Search Results

= Members only

Current search

573 results.

<< 8 9 10 11 12 [13] 14 15 16 17 18 19 20 21 22 23

Creating Privacy Rule Implementation Efficiency

Author: Hughes, Gwen

Source: Journal of AHIMA

Publication Date: October 2002


Many HIM professionals will be called upon to perform an extraordinary feat during the next six months. They will be asked to bring one or more organizations into compliance with the HIPAA privacy rule by April 14, 2003. While this task is challenging in organizations that began such efforts a....

On the Line: Professional Practice Solutions

Author: Hughes, Gwen

Source: Journal of AHIMA

Publication Date: May 2001




Q: I understand that inexpensive password recovery software can allow an unauthorized user to recover or crack someone else's password. If passwords are that easy to crack, are they worthwhile?



Q: Does the new HIPAA privacy rule require hospitals to obtain patient....

HIPAA: It's Different for Manufacturers

Author: Humphrey, Heather L.

Source: Journal of AHIMA

Publication Date: February 2005


A few years ago, the Y2K crisis refocused the data world. Suddenly medical device manufacturers saw the inherent risks data brought to the business industry. What began with answering a simple question about date functionality quickly moved to conversations about personal information, its appr....

Countdown to Compliance: Privacy

Author: Ingram-Muhammad, Sybil

Source: Journal of AHIMA

Publication Date: February 2002


How far along the road to compliance with the HIPAA privacy regulation is your organization? This article tells you the steps you should be taking to get in compliance by the April 2003 deadline.

It is February 2002—14 months before your organization has to be compliant with th....

Oral Privacy and HIPAA: We Really Need to Talk

Author: Jacobs, Jodi

Source: In Confidence (newsletter)

Publication Date: June 02, 2003


Oral privacy is not a new need or requirement in healthcare. However, because it is now backed by a federal mandate, it is receiving newfound attention. With the passing of the April 14, 2003, deadline for HIPAA compliance, hospitals, pharmacies, clearinghouses, physician’s offices, military....

Stealth Software Deters PHI Theft

Author: Kawles, Terrance L.

Source: Journal of AHIMA

Publication Date: July 2003


As the leading edge of digital portability advances, the protections afforded the “portability” portion of HIPAA become strained. Under the final security standards, covered entities (CEs) must establish procedures and mechanisms to protect the confidentiality, integrity, and availab....

Safe at Home: Remote Coding Meets HIPAA

Author: Keough, Tim

Source: Journal of AHIMA

Publication Date: February 2004


Remote coding offers big benefits and unique security challenges. Here’s how one organization moves patient data securely across the Internet.

"Whatever, in connection with my professional practice, or not in connection with it, I see or hear, in the life of men, which ought....

Conducting a HIPAA Security Risk Assessment

Author: Klein, Jim

Source: AHIMA Convention

Publication Date: October 10, 2001


Introduction

Organizations covered under the Proposed Security Standards1 (the Draft Standard) are facing important regulatory compliance decisions for operational, technical, clinical, and administrative components of their enterprise. With the promulgation of the final Security Stand....

New Expedition Begins: Privacy Under HIPAA

Author: Kloss, Linda L

Source: Journal of AHIMA

Publication Date: February 2001




While all regulations under the Health Insurance Portability and Accountability Act (HIPAA) directly affect how we manage health information, the privacy regulations are central for HIM professionals. It has always been our privilege to serve as patient advocates for information priv....

Privacy -- an AHIMA Organizational Value

Author: Kloss, Linda L

Source: Journal of AHIMA

Publication Date: February 2003


Ten years ago, AHIMA drafted model federal legislation to protect confidential medical record information. We aimed to raise Congress’ awareness that protection for this most personal information was sorely lacking and that the absence of uniform legal protection was a barrier to the use....

<< 8 9 10 11 12 [13] 14 15 16 17 18 19 20 21 22 23