Search Results

= Members only

Current search

573 results.

1 2 3 4 5 6 7 8 9 [10] 11 12

HIPAA: 43,691 Privacy Complaints and Counting

Author: AHIMA

Source: Journal of AHIMA

Publication Date: June 2009


For those wondering what progress the Office for Civil Rights makes as it works through HIPAA privacy rule complaints, the numbers are easy to find. Each month OCR reports top-line results of the HIPAA cases it has received and resolved.

OCR has logged approximately 43,700 complaints....

CMS’s 2009 Security Assessment Process

Author: Dinh, Angela K.

Source: Journal of AHIMA

Publication Date: September 2009


In 2008 the Centers for Medicare and Medicaid Services (CMS) conducted 10 HIPAA security assessments in covered entities (CEs) nationwide. CMS’s stated purpose was not to identify flaws but to gain a true understanding of industry compliance with the HIPAA security rule.

CMS co....

Accounting of Disclosures: ARRA’s Impact

Author: Rhodes, Harry B.

Source: AHIMA Convention

Publication Date: October 05, 2009


The accounting of disclosures requirement is one of the most difficult HIPAA privacy rule compliance issues to implement. Following the August 2002 modifications to the privacy rule requirements, the accounting for disclosures requirement has stood out as the HIPAA requirement demanding the big....

Few Requests for Today’s Accountings

Author: AHIMA

Source: Journal of AHIMA

Publication Date: February 2010


HIPAA’s Accounting of Disclosure Provisions Led to Few Patient Requests; Now ARRA Is Upping the Ante

Provisions within the American Recovery and Reinvestment Act extend HIPAA’s accounting of disclosure regulations for providers who maintain electronic health records. The provisions a....

Smart Training on Privacy and Security (expanded version)

Author: Bacik, Sandy

Source: Journal of AHIMA

Publication Date: April 2010



There is plenty of privacy and security training to be done, and many trainers struggle to get resources from their organizations and attention from their audiences. Sandy Bacik, CISSP, ISSMP, CISM, CGEIT, is a principal consultant at EnerNex and a former chief security officer. Here she o....

Smart Training on Privacy and Security

Author: Bacik, Sandy

Source: Journal of AHIMA

Publication Date: July 2010


ARRA's modifications to the HIPAA privacy and security rules are setting off a new round of training in facilities large and small. Trainers must fit the new training into existing schedules that already include organizational policies and procedures, HIPAA, and other regulations such as the R....

A First Peek at the Privacy Regulations

Author: AHIMA

Source: Journal of AHIMA

Publication Date: August 2010


The office for Civil Rights got a late start on the HITECH privacy regulations (due last February), and it's clear from the draft rule it released in July that the office still has almost as many questions as answers on how to enact the HITECH provisions. However, the release does offer a good....

The Year That Was and the Year to Be

Author: Asmonga, Donald D.

Source: Journal of AHIMA

Publication Date: February 2011


The second session of the 111th Congress began with the Democrats in firm control of the House and Senate. Working from their position of power enabled the Democrats to pass healthcare reform.

Although Congress was mired in contentious debates, AHIMA still advocated for its public po....

HIPAA Violation? Sue Me

Author: AHIMA

Source: Journal of AHIMA

Publication Date: March 2011


This is a true story that occurred recently in Indiana. Failing to collect payment for treatment, a medical group sent a patient to collections. In providing the unpaid bills to the collections attorney, practice staff failed to redact sensitive information. When the attorney filed the bills wi....

Low-Tech Threats in a High-Tech World

Author: Rollins, Genna

Source: Journal of AHIMA - website

Publication Date: April 2011



Despite the rise of health IT, healthcare providers still face daily privacy and security risks of the mundane variety—paper records are misplaced, improperly disclosed, or released without confidential information redacted. No matter the opportunities and risks that technology bring....

1 2 3 4 5 6 7 8 9 [10] 11 12