Search Results

= Members only

Current search

53 results.

[1] 2 3 4 5 6

Quest for Managing Cyberthreats in Healthcare

Author: Carey, Susan

Source: Journal of AHIMA

Publication Date: May 2017



So far 2017 is shaping up to be the year of fear in the realm of healthcare cybersecurity. There was a 61 percent increase in healthcare cyberattacks in 2016. This followed two years of steadily increasing cyberthreats in healthcare, including 93 major cyberattacks in 2016 resulting in com....

How Small Organizations Handle HIPAA Compliance

Author: Primeau, Debra

Source: Journal of AHIMA

Publication Date: April 2017



Smaller healthcare facilities typically lack the resources and expertise to address the constant flow of competing priorities, forcing leadership to wear many hats in a fragmented environment. Few have a designated privacy, security, or compliance officer, let alone the corporate support s....

DIY Privacy Risk Assessments

Author: Butler, Mary

Source: Journal of AHIMA - website

Publication Date: November 2015


The HIM Problem


Completing regular privacy risk assessments is one of the most proactive ways of preventing healthcare privacy breaches. However, finding helpful tools for these assessments is hard to come by.


The HIM Problem Solver: Sharon Lewis, MBA, RHIA, CHPS, CP....

Cybersecurity 101

Author: Lucci, Susan; Walsh, Tom

Source: Journal of AHIMA

Publication Date: November 2015



One of the most alarming statistics in the news, which is growing with intent and severity, is the prevalence of cyber-attacks, particularly in healthcare. It is an alarming trend that has gained a good deal of attention. For example, in July 2015, UCLA reported that up to 4.5 million pati....

Industry Awaits Phase 2 of HIPAA Audit Program

Author: Asmonga, Donald D.

Source: Journal of AHIMA

Publication Date: January 2015



The wait for the second round of mandated privacy and security audits from the Department of Health and Human Services’ (HHS) Office for Civil Rights (OCR) continues. OCR is currently working through final details for the revised audit plan as they await finalization of new technolog....

Prepare Now for Meaningful Use Attestation and Compliance Audits

Author: Warner, Diana

Source: Journal of AHIMA

Publication Date: March 2014

A warning issued in 2013 by the Centers for Medicare and Medicaid Services (CMS) has come to pass. “Meaningful use” Electronic Health Record (EHR) Incentive Program audits have begun. The College of Healthcare Information Management Executives (CHIME) reported that out of their 1,400 member organizations, almost 100 received audit notices in October 2013, totaling six percent of membership. In order to protect incentive payments earned through the meaningful use program, organizations need to be prepared for every audit contingency and know exactly what to expect. Organizations also need to avoid common mistakes that could lead to an audit and follow best practices for staying compliant to meaningful use standards.

The 10 Security Domains (Updated 2013) - Retired

Author: AHIMA

Source: AHIMA practice brief

Publication Date: October 2013


Editor's note: This update supersedes the February 2004, February 2010, and May 2012 practice briefs "The 10 Security Domains."


In today's healthcare environment, HIM professionals must understand basic information security principles to fully protect the privacy of information. T....

De-identification and the Sharing of Big Data

Author: White, Susan E

Source: Journal of AHIMA

Publication Date: April 2013



One of the newest buzz words in data analytics is “Big Data,” and the data created through the healthcare industry is some of the “biggest” around. The widespread implementation of electronic health records (EHRs) and the need to share data to measure quality and ma....

[1] 2 3 4 5 6