Search Results

= Members only

Current search

540 results.

1 2 3 4 [5] 6 7 8

Model Breach Notification Letter: Content and Format

Author: AHIMA

Source: AHIMA

Publication Date: August 24, 2009


High-level guidance outlining the content requirements for breach notification letters is provided in section 13402, "Notification in the Case of Breach," of the American Recovery and Reinvestment Act and state-level data breach notification and reporting laws in 44 states, the District of Colu....

Navigating a Compliant Breach Management Process

Author: Downing, Katherine

Source: AHIMA practice brief | Journal of AHIMA

Publication Date: June 2014

The purpose of AHIMA’s new Breach Management Toolkit is to provide a comprehensive collection of resources and best practices to help healthcare organizations and health information management (HIM) professionals navigate their way through the Health Insurance Portability and Accountability Act (HIPAA) Breach Notification Rule and the overall breach management process. The toolkit is intended to raise awareness of the importance and responsibility of everyone within the organization to report HIPAA breaches to the appropriate designated personnel, as well as provide breach prevention education and training.

New Tool Streamlines HIPAA Assessment Process

Author: Cohen, Kathleen

Source: In Confidence (newsletter)

Publication Date: August 02, 2003


How are you making sure that your organization is complying with the HIPAA privacy regulations? Many hospitals are doing HIPAA rounds with privacy officers, going from unit to unit to assess and document HIPAA compliance. But trying to make sense of the data collected during HIPAA rounds can....

Obtaining Satisfactory Assurance for PHI Disclosure

Author: Quinsey, Carol Ann

Source: Journal of AHIMA

Publication Date: June 2003


Obtaining “satisfactory assurance” in the privacy rule may sound like something new, but the concept has been around for a long time. Do you know what it means and how it affects your HIM department? This article will explain what obtaining satisfactory assurance means and how it can....

OCR Clarifies Policy on Medical Record Request Fees

Author: Greene, Adam H

Source: Journal of AHIMA

Publication Date: April 2016



In 2009, CONGRESS passed the Health Information Technology for Economic and Clinical Health (HITECH) Act, which granted individuals a right to have a copy of their records sent to a third party, according to 42 U.S.C. § 17935(e) of the regulation.


Unfortunately, many attorn....

On the HIPAA Hook

Author: Hicks, Andrew

Source: Journal of AHIMA

Publication Date: April 2014



Some healthcare business associates are still asking if HITECH-HIPAA impacts them. The answer is just as important to their affiliated healthcare providers.


Thousands of companies are now legally obligated to comply with the HITECH-HIPAA regulations because of their busines....

On the Line: Professional Practice Solutions

Author: Carpenter, Jennifer E.

Source: Journal of AHIMA

Publication Date: May 1998


Q: I am currently employed by an organization that is implementing a long term care demonstration program for the frail elderly. I am in charge of the database for the demonstration. I'm writing policies and procedures for release of information and confidentiality and would like to ha....

On the Line: Professional Practice Solutions

Author: Smith, Cheryl M.

Source: Journal of AHIMA

Publication Date: January 2001


Q: What is the difference between confidential and nonconfidential health information?

Q: Can a healthcare facility release health information for marketing purposes?

Q: What form must a subpoena duces tecum take in order to be valid?

Cheryl Smith is an AHIMA practice....

On the Line: Professional Practice Solutions

Author: Burrington-Brown, Jill

Source: Journal of AHIMA

Publication Date: July 2002


Q: I work in a clinic setting. An attorney has requested copies of a patient's entire record. The record includes reports dictated by one of the clinic physicians at a local hospital during the patient's hospitalization. The attorney has the patient's permission. Are we allowed under HIPAA to....

Oral Privacy and HIPAA: We Really Need to Talk

Author: Jacobs, Jodi

Source: In Confidence (newsletter)

Publication Date: June 02, 2003


Oral privacy is not a new need or requirement in healthcare. However, because it is now backed by a federal mandate, it is receiving newfound attention. With the passing of the April 14, 2003, deadline for HIPAA compliance, hospitals, pharmacies, clearinghouses, physician’s offices, military....

Outsourcing ROI: Does it Make Sense for You?

Author: Bellenghi, G. Michael

Source: Journal of AHIMA

Publication Date: April 2005


Governed by state and federal regulations, release of information (ROI) is a time-consuming and sensitive process. Failure to fulfill requests accurately and on time can have painful ramifications, affecting quality of patient care and prompting irate phone calls and legal action or fines. Not....

Overcoming the Challenges of Adolescent EHRs

Author: Butler, Mary

Source: Journal of AHIMA - website

Publication Date: June 2014




In this web series, HIM professionals working in emerging roles give advice on tackling difficult HIM problems. This month features the conclusion to a two-part series discussing the unique challenges HIM professionals face in deploying EHRs customized to serve pediatric and adolesce....

Path to Security Breach Notification Regulation

Author: Rhodes, Harry B.

Source: AHIMA

Publication Date: August 24, 2009


Forty-four states, the District of Columbia, Puerto Rico, and the Virgin Islands enacted data breach notification and reporting laws well before the Health Information Technology for Economic and Clinical Health (HITECH) Act of the American Recovery and Reinvestment Act (ARRA) set the first f....

Performing a Breach Risk Assessment - Retired

Author: AHIMA

Source: AHIMA practice brief | Journal of AHIMA

Publication Date: September 2013


On August 24, 2009, the US Department of Health and Human Services (HHS) published 45 CFR Parts 160 and 164 Breach Notification for Unsecured Protected Health Information; Interim Final Rule to implement the breach notification provisions of the Health Information Technology for Economic and Cl....

Personal Genomic Information Management and Personalized Medicine: Challenges, Current Solutions, and Roles of HIM Professionals

Author: Alzu'bi, Amal; Zhou, Leming; Watzlaf, Valerie J.M.

Source: Perspectives in Health Information Management

Publication Date: April 2014


Abstract


In recent years, the term personalized medicine has received more and more attention in the field of healthcare. The increasing use of this term is closely related to the astonishing advancement in DNA sequencing technologies and other high-throughput biotechnologies. A l....

Privacy and the EHR

Author: Nelson, Debra S

Source: AHIMA Convention

Publication Date: October 02, 2011


Determining how to implement privacy regulations and policies in an electronic record environment can not only be daunting but also thought of quite late in the EHR implementation process. Daily processes and tasks such as reviewing the medical record with patients to processing requests for a....

Privacy Architecture and e-Consent

Author: Connor, Kathleen

Source: Journal of AHIMA

Publication Date: June 2007


As the US prepares to implement a nationwide health information network (NHIN), one issue that repeatedly surfaces is how to appropriately protect the privacy and security of electronic health information. Of particular concern is how such a system can accommodate the various legal restriction....

Privacy Holes in the 'Hidden Healthcare System': Students' PHI-laden Education Records that are Stored and Shared Electronically Don’t Have the Same Safeguards as most EHRs

Author: DuBravec, Daniel A; Daigle, Matt

Source: Journal of AHIMA

Publication Date: June 2015



With student safety and privacy an increasing parental concern, school administrators nationwide are sitting on a powder keg of potential backlash because of a gray area of student privacy protections that Julia Lear, senior advisor for the Center of Health and Health Care in Schools at G....

Privacy in the Spotlight

Author: Dimick, Chris

Source: Journal of AHIMA

Publication Date: November 2007


Varying privacy practices that pose barriers to health information exchange are putting HIM concerns in the national spotlight.
The 35-year-old Minnesota woman’s winter vacation in the neighboring state of Wisconsin was going great, until her ski snapped and the accident happened. B....

Privacy or Convenience?

Author: AHIMA Staff

Source: Journal of AHIMA

Publication Date: February 2015


The tension between data privacy and consumers’ demand for their health information will become more strained in 2015, a new report predicts. As the number of privacy breaches in the healthcare sector has grown in recent years, so too has the desire of consumers to be one click away from....

Privacy Rights Never Die: And Sometimes Complications Linger On

Author: AHIMA

Source: Journal of AHIMA

Publication Date: May 2011


The laws surrounding release of a deceased patient's records can lead to complex and frustrating situations in the HIM department. Just who has access rights depends on federal law, state law, and individual circumstances, illustrated by the two scenarios below.

Last summer the Office....

Privacy's Day in Court

Author: Gradle, Brian D.

Source: Journal of AHIMA

Publication Date: September 2002


While HIM professionals work to implement HIPAA, courts across the nation continue to hear cases that could affect this work. Namely, these are cases related to state privacy laws.


HIPAA's "preemption" framework provides that state laws that are not contrary to HIPAA or that p....

Proof Is in the Policy

Author: Walsh, Tom

Source: Journal of AHIMA

Publication Date: February 2004


Proving security compliance later requires establishing documentation now. HIM professionals have a valuable role to play.

HIM professionals played central roles in their organization’s privacy efforts, ensuring that appropriate policies, procedures, and documents were in plac....

Protecting Verbal PHI: a Plan

Author: Birnbaum, Cassi L

Source: Journal of AHIMA

Publication Date: February 2003


Does your organization have a policy in place for protecting patient health information (PHI) over the phone?


This article will discuss how a workgroup at Children’s Hospital and Health Center (CHHC) in San Diego, CA, implemented a policy to protect verbal PHI and how your....

Protection of Personal Data -- The European View

Author: Mathews, Steve

Source: Journal of AHIMA

Publication Date: March 1998


A new series of laws are being passed to control the processing of personal information -- including medical information -- inside the European Commonwealth. The author gives an overview of the European view of personal information and examines the implications for healthcare professionals bo....

1 2 3 4 [5] 6 7 8