573 results.
1 2 3 4 5 6 [7] 8 9 10 11 12 13 14 15 16 >>
Overview of the Health Information Portabilty And Accountability Act
Author: Braithwaite, Bill
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
2000 HIPAA Conference Presentation
Overview of the Health Information Portabilty And Accountability Act
Presented by Bill Braitwaite, MD, PhD, FACMI Administrative Simplification
The Health Insurance Portability and Accountability Act of 1996 (AKA “HIPAA” AKA “K2”) Signed August 21,....
What's Next?
Author: Braithwaite, Bill
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
2000 HIPAA Conference Presentation
What's Next?
Presented by Bill Braithwaite, MD, PhD, FACMI, Senior Advisor on Health Information Policy, US Dept. Of HSS Hospital Systems Affected
Laboratory Pharmacy Radiology Registration (ADT) Orders Results Data Warehouse Management Master Perso....
Transactions Standards
Author: Braithwaite, Bill
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
2000 HIPAA Conference Presentation
Transactions Standards
Presented by Bill Braithwaite, MD, PhD, FACMI, Senior Advisor on Health Information Policy, US Dept. of HSS
Transaction Standards
NPRM published in 1998 (5/7/98 - 7/6/98) Adopts ASC X12N standards for transactions (e....
ABC Medical Center Return Of Invalid Authorization for Release of Information
Author: Brandt, Mary D.
Source: AHIMA sample form
Publication Date: June 14, 2005
Sample form for sending to patient when critical information missing from the patient-submitted authorization form for release of information.
Checklist For Disclosures To Law Enforcement Officers
Author: Brandt, Mary D.
Source: AHIMA sample form
Publication Date: June 14, 2005
"Need to Know" Access: Meeting HIPAA's Minimum Necessary Requirements
Author: Brandt, Mary D.
Source: In Confidence (newsletter)
Publication Date: February 02, 2002
Since the final HIPAA privacy regulations were published, there’s been a lot of discussion about “minimum necessary” requirements. Under the regulations, healthcare providers and payers must make reasonable efforts to limit the use or disclosure of protected health information to the minimum....
Law Enforcement Request For Records
Author: Brandt, Mary D.
Source: AHIMA sample form
Publication Date: June 14, 2005
HIPAA Security Standards: Working With Your Information Technology Vendors
Author: Brandt, Mary D.
Source: AHIMA Convention
Publication Date: October 10, 2001
"Information security? I don't need to worry about that. My information technology (IT) vendor will take care of it."
You probably haven't made this comment, but I've heard it many times. It would certainly be convenient if we could delegate responsibility for secur....
Organizing the Effort: Facing HIPAA or Why Today Is Like Y2K
Author: Brantley, Alton
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
2000 HIPAA Conference Presentation
Organizing the Effort
Facing HIPAA or Why Today Is Like Y2K
Presented by Alton Brantley, MD, CIO, MedStar Health Systems Background: Lessons of Y2K
Y2K processes worked! Study and Strategize Create Awareness Perform an assessment Analyze the as....
Running out of Room for Data: HIPAA Requires Healthcare Organizations to Re-assess Data Storage
Author: Brick, Frank
Source: Journal of AHIMA
Publication Date: April 2006
Computer systems are feeling the effects of HIPAA. That's because the act's privacy and security rules require covered entities to securely store and manage more data than ever before. The latest computers to feel the effect are those in small covered entities, where the security rule takes ef....
Shifting from Reactive to Proactive HIPAA Audits
Author: Brinda, Danika
Source: Journal of AHIMA
Publication Date: January 2016
Stories about workforce members inappropriately accessing health information continue to plague the Department of Health and Human Services’ Data Breach Portal—which lists US provider data breaches that affect more than 500 individuals. Recently two data breaches reported on th....
Code Sets
Author: Brooks, Patricia E.
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
2000 HIPAA Conference Presentation
Code Sets
Presented by Pat Brooks, RHIA
HCFA Standards for Electronic Transactions
HCFA-0149-P Published May 7, 1998 Final not yet published To be enacted 2 years after final notice (3 years for small plans)
Proposed Initial Standards for....
At Close Range: Protecting Privacy Through Proximity Access Control
Author: Brostoff, George
Source: In Confidence (newsletter)
Publication Date: May 02, 2000
What if a healthcare workstation could automatically recognize who was requesting access to its information and resources? What if users could be positively identified by simply approaching the workstation, or if workstations “knew” when authorized employees walked away, instantly closing con....
Safeguarding ePHI from Fire the Dry Way
Author: Brown, Karen
Source: Journal of AHIMA
Publication Date: March 2005
With HIPAA’s security rule compliance date right around the corner, many HIM professionals are still trying to determine if they have adequate safeguards in place to ensure the confidentiality, integrity, and availability of electronic protected health information (ePHI).
Many....
HIPAA Security: Don't Disband the Committee Just Yet
Author: Brown, Stephen C.
Source: Journal of AHIMA
Publication Date: May 2005
By now, every healthcare organization has faced the initial security compliance responsibilities associated with HIPAA. However, the compliance road has not yet been fully traveled. The nature of the rule makes compliance a recursive effort of reassessment, continual auditing, regular educatio....
Regulations Governing Research (2003)
Author: Burrington-Brown, Jill
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: March 2003
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
Understanding Disclosures for Confidential Communications
Author: Burrington-Brown, Jill
Source: In Confidence (newsletter) | AHIMA Q and A
Publication Date: March 02, 2003
Question: May physicians’ offices or pharmacists leave messages for patients at their homes. Can providers mail appointment or prescription refill reminders to patient homes?
Answer: Yes. The rule does not prohibit covered entities (CEs) from leaving messages for patients on their answe....
On the Line: Professional Practice Solutions
Author: Burrington-Brown, Jill
Source: Journal of AHIMA
Publication Date: January 2002
Q: A couple were on vacation in my city when the husband suddenly became ill and died in our facility. The wife requested copies of the record to take home with her. She had listed herself as next of kin. Was it correct to give her a copy of the record?
Q: I am a manager of several d....
Does the Privacy Rule Hinder Patient Care?
Author: Burrington-Brown, Jill
Source: Journal of AHIMA
Publication Date: October 2004
When covered entities implemented the HIPAA privacy rule more than a year ago, the intention was to strengthen patient privacy protection and improve provider access to information, thereby improving quality of care. At times that can be a difficult balancing act.
The mainstream and....
On the Line: Professional Practice Solutions
Author: Burrington-Brown, Jill
Source: Journal of AHIMA
Publication Date: July 2002
Q: I work in a clinic setting. An attorney has requested copies of a patient's entire record. The record includes reports dictated by one of the clinic physicians at a local hospital during the patient's hospitalization. The attorney has the patient's permission. Are we allowed under HIPAA to....
Sorting Out Employee Sanctions
Author: Burrington-Brown, Jill
Source: Journal of AHIMA
Publication Date: June 2003
Has your organization addressed sanctions related to privacy and security issues? Both the final privacy rule and final security rule address this issue. The privacy rule states that the covered entity must have and apply appropriate sanctions against members of its workforce who fail to....
On the Line: Professional Practice Solutions (10/03)
Author: Burrington-Brown, Jill
Source: AHIMA Q and A | Journal of AHIMA
Publication Date: October 2003
Q: Does the privacy rule allow us to release patient information over the telephone without authorization? How do I decide when I should ask for verification of a treatment relationship with the patient?
A: In the past, HIM professionals have carefully guarded the releasing of patient i....
Making Amendments to Health Records (2017 Update)
Author: Burton, Ben; Downing, Katherine
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: April 2017
Editor’s Note: This Practice Brief update supplants part of the 2013 Practice Brief “Patient Access and Amendment to Health Records.”
Before April 2003, a patient’s legal right to amend his or her health records was limited to those patients treated at hea....
Information Release to Patient Families and Caregivers: What Does HITECH/HIPAA Actually Say?
Author: Butler, Mary
Source: Journal of AHIMA - website
Publication Date: July 01, 2016
One of the most important objectives of the HIPAA Privacy Rule—and the HITECH Act in particular—was to ensure that consumers have easy and affordable access to their own protected health information. The regulations also clarified how and when medical information about a patien....
Making HIPAA Work for You: Discussing Record Access (and More) for Consumers
Author: Butler, Mary
Source: Journal of AHIMA - website
Publication Date: August 01, 2016
The US Department of Health and Human Services (HHS) has taken many steps to try and clear up consumer confusion regarding the more consumer-centric aspects of HIPAA’s Privacy Rule and Security Rule. The most recent efforts include the Office of the National Coordinator’s Patien....
1 2 3 4 5 6 [7] 8 9 10 11 12 13 14 15 16 >>