Search Results

= Members only

Current search

20 results.

[1] 2

Implementing the Enterprise Master Patient Index

Author: Adragna, Lisa

Source: Journal of AHIMA

Publication Date: October 1998


In implementing a cross-facility initiative, the importance of planning and understanding the implications for all facilities can't be overlooked. Here's how one integrated delivery network navigated the challenges of implementing a cross-facility enterprise master patient inde....

Primer on Network Security

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: March 2004


The lack of specificity in HIPAA’s transmission security standard for “guarding against unauthorized access to electronic protected health information (EPHI) that is being transmitted over an electronic communications nework” may leave you a bit cold, especially the portion....

Turning Old Technology into New Systems

Author: Anderson, Ellen Miller

Source: Journal of AHIMA

Publication Date: November 2001


The need for updated technology rarely coincides with enough funds to purchase it. However, disparate technologies can be combined to meet information system needs without a major capital outlay. At Home Care Services, part of Group Health Cooperative (GHC) in Seattle, we created the On Call P....

Security @ the Edge

Author: Boroditsky, Marc

Source: In Confidence (newsletter)

Publication Date: November 02, 2000


With the pending impact of the Health Insurance Portability and Accountability Act (HIPAA) requirements and the high hopes for fully automated e-medical informatics, healthcare information professionals must gain an appreciation for the edge of their networks. More than ever before, the edge....

Ensuring Remote Coding Compliance

Author: Comfort, Angie

Source: Journal of AHIMA - Coding Notes

Publication Date: April 2012


More and more HIM department managers are turning to remote coding. However, before implementing this staffing model, managers must answer several questions regarding the privacy and security of patient information, including:
What are the compliance risks?
How will privacy and secu....

On the Line: Professional Practice Solutions

Author: Hughes, Gwen

Source: Journal of AHIMA

Publication Date: May 2001




Q: I understand that inexpensive password recovery software can allow an unauthorized user to recover or crack someone else's password. If passwords are that easy to crack, are they worthwhile?



Q: Does the new HIPAA privacy rule require hospitals to obtain patient....

HIM Metamorphosis

Author: Kalata, Marcia

Source: Journal of AHIMA

Publication Date: October 1998



Five years ago, if someone had told me my organization would construct a new building without a chart room and would require half as many medical record clerks and that coders would work without stacks of charts at their desks, I'd have thought they were from a different planet. But....

How Information Technology Supports Virtual HIM Departments

Author: Kohn, Deborah

Source: AHIMA eContent

Publication Date: March 02, 2009



Only in recent years has the widespread acceptance and use of computer systems and Internet-derived technologies allowed HIM departments of all types and sizes to be physically untethered from their organizations and exist virtually. From a technical perspective, an HIM department function....

[1] 2