886 results.
[1] 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 >>
10 Security Domains (2004)
Author: Dougherty, Michelle
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: February 2004
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
10 Security Domains (2010 Update)
Author: AHIMA
Source: AHIMA practice brief
Publication Date: February 2010
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
10 Security Domains (2011 update)
Author: AHIMA
Source: AHIMA practice brief
Publication Date: July 2011
This is the original web version of the practice brief, published in the May 2012 Journal of AHIMA. This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
10 Security Domains (2012 update)
Author: AHIMA
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: May 2012
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
2008 HIMSS Security Survey
Author:
Source: External web site
Publication Date: October 28, 2008
This report provides the results of a survey of IT and security professionals addressing security environments in healthcare organizations, including access to patient data, tracking and audit logs, network security, and medical identity theft.
2009 HIMSS Security Survey
Author: HIMSS
Source: External web site
Publication Date: November 03, 2009
This study addressed security enviroments, including access to patient data, access tracking and audit logs, and medical identity theft, as well as preparedness and approaches for meeting new privacy and security requirements contained in ARRA.
8 Steps to Success in ICD-10-CM/PCS Mapping: Best Practices to Establish Precise Mapping Between Old and New ICD Code Sets
Author: De, Suman
Source: Journal of AHIMA
Publication Date: June 2012
Just as drivers must select the proper road map for planning a trip, healthcare organizations must also manage their code translation process through a defined road map.
This article provides essential guidance to healthcare organizations on adopting best practices that will....
Access Audit Trails: En Route to Security
Author: Halpert, Aviva M.
Source: Journal of AHIMA
Publication Date: September 2000
An electronic access audit trail can be an effective security tool if the right conditions are in place. In this article, learn how to ensure that your organization has the right technology, procedures, mechanisms, and plans to implement an audit trail.
Working with healthcare informatio....
Accessing and Using Data from Wearable Fitness Devices
Author: Rhodes, Harry B.
Source: Journal of AHIMA
Publication Date: September 2014
A rapidly aging global population in many industrialized countries accompanied by an increase in chronic diseases and the high cost of managing such diseases has led many to turn to a technological solution to ease the burden on healthcare professionals and provide useful tools to the elde....
Access: the Missing HIM Practice Element (Resolution)
Author: AHIMA House of Delegates
Source: Journal of AHIMA | AHIMA HoD Resolution
Publication Date: January 1998
Resolution from the 1997 House of Delegates
[1] 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 >>