Search Results

= Members only

Current search

573 results.

<< 8 9 [10] 11 12 13 14 15 16 17 18 19 20 21 22 23

On the Line (October 2004)

Author: Hjort, Beth M.

Source: AHIMA Q and A | Journal of AHIMA

Publication Date: October 2004


Q: We are concerned about listing reported abuse cases on the accounting of disclosures (AoD) due to potential retaliation against an alleged victim or one who accompanies a victim for treatment. Is it acceptable to exclude abuse cases from the AoD?

A: Abuse cases pose special HIPAA....

Does the Privacy Rule Hinder Patient Care?

Author: Burrington-Brown, Jill

Source: Journal of AHIMA

Publication Date: October 2004


When covered entities implemented the HIPAA privacy rule more than a year ago, the intention was to strengthen patient privacy protection and improve provider access to information, thereby improving quality of care. At times that can be a difficult balancing act.

The mainstream and....

Managing HIPAA as Gatekeeper

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: September 2004


An unfortunate result of the HIPAA privacy rule is the emerging use of HIPAA as a gatekeeper, restricting the appropriate fl ow of protected health information (PHI). HIPAA is being cited as a reason not to disclose information without patient permission when needed for treatment, payment, or....

Kick Starting the Security Risk Analysis

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: July 2004


Many covered entities are just now starting to approach the compliance aspects of the HIPAA security rule. Why discuss “compliance aspects” and not standards or controls, as we did when preparing for the privacy rule? Privacy and security are long-standing concepts to healthcare,....

Updated Toolkit for Security Strategies

Author: Cooper, Ted

Source: Journal of AHIMA

Publication Date: July 2004


The first version of the Computer-based Patient Record Institute (CPRI) toolkit “Managing Information Security in Health Care” was published on the Web in May 1999 in response to the proposed HIPAA security and electronic signature standard of October 1998. The toolkit is intended....

Primer on Encryption

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: June 2004


Encryption is an addressable implementation specification under HIPAA’s access control and transmission security standards. Many providers are grappling with just how to address these specifications:
Is there a difference between the two specifications, and if so, what is the diff....

HIPAA Security Shopping List (HIPAA on the Job)

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: May 2004


Many information security officials are barraged with requests for the latest security tools. Such shopping lists often do not reflect a structured plan or a true risk analysis to justify their cost or human resource requirements. This column describes some of the latest tools, how you can ev....

2004 HIPAA Privacy & Security Compliance Survey

Author: AHIMA

Source: AHIMA

Publication Date: April 12, 2004

The results of a survey conducted by AHIMA to assess the current state of HIPAA privacy within the healthcare industry. These results are being released in conjunction with the first annual National Health Information Privacy and Security Week.

Preparing for the Next Big April

Author: Thomason, Mary

Source: Journal of AHIMA

Publication Date: April 2004


Yesterday’s privacy compliance preparations can contribute to meeting tomorrow’s security mandates. One organization is tackling risk analysis with both matrix and memories.
The 2003 HIPAA privacy rule implementation is still fresh in many minds throughout healthcare organiza....

Security Awareness: The Right Messages

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: April 2004


How many of you have warned your e-mail users about “phishers”—e-mail that appears to come from a trusted source asking the recipient to click on a link to update personal details? But the site is really a fake, and the e-mail is a scam to steal personal information.

<< 8 9 [10] 11 12 13 14 15 16 17 18 19 20 21 22 23