Search Results

= Members only

Current search

573 results.

<< 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 [23]

HIPAA Identifier Update

Author: Emerson, Mary

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
HIPAA Identifier Update

Presented by Mary Emerson, HCFA

SCOPE OF IDENTIFIER STANDARDS
Standard Unique Health Identifiers and allowed uses for Health Care Provider Health Plan Employer Individual

PROVIDER IDENTIFIER NPR....

Kaiser Permanente Approach

Author: Cooper, Ted

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
Organizing the Effort
Case Study: The Kaiser Permanente Approach
Presented by Ted Cooper, MD, National Director, Confidentiality & Security, Kaiser Permanente Kaiser Permanente
Kaiser Foundation Health Plan Kaiser Foundation Hospitals Region....

What's Next?

Author: Braithwaite, Bill

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
What's Next?
Presented by Bill Braithwaite, MD, PhD, FACMI, Senior Advisor on Health Information Policy, US Dept. Of HSS Hospital Systems Affected
Laboratory Pharmacy Radiology Registration (ADT) Orders Results Data Warehouse Management Master Perso....

Transactions Standards

Author: Braithwaite, Bill

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
Transactions Standards

Presented by Bill Braithwaite, MD, PhD, FACMI, Senior Advisor on Health Information Policy, US Dept. of HSS
Transaction Standards
NPRM published in 1998 (5/7/98 - 7/6/98) Adopts ASC X12N standards for transactions (e....

HIPAA Electronic Transactions

Author: Miller, Susan A

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
HIPAA Electronic Transactions
Presented by Susan A. Miller, Esquire, Corporate Regulatory & Compliance Manager, IDX Systems Company HIPAA Summary
Title II, Subtitle F—Administrative Simplification of the Health Insurance Portability and Accoun....

Fundamentals for the Newly Initiated

Author: Amatayakul, Margret

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
Fundamentals for the Newly Initiated
Margret Amatayakul, Margret\A Consulting, LLC Session Objectives
Get an overview of the original legislation, processes, and timelines Examine the scope and impact of the new regulations Review ongoing HIPAA impl....

Lessons Learned from a Security Assessment

Author: Cummings, Judy

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
Lessons Learned from a Security Assessment
Presented by Judy Cummings, Senior Manager, Strategic Development
Sharp Healthcare Information Systems Presentation Overview
After this presentation, you will know these things about a security assessm....

Information Security

Author: Tang, Paul C.

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
Information Security
Presented by Paul Tang, MD Information Systems Security
NRC Definition Security is the protection of information systems against unauthorized access to or modification of information, whether in storage, processing, or transit,....

Conference Handouts

Author: AHIMA

Source: HIPAA Conference 2000

Publication Date: March 13, 2000






 

Conference Handouts


If you weren't able to attend the HIPAA Conference in March, you can review the text of handouts and presentations provided at the sessions.

....

AHIMA Comments on Privacy Rule

Author: Asmonga, Donald D.

Source: Journal of AHIMA

Publication Date: March 2000


On January 18, 2000, AHIMA submitted comments to the Department of Health and Human Services (HHS) on the proposed rule for 45 Code of Federal Regulations (CFR), Parts 160 through 164: "Standards for Privacy of Individually Identifiable Health Information." The proposed rule....

By the Rules: Making Security Policies Stick

Author: Zender, Anne

Source: Journal of AHIMA

Publication Date: October 1999


Considerable attention has been paid to the development of organizationwide information security policies—especially what they should contain and how they should be put in place. But enforcing these policies isn't always easy. We asked four information security experts to give us....

Unique Patient Identifiers -- What Are the Options?

Author: Appavu, Soloman I.

Source: Journal of AHIMA

Publication Date: October 1999


HIPAA has brought patient identifiers into the spotlight. But what's the best option? The author of a national study offers an overview.
Envision all of the players in the healthcare system—patients, providers, health plans, and payers. Now, envision all of the day-to-day processes t....

New Standards Focus on Information Security

Author: Hanken, Mary Alice

Source: Journal of AHIMA

Publication Date: March 1998


The federal legislation for the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and the need in healthcare for security of confidential data have come together to heighten the interest in security standards for electronic health information systems. Th....

<< 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 [23]