Search Results

= Members only

Current search

573 results.

1 2 3 4 5 6 7 [8] 9 10 11 12 13 14 15 16 >>

HIPAA Breach Enforcement Roundup

Author: Cacciatore, Victoria; Downing, Katherine

Source: Journal of AHIMA

Publication Date: July 2014



Criminal attacks on healthcare systems have risen 100 percent since 2010, according to a recent Ponemon study.1 This makes it obvious that the privacy and security of patient health information is vulnerable and highly susceptible to data breach. The HIPAA Breach Notification Rule became e....

Leading the HIPAA Privacy Risk Assessment

Author: Callahan-Dennis, Jill

Source: AHIMA Convention

Publication Date: October 10, 2001




Introduction and Background

As part of their preparations for compliance with the Health Insurance Portability and Accountability Act (HIPAA), healthcare organizations need to compare their current information-handling and information-disclosure practices to the requirement....

New Tool Streamlines HIPAA Assessment Process

Author: Cohen, Kathleen

Source: In Confidence (newsletter)

Publication Date: August 02, 2003


How are you making sure that your organization is complying with the HIPAA privacy regulations? Many hospitals are doing HIPAA rounds with privacy officers, going from unit to unit to assess and document HIPAA compliance. But trying to make sense of the data collected during HIPAA rounds can....

Kaiser Permanente Approach

Author: Cooper, Ted

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
Organizing the Effort
Case Study: The Kaiser Permanente Approach
Presented by Ted Cooper, MD, National Director, Confidentiality & Security, Kaiser Permanente Kaiser Permanente
Kaiser Foundation Health Plan Kaiser Foundation Hospitals Region....

Updated Toolkit for Security Strategies

Author: Cooper, Ted

Source: Journal of AHIMA

Publication Date: July 2004


The first version of the Computer-based Patient Record Institute (CPRI) toolkit “Managing Information Security in Health Care” was published on the Web in May 1999 in response to the proposed HIPAA security and electronic signature standard of October 1998. The toolkit is intended....

Lessons Learned from a Security Assessment

Author: Cummings, Judy

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
Lessons Learned from a Security Assessment
Presented by Judy Cummings, Senior Manager, Strategic Development
Sharp Healthcare Information Systems Presentation Overview
After this presentation, you will know these things about a security assessm....

1 2 3 4 5 6 7 [8] 9 10 11 12 13 14 15 16 >>