540 results.
[1] 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 >>
You've Got Inappropriate Mail
Author: Planchon, Don
Source: In Confidence (newsletter)
Publication Date: July 02, 2000
You've Been Served: What Might Happen When Responding to a Subpoena
Author: Hedges, Ron
Source: AHIMA blog post | Journal of AHIMA - website
Publication Date: March 12, 2015
Working Offshore: the Case for Transcription and Coding
Author: von Grey, Michael L.; Iwinski, David Jr.
Source: AHIMA Convention
Publication Date: October 15, 2004
Workflow for Breach Notification
Author: Walsh, Tom
Source: Journal of AHIMA
Publication Date: April 2010
Who Has Rights to a Deceased Patient’s Records?
Author: Dimick, Chris
Source: Journal of AHIMA - website
Publication Date: August 2009
Who Are You? Authenticating Consumer Identity is Becoming Increasingly Important in Healthcare
Author:
Source: Journal of AHIMA
Publication Date: September 2014
Where to Begin with Cyber Defense
Author: Lewis, Sharon; McDonald, Kevin B
Source: Journal of AHIMA
Publication Date: April 2015
When to Send a Breach Notification: New HIPAA Rules Revise “Harm” Standard
Author: Warner, Diana
Source: Journal of AHIMA
Publication Date: April 2013
When Doctors and Patients Troll Each Other, PHI Protection Suffers
Author: Journal of AHIMA Staff
Source: Journal of AHIMA
Publication Date: August 2016
When Confidential Information Is Needed in Litigation
Author: Hedges, Ron
Source: AHIMA blog post | Journal of AHIMA - website
Publication Date: April 09, 2015
When Are Photos and Videotapes Deemed Part of the DRS?
Author: Hughes, Gwen
Source: In Confidence (newsletter) | AHIMA Q and A
Publication Date: January 02, 2003
What Were They Thinking? Film Crew in ER Brings Lawsuit to Hospital
Author: Hedges, Ron
Source: AHIMA blog post | Journal of AHIMA - website
Publication Date: June 2016
What's Your Designated Record Set? (HIPAA on the Job)
Author: Amatayakul, Margret; Waymack, Pam
Source: Journal of AHIMA
Publication Date: June 2002
What Do You Mean by "Electronic Health Record?"
Author: Hedges, Ron
Source: AHIMA blog post | Journal of AHIMA - website
Publication Date: March 15, 2016
What Does It Take to be a Healthcare Information Security Manager?
Author: Wilder, Steven S.
Source: In Confidence (newsletter)
Publication Date: March 02, 2002
What Caused the Breach? An Examination of Use of Information Technology and Health Data Breaches
Author: Wikina, Suanu Bliss
Source: Perspectives in Health Information Management
Publication Date: October 2014
We need a 21st century privacy approach allowing Americans to protect and share health information to improve quality
Author: Connecting for Health
Source: External healthcare industry report | External - used with permission
Publication Date: September 22, 2008
Web FAQ
Author: AHIMA Professional Practice Team
Source: AHIMA Q and A
Publication Date: October 2002
Web FAQ
Author: AHIMA Professional Practice Team
Source: AHIMA Q and A
Publication Date: October 2002
Web FAQ
Author: AHIMA Professional Practice Team
Source: AHIMA Q and A
Publication Date: October 2002
Web FAQ
Author: AHIMA Professional Practice Team
Source: AHIMA Q and A
Publication Date: October 2002
Web FAQ
Author: AHIMA Professional Practice Team
Source: AHIMA Q and A
Publication Date: October 2002
Web-based Disclosure Tracking Provides HIPAA Compliance
Author: Gallagher, Patrick; Pavoni, Mary Mike
Source: In Confidence (newsletter)
Publication Date: April 02, 2003
Web-based Applications Offer Data Processing Solutions
Author: Salem, Didier
Source: In Confidence (newsletter)
Publication Date: July 02, 2003
Value of HIM in Privacy and Security Compliance
Author: Amatayakul, Margret; Work, Mitch
Source: Journal of AHIMA
Publication Date: May 2007
[1] 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 >>