Search Results

= Members only

Current search

540 results.

1 2 3 4 5 6 [7] 8

Sequestering EHR Data in IT Systems

Author: Miaoulis, William M

Source: Journal of AHIMA

Publication Date: May 2009


There can be three situations under which healthcare organizations may need to sequester (or segregate) certain data within a medical record: placing a legal hold in connection with litigation, limiting disclosures of a record pursuant to a request by a patient, and restricting access to sensi....

Shifting from Reactive to Proactive HIPAA Audits

Author: Brinda, Danika

Source: Journal of AHIMA

Publication Date: January 2016



Stories about workforce members inappropriately accessing health information continue to plague the Department of Health and Human Services’ Data Breach Portal—which lists US provider data breaches that affect more than 500 individuals. Recently two data breaches reported on th....

Simple Steps to Tracking Disclosures

Author: Hughes, Gwen

Source: Journal of AHIMA

Publication Date: July 2002


The many exceptions to the HIPAA privacy rule’s accounting of disclosures standard make it difficult to determine what must be tracked. Although the rule gives patients the right to receive an accounting of disclosures of their health information, it lists several exceptions. This article....

Smart Cards for Healthcare: a Follow-up Visit

Author: Ross, Bruce

Source: In Confidence (newsletter)

Publication Date: March 02, 2000


Smart cards are a peculiar subject when it comes to healthcare in the United States. They are viewed as everything from an up-andcoming product to an inscrutable and hard to integrate backwater technology. Today, all that is rapidly changing. As shown by its adoption by Microsoft, Sun Micro,....

Smart Cards May Make Security a Non-Issue

Author: Deike, Karen

Source: In Confidence (newsletter)

Publication Date: November 02, 2000


Smart cards have long held enormous potential for governments in managing healthcare information and delivering benefits to clients with more efficiency, less fraud, and greater customer satisfaction. But critical to gaining acceptance of the cards is the ability to assure clients that the in....

Smart Training on Privacy and Security

Author: Bacik, Sandy

Source: Journal of AHIMA

Publication Date: July 2010


ARRA's modifications to the HIPAA privacy and security rules are setting off a new round of training in facilities large and small. Trainers must fit the new training into existing schedules that already include organizational policies and procedures, HIPAA, and other regulations such as the R....

Smart Training on Privacy and Security (expanded version)

Author: Bacik, Sandy

Source: Journal of AHIMA

Publication Date: April 2010



There is plenty of privacy and security training to be done, and many trainers struggle to get resources from their organizations and attention from their audiences. Sandy Bacik, CISSP, ISSMP, CISM, CGEIT, is a principal consultant at EnerNex and a former chief security officer. Here she o....

Snap Judgment

Author: AHIMA Professional Ethics Committee

Source: Journal of AHIMA - website

Publication Date: April 01, 2010





Anyone who is a member of AHIMA or holds its credentials agrees to abide by its code of ethics.


The code sets forth professional values and ethical principles, and it offers guidelines to which professionals aspire. “Ethical behaviors result from a pe....

Sorting Out Employee Sanctions

Author: Burrington-Brown, Jill

Source: Journal of AHIMA

Publication Date: June 2003


Has your organization addressed sanctions related to privacy and security issues? Both the final privacy rule and final security rule address this issue. The privacy rule states that the covered entity must “have and apply appropriate sanctions against members of its workforce who fail to....

Staff Discovery Tools

Author:

Source: AHIMA web extra

Publication Date: February 02, 2003


Use one of the two approaches below to involve and educate staff on privacy issues. The second method uses a more structured approach.
1. Protected health information (PHI) is confidential information that includes a patient's identity and medical information. Identify instances where PHI....

Standards for Safety, Security, and Interoperability of Medical Devices in an Integrated Health Information Environment

Author: Williams, Patricia A.H

Source: Journal of AHIMA

Publication Date: April 2017



Information sharing between healthcare organizations increasingly includes the use of electronic health records (EHRs) as well as data from medical devices that have been integrated into existing networks. When exchanging such data, providers should be mindful not only of the interoperabil....

Statistically, What’s the Chance of a Breach?

Author: Wiedemann, Lou Ann

Source: Journal of AHIMA

Publication Date: March 2017



According to the Department of Health and Human Services Office for Civil Rights (OCR), from January 2016 to November 2016 approximately 169,013,996 people were affected by 1,737 healthcare breaches. The Ponemon Institute estimates that data breaches could cost the healthcare industry as m....

Subpoena by Any Other Name Might Not be Legal

Author: Whitney, Jo Ellen

Source: Journal of AHIMA

Publication Date: May 2007


Generally when an opposing party is seeking medical records from a care provider, the first request is accompanied by a subpoena, which can be difficult for an HIM department to assess in terms of what-if any-records can be produced.

A subpoena accompanied by a HIPAA-compliant consen....

Testimony on Behalf of The American Health Information Management Association (AHIMA) to the Privacy and Confidentiality Subcommittee of the National Committee of Vital and Health Statistics (NCVHS)

Author: Rode, Dan

Source: AHIMA testimony and comments

Publication Date: August 22, 2001

August 22, 2001


Mr. Rothstein, members of the Privacy and Confidentiality Subcommittee, ladies and gentlemen - good morning!

I am Dan Rode, vice president for the AHIMA. On behalf of the Association, its more than 40,000 members, and myself, thank you for the opportunity....

The Healthcare Wall of Shame

Author: AHIMA

Source: Journal of AHIMA

Publication Date: November 2013


While stolen laptops and hacking of healthcare computer networks have dominated the headlines, healthcare privacy and security experts warn that covered entities are ignoring the risks posed by unsecured paper records.


In response to new additions to the Office for Civil Rights'....

The New Privacy Officer

Author: Dimick, Chris

Source: Journal of AHIMA

Publication Date: April 2012



It has been a decade since the first privacy officers took their jobs in response to the HIPAA privacy rule. A slew of changes since then have added more responsibility, required more skills, and demanded more time of them than anyone could have imagined.

When Nancy Davis, R....

The Year Ahead

Author: Butler, Mary

Source: Journal of AHIMA

Publication Date: January 2015



Human beings have been fascinated by birds—their flight patterns, colors, and songs—for centuries. In the ancient world, “augurs,” Roman practitioners of “augury,” looked for clues about the past and future by observing birds in flight, hoping for omens.....

Tips for Record Requests

Author: AHIMA

Source: Journal of AHIMA

Publication Date: April 2012


If patients have never requested their medical records from their doctor or hospital before, the process can seem complicated. However, a few basic steps can help streamline the process:

Read online or call the facility's HIM department for information specific to your request. This....

Treating Healthcare with Health "I"T

Author: Dimick, Chris

Source: Journal of AHIMA

Publication Date: September 2012




Patient-Centric Stage 2 Meaningful Use Measures Considered Treatment for Ailing US Health System



The US healthcare system is ill. Higher costs, sicker patients, and struggling providers are the symptoms of the disease that has sent industry stakeholders scrambling t....

Turning Your HIM Expertise Into a Resource

Author: Gordon, Lynne Thomas

Source: Journal of AHIMA

Publication Date: April 2017



In 1941, author Edna Huffman, writing about the management and storage of medical records, introduced readers to “the newest development in storage methods and the method that will conserve the greatest amount of space, known as microphotography.” She described how medical reco....

Understanding the HIE Landscape

Author: AHIMA

Source: AHIMA practice brief

Publication Date: September 2010


The health information exchange (HIE) landscape has changed dramatically over the past five years. More HIEs are available to organizations and providers than ever before. Industry initiatives leveraging technological advances and the call for all Americans to have an electronic health record b....

Understanding the Privacy Rule's Amendments

Author: Hughes, Gwen

Source: Journal of AHIMA

Publication Date: November 2002


By now you know that amendments to the final privacy rule were published in the August 14, 2002, Federal Register. The amendments are intended to correct problems identified in the original privacy rule published on December 28, 2000.


This article presents a summary of some of....

Untangling Privacy

Author: Dimick, Chris

Source: Journal of AHIMA

Publication Date: February 2009


Health IT won’t advance far without resolving the complex issue of privacy protections. Can a complicated situation be teased apart thread by thread?

The debate on privacy has become very public.

Privacy advocates, health IT advocates, providers, HIM professionals, fe....

Use of Language-Interpreter Consent Form

Author: Gore, Glennda

Source: AHIMA Foundation

Publication Date: January 08, 2002



In an effort to comply with the upcoming HIPAA confidentiality requirements, McAlester Regional Health Center has begun to review all policies and procedures concerning patient confidentiality and data security. During this process, the use of language interpreters was identified as one a....

Web FAQ

Author: AHIMA Professional Practice Team

Source: AHIMA Q and A

Publication Date: October 2002

Because HIPAA gives patients the right to copy their medical records, does my facility have to supply a copy machine for this purpose or allow patients to take their records to a copy center?
According to section 164.520 of the HIPAA final privacy rule, an individual has "the right to inspect....

Web FAQ

Author: AHIMA Professional Practice Team

Source: AHIMA Q and A

Publication Date: October 2002

Who can authorize the release of patient health information on behalf of a deceased patient?
The individual authorized to consent to the release of patient health information on behalf of a deceased patient varies by state.
Usually, the personal representative of a deceased patient (execu....

Web FAQ

Author: AHIMA Professional Practice Team

Source: AHIMA Q and A

Publication Date: October 2002


If the deceased patient had a sexually transmitted disease (STD) such as HIV, are the standards for release of information more rigid?
The release of patient records containing evidence of sexually transmitted disease is governed by state law. In the absence of state law to the contrary,....

Web FAQ

Author: AHIMA Professional Practice Team

Source: AHIMA Q and A

Publication Date: October 2002


Is the authority to consent to the disclosure of patient information different when it identifies the deceased as an alcohol or drug abuser?
The Confidentiality of Alcohol and Drug Abuse Patient Records regulation (42 CFR 2) applies to patient drug or alcohol abuse information obtained by....

Web FAQ

Author: AHIMA Professional Practice Team

Source: AHIMA Q and A

Publication Date: October 2002

How should we handle requests for birth information by adoptees?
Adoption is a statutory procedure governed entirely by state law.1 Although birth records are sealed, most states allow adoptees to get information about their birth parents but prohibit access to data that could be used to ident....

1 2 3 4 5 6 [7] 8