Search Results

= Members only

Current search

573 results.

<< 8 9 10 11 12 [13] 14 15 16 17 18 19 20 21 22 23

Handling Release of Information Over the Phone

Author: Hjort, Beth M.

Source: In Confidence (newsletter)

Publication Date: November 02, 2003


Q: Hospitals must have sensitive yet confidential policies for handling concerned family and friends with questions about loved ones within their facilities. How can a covered entity (CE) be confident about appropriate telephone release of information when it’s so difficult to validate a call....

How an Integrated Delivery System Organized, Approached, and Monitored HIPAA Privacy Compliance: a Case Study

Author: Miller, Judith A.

Source: In Confidence (newsletter)

Publication Date: November 02, 2003


Advocate Health Care is a large, fully integrated not-for-profit healthcare delivery system in metropolitan Chicago. Many months prior to the April 14, 2003, deadline, Advocate began preparing for the HIPAA privacy compliance deadline.When April 14 arrived, Advocate’s associates and physician....

HIPAA and the EHR: Making Technical Safeguard Changes

Author: Fodor, Joseph

Source: Journal of AHIMA

Publication Date: January 2004


As electronic health records (EHRs) become more commonplace in healthcare, changes, adjustments, and improvements will be inevitable. When designing, implementing, upgrading, or remediating an EHR system, your organization’s implementation team should consider the impact of complying wit....

Journal Q&A (2/04)

Author: AHIMA Professional Practice Team

Source: AHIMA Q and A

Publication Date: February 02, 2004

Q: Can you explain the difference between the terms “addressable” and “required” as they are used in the final security rule?
A: The final security rule and the privacy rule use the terms “standards” and “implementation specifications.” Standards....

Debate Surrounding Unique Health Identifier Continues

Author: Wheatley, Victoria

Source: Journal of AHIMA

Publication Date: February 2004


Whatever happened to the unique health identifier for individuals (UHI)? The UHI was one of four identifiers included in HIPAA. In July 1998 the Department of Health and Human Services (HHS) and the former Health Care Financing Administration (now the Centers for Medicare and Medicaid Services....

Safe at Home: Remote Coding Meets HIPAA

Author: Keough, Tim

Source: Journal of AHIMA

Publication Date: February 2004


Remote coding offers big benefits and unique security challenges. Here’s how one organization moves patient data securely across the Internet.

"Whatever, in connection with my professional practice, or not in connection with it, I see or hear, in the life of men, which ought....

Electronic Record, Electronic Security

Author: Hagland, Mark

Source: Journal of AHIMA

Publication Date: February 2004


New technologies are enhancing the ability to protect patient information. But there’s more to successful implementation than just what’s inside the box.

Melanie Schattauer, RHIA, Jack Obert, and their colleagues at Mercy St. John’s Health System in Springfield, M....

Security Awareness: The Right Messages

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: April 2004


How many of you have warned your e-mail users about “phishers”—e-mail that appears to come from a trusted source asking the recipient to click on a link to update personal details? But the site is really a fake, and the e-mail is a scam to steal personal information.

<< 8 9 10 11 12 [13] 14 15 16 17 18 19 20 21 22 23