Search Results

= Members only

Current search

573 results.

1 2 3 4 5 6 7 8 [9] 10 11 12 13 14 15 16 >>

HIPAA Marches On--Or Does It?

Author: Rode, Dan

Source: Journal of AHIMA

Publication Date: March 2005


HIPAA has taught us that standardization is hard. When the act was signed into law in 1996, the optimists among us believed that within four years the healthcare industry would be using a variety of uniform national administrative transactions, most associated with what we now call the revenue....

Reporting Security Incidents

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: March 2005


HIPAA requires covered entities “implement policies and procedures to address security incidents.” There is one implementation specification: to “identify and respond to suspected or known security incidents; mitigate, to the extent practical, harmful effects of security inci....

Safeguarding ePHI from Fire the Dry Way

Author: Brown, Karen

Source: Journal of AHIMA

Publication Date: March 2005


With HIPAA’s security rule compliance date right around the corner, many HIM professionals are still trying to determine if they have adequate safeguards in place to ensure the confidentiality, integrity, and availability of electronic protected health information (ePHI).

Many....

HIPAA Audit and System Activity Review: Developing a Process that Focuses on the Greatest Risks First

Author: Hofler, Linda D.; Hardee, Joy; Dildy, Kenneth; Burleson, Deeanna; Grady, Jamie

Source: Journal of AHIMA

Publication Date: March 2005


The privacy and security rules require audits and system activity reviews. Here is one health system's process, a systematic approach that focuses on areas of greatest risk.
Ensuring the privacy and confidentiality of patient information is fundamental to HIM, but it has taken on a new le....

Practice Toolkit: Substance Abuse Treatment Programs

Author: Haines, Pamela T.

Source: Journal of AHIMA

Publication Date: March 2005


HIPAA’s privacy rule has heightened awareness about confidentiality of healthcare information among the general public. However, pockets of confusion still exist. Misunderstandings between healthcare providers and law enforcement officials (LEOs) abound about the laws governing protected....

HIPAA: It's Different for Manufacturers

Author: Humphrey, Heather L.

Source: Journal of AHIMA

Publication Date: February 2005


A few years ago, the Y2K crisis refocused the data world. Suddenly medical device manufacturers saw the inherent risks data brought to the business industry. What began with answering a simple question about date functionality quickly moved to conversations about personal information, its appr....

Making Amendments Meaningful

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: February 2005


Now that we’re well entrenched in compliance with the privacy rule and headed toward the electronic health record (EHR), the personal health record (PHR), and regional health information organizations (RHIOs), amendments may seem like a mundane topic. But, as this article explains, it is....

Access Controls: Striking the Right Balance

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: January 2005


As healthcare organizations put the finishing touches on their HIPAA security compliance plans, many are finding that updating access controls is not easy. Clinicians often scoff at the word “control” in general and at “access control” in particular. Not all products ar....

What is Security Auditing?

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: November 2004


The HIPAA security rule includes a requirement for audit controls and to monitor and manage ongoing security for a variety of processes. But the requirement for internal audit was changed to “information security activity review,” and there is no other specific reference to auditin....

Journal Q&A (11/04)

Author: AHIMA Professional Practice Team

Source: AHIMA Q and A

Publication Date: November 02, 2004


Q: As a covered entity, do I need to have satisfactory assurance (as required by HIPAA) that an individual has been notified when I am served with a search warrant for a patient's protected health information (PHI)?
A: No. A search warrant is issued by a judge and is considered the same a....

HIPAA and Privacy: After the Compliance Date

Author: Mikels, Debbie

Source: AHIMA Convention

Publication Date: October 15, 2004

Abstract

This article reviews successful strategies in preparing for HIPAA Privacy compliance. There are ongoing challenges organizations will face after the compliance date, such as managing research issues, identifying all business associates, and managing the accounting of disclosures....

Trouble with Audit Controls

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: October 2004


The 2004 Phoenix Health System/HIMSS HIPAA compliance survey indicates that providers find audit controls the most difficult of the HIPAA security standards to implement.
While it is recognized that every organization must conduct a risk analysis to determine the systems or activities th....

1 2 3 4 5 6 7 8 [9] 10 11 12 13 14 15 16 >>