practical Approach

Author: Rudloff, Rob

Source: AHIMA Convention

Publication Date: September 28, 2010


Background


HITECH has introduced new security requirements around HIPAA including new breach requirements and associated penalties. This paper addresses the information security and privacy requirements and provides practical solutions to address them. Many organizations already....

How Law, Investigation, Ethics Connect to HIPAA

Author: Ruano, Michael

Source: In Confidence (newsletter)

Publication Date: November 02, 2003


Part nine in a 10-part series.
This article is the ninth of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. The information security domain of law, investigation, and ethics covers these topics in depth and provides a p....

How to Request Your Medical Records

Author: Dimick, Chris

Source: Journal of AHIMA - website

Publication Date: March 2012



If you’ve never requested your medical records from your doctor or hospital before, the process can seem complicated. However, understanding the law and the basic requirements will ease the process.

The Record Request Process


The basic process for requesting a medica....

How to Respond to Subpoena and Discovery Requests

Author: Hedges, Ron

Source: Journal of AHIMA

Publication Date: November 2014



Health information management (HIM) professionals are frequently pulled into litigation due to their role as custodians of health records and protected health information. This role also can categorize them as parties to civil litigation, which obligates them to produce any relevant infor....

Information Governance for Offsite Data Security

Author: Saharia, Devendra

Source: Journal of AHIMA

Publication Date: April 2016



Disruptive technology can turn any industry on its head—virtually overnight. Just five years ago, summoning a taxi was an inefficient, time-consuming effort that often involved dialing up a dispatcher, who contacted a driver, who would then make their way to your location, perhaps in an h....

Information Security--A Database View

Author: Zender, Anne

Source: Journal of AHIMA

Publication Date: March 1998



HIM professionals agree that applying the principles of information security is important in a hospital setting. But as Sharon Johnson, RRA, knows, those principles can be applied in many situations--including settings under construction. Since spring 1997, Johnson has been ....

1 2 [3] 4 5 6 7 8