540 results.
[1] 2 3 4 5 6 7 8
You've Got Inappropriate Mail
Author: Planchon, Don
Source: In Confidence (newsletter)
Publication Date: July 02, 2000
You've Been Served: What Might Happen When Responding to a Subpoena
Author: Hedges, Ron
Source: AHIMA blog post | Journal of AHIMA - website
Publication Date: March 12, 2015
Working Offshore: the Case for Transcription and Coding
Author: von Grey, Michael L.; Iwinski, David Jr.
Source: AHIMA Convention
Publication Date: October 15, 2004
Workflow for Breach Notification
Author: Walsh, Tom
Source: Journal of AHIMA
Publication Date: April 2010
Who Has Rights to a Deceased Patient’s Records?
Author: Dimick, Chris
Source: Journal of AHIMA - website
Publication Date: August 2009
Who Are You? Authenticating Consumer Identity is Becoming Increasingly Important in Healthcare
Author:
Source: Journal of AHIMA
Publication Date: September 2014
Where to Begin with Cyber Defense
Author: Lewis, Sharon; McDonald, Kevin B
Source: Journal of AHIMA
Publication Date: April 2015
When to Send a Breach Notification: New HIPAA Rules Revise “Harm” Standard
Author: Warner, Diana
Source: Journal of AHIMA
Publication Date: April 2013
When Doctors and Patients Troll Each Other, PHI Protection Suffers
Author: Journal of AHIMA Staff
Source: Journal of AHIMA
Publication Date: August 2016
When Confidential Information Is Needed in Litigation
Author: Hedges, Ron
Source: AHIMA blog post | Journal of AHIMA - website
Publication Date: April 09, 2015
When Are Photos and Videotapes Deemed Part of the DRS?
Author: Hughes, Gwen
Source: In Confidence (newsletter) | AHIMA Q and A
Publication Date: January 02, 2003
What Were They Thinking? Film Crew in ER Brings Lawsuit to Hospital
Author: Hedges, Ron
Source: AHIMA blog post | Journal of AHIMA - website
Publication Date: June 2016
What's Your Designated Record Set? (HIPAA on the Job)
Author: Amatayakul, Margret; Waymack, Pam
Source: Journal of AHIMA
Publication Date: June 2002
What Do You Mean by "Electronic Health Record?"
Author: Hedges, Ron
Source: AHIMA blog post | Journal of AHIMA - website
Publication Date: March 15, 2016
What Does It Take to be a Healthcare Information Security Manager?
Author: Wilder, Steven S.
Source: In Confidence (newsletter)
Publication Date: March 02, 2002
What Caused the Breach? An Examination of Use of Information Technology and Health Data Breaches
Author: Wikina, Suanu Bliss
Source: Perspectives in Health Information Management
Publication Date: October 2014
We need a 21st century privacy approach allowing Americans to protect and share health information to improve quality
Author: Connecting for Health
Source: External healthcare industry report | External - used with permission
Publication Date: September 22, 2008
Web FAQ
Author: AHIMA Professional Practice Team
Source: AHIMA Q and A
Publication Date: October 2002
Web FAQ
Author: AHIMA Professional Practice Team
Source: AHIMA Q and A
Publication Date: October 2002
Web FAQ
Author: AHIMA Professional Practice Team
Source: AHIMA Q and A
Publication Date: October 2002
Web FAQ
Author: AHIMA Professional Practice Team
Source: AHIMA Q and A
Publication Date: October 2002
Web FAQ
Author: AHIMA Professional Practice Team
Source: AHIMA Q and A
Publication Date: October 2002
Web-based Disclosure Tracking Provides HIPAA Compliance
Author: Gallagher, Patrick; Pavoni, Mary Mike
Source: In Confidence (newsletter)
Publication Date: April 02, 2003
Web-based Applications Offer Data Processing Solutions
Author: Salem, Didier
Source: In Confidence (newsletter)
Publication Date: July 02, 2003
Value of HIM in Privacy and Security Compliance
Author: Amatayakul, Margret; Work, Mitch
Source: Journal of AHIMA
Publication Date: May 2007
Using the SSN as a Patient Identifier
Author: AHIMA e-HIM Work Group on Regional Health Information Organizations (RHIOs)
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: March 2006
Using Network Audits to Monitor Privacy and Security
Author: Shanley, Suzanne
Source: In Confidence (newsletter)
Publication Date: May 02, 2003
Using Aliases to Protect Privacy in Healthcare
Author: Barrett, Charlotte S; Beidler, Aurae; Davis, Nancy; Glondys, Barbara
Source: Journal of AHIMA
Publication Date: November 2016
Use of Language-Interpreter Consent Form
Author: Gore, Glennda
Source: AHIMA Foundation
Publication Date: January 08, 2002
Untangling Privacy
Author: Dimick, Chris
Source: Journal of AHIMA
Publication Date: February 2009
Untangling HIE: Patchwork Regulations, Standards Complicate Health Information Exchange
Author: Warner, Diana
Source: Journal of AHIMA
Publication Date: May 2012
United under HIPAA: a Comparison of Arrangements and Agreements (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: September 2002
Uniform Health-care Information Act
Author: National Conference of Commissioners on Uniform State Laws; American Bar Association
Source: External web site
Publication Date: February 11, 1986
Understanding the Privacy Rule's Amendments
Author: Hughes, Gwen
Source: Journal of AHIMA
Publication Date: November 2002
Understanding the HIE Landscape
Author: AHIMA
Source: AHIMA practice brief
Publication Date: September 2010
Understanding Release of Information in Long-Term Care Facilities
Author: Marsh, Carmilla
Source: Journal of AHIMA
Publication Date: February 2002
Understanding HIPAA Enforcement: Trust, but Verify
Author: Apple, Gordon J.
Source: In Confidence (newsletter)
Publication Date: June 02, 2003
Understanding Disclosures for Firearm Background Checks
Author: Davis, Nancy; Glondys, Barbara
Source: Journal of AHIMA
Publication Date: May 2016
Understanding Disclosures for Confidential Communications
Author: Burrington-Brown, Jill
Source: In Confidence (newsletter) | AHIMA Q and A
Publication Date: March 02, 2003
Uncovering the Impact of HIPAA's Accounting of Disclosures on Healthcare Providers
Author: Schade, Fred; Cottrell, Matthew
Source: In Confidence (newsletter)
Publication Date: December 02, 2002
Uncovering the Enemy Within: Utilizing Incident Response, Forensics
Author: Derhak, Mike
Source: In Confidence (newsletter)
Publication Date: September 02, 2003
Turning Your HIM Expertise Into a Resource
Author: Gordon, Lynne Thomas
Source: Journal of AHIMA
Publication Date: April 2017
Treating Healthcare with Health "I"T
Author: Dimick, Chris
Source: Journal of AHIMA
Publication Date: September 2012
Transitioning to a Principle Based Privacy Compliance
Author: Williams, Jutta; Thomason, Mary
Source: AHIMA Convention
Publication Date: October 02, 2011
Tough Compliance Questions to Ask Your Business Associates
Author: Klasa, Marge
Source: AHIMA Convention
Publication Date: October 21, 2005
Top HITECH-HIPAA Compliance Obstacles Emerge: Analyzing lessons learned from six months of Omnibus Privacy Rule implementation efforts
Author: Butler, Mary
Source: Journal of AHIMA
Publication Date: April 2014
Too Much Privacy? OCR Proposes Easing Protections on Decedent Records
Author: Heubusch, Kevin
Source: Journal of AHIMA
Publication Date: September 2010
Tips for Record Requests
Author: AHIMA
Source: Journal of AHIMA
Publication Date: April 2012
Tighten the Bolts of Your ROI Processes
Author: Cacciatore, Victoria; Downing, Katherine
Source: Journal of AHIMA
Publication Date: June 2014
This is Going on Your Permanent Record: HIPAA and the Right To Be Forgotten
Author: AHIMA Staff
Source: Journal of AHIMA
Publication Date: January 2015
Think You're Ready? Don't Forget the Self-insured Health Plan (HIPAA on the Job)
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: March 2003
Things Privacy Officers Can Do Today to Defend Against a Cyberattack
Author: Arvin, Marti
Source: Journal of AHIMA
Publication Date: April 2017
The Year Ahead
Author: Butler, Mary
Source: Journal of AHIMA
Publication Date: January 2015
The Privacy Mindset: Setting Better Boundaries with Third-Party Record Reviewers
Author: Derlink, Amy L; Schembari, Elaine
Source: Journal of AHIMA
Publication Date: March 2012
The Omnibus Arrives: OCR Issues HITECH-HIPAA Final Privacy Rule
Author: Rode, Dan
Source: Journal of AHIMA
Publication Date: April 2013
The New Privacy Officer
Author: Dimick, Chris
Source: Journal of AHIMA
Publication Date: April 2012
The Healthcare Wall of Shame
Author: AHIMA
Source: Journal of AHIMA
Publication Date: November 2013
Testimony on Behalf of The American Health Information Management Association (AHIMA) to the Privacy and Confidentiality Subcommittee of the National Committee of Vital and Health Statistics (NCVHS)
Author: Rode, Dan
Source: AHIMA testimony and comments
Publication Date: August 22, 2001
Testimony of the American Health Information Management Association to the NCVHS Privacy, Confidentiality, and Security Subcommittee on HIPAA and Minimum Necessary
Author: Martin, Melissa
Source: AHIMA testimony and comments
Publication Date: June 16, 2016
Technology Overview
Author: Connecting for Health
Source: External - used with permission
Publication Date: June 25, 2008
Taking a Second Look at Audit Data: How to Glean RAC Intelligence for Better HIM Performance
Author: Crump, Dawn; Tice, Carolyn
Source: Journal of AHIMA
Publication Date: October 2015
Synching up Privacy and Security
Author:
Source: AHIMA Today
Publication Date: October 13, 2008
Swiped, Not Hacked: After a Year of Reporting, Theft Remains Main Cause of Breach
Author: AHIMA
Source: Journal of AHIMA
Publication Date: February 2011
Surviving a CMS Security Investigation: Oregon Facility Shares an Early Look at the Process
Author: Hofman, Judi
Source: Journal of AHIMA
Publication Date: February 2009
Suggested Activities for Healthcare Professionals [and] for the Public
Author: AHIMA
Source: AHIMA recognition week resources
Publication Date: April 13, 2009
Subpoena by Any Other Name Might Not be Legal
Author: Whitney, Jo Ellen
Source: Journal of AHIMA
Publication Date: May 2007
Stopping Thieves in Their Tracks: What HIM Professionals can do to Mitigate Medical Identity Theft
Author: Eramo, Lisa A
Source: Journal of AHIMA
Publication Date: August 2016
Staying Alert to Patient Rights Under HIPAA
Author: Apple, Gordon J.
Source: In Confidence (newsletter)
Publication Date: March 02, 2001
Statistically, What’s the Chance of a Breach?
Author: Wiedemann, Lou Ann
Source: Journal of AHIMA
Publication Date: March 2017
State Security Breach Notification Laws
Author: National Conference of State Legislatures
Source: External web site
Publication Date: December 09, 2009
Statement Accompanying Disclosures
Author: AHIMA
Source: AHIMA sample form
Publication Date: January 02, 1997
Standards for Safety, Security, and Interoperability of Medical Devices in an Integrated Health Information Environment
Author: Williams, Patricia A.H
Source: Journal of AHIMA
Publication Date: April 2017
Staff Discovery Tools
Author:
Source: AHIMA web extra
Publication Date: February 02, 2003
Special Considerations for Business Associate Agreements: Substance Abuse Treatment, Federal Law Present Challenges
Author: Haines, Pamela T.
Source: Journal of AHIMA
Publication Date: April 2004
Sounding the Alarm: Knowing When to Notify Patients of a Data Breach Can Be Unclear
Author: Dimick, Chris
Source: Journal of AHIMA
Publication Date: February 2009
[1] 2 3 4 5 6 7 8