Search Results

= Members only

Current search

573 results.

1 2 [3] 4 5 6 7 8 9 10 11 12

Managing HIPAA as Gatekeeper

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: September 2004


An unfortunate result of the HIPAA privacy rule is the emerging use of HIPAA as a gatekeeper, restricting the appropriate fl ow of protected health information (PHI). HIPAA is being cited as a reason not to disclose information without patient permission when needed for treatment, payment, or....

Security Awareness: The Right Messages

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: April 2004


How many of you have warned your e-mail users about “phishers”—e-mail that appears to come from a trusted source asking the recipient to click on a link to update personal details? But the site is really a fake, and the e-mail is a scam to steal personal information.

Making Amendments Meaningful

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: February 2005


Now that we’re well entrenched in compliance with the privacy rule and headed toward the electronic health record (EHR), the personal health record (PHR), and regional health information organizations (RHIOs), amendments may seem like a mundane topic. But, as this article explains, it is....

Fundamentals for the Newly Initiated

Author: Amatayakul, Margret

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
Fundamentals for the Newly Initiated
Margret Amatayakul, Margret\A Consulting, LLC Session Objectives
Get an overview of the original legislation, processes, and timelines Examine the scope and impact of the new regulations Review ongoing HIPAA impl....

Unique Patient Identifiers -- What Are the Options?

Author: Appavu, Soloman I.

Source: Journal of AHIMA

Publication Date: October 1999


HIPAA has brought patient identifiers into the spotlight. But what's the best option? The author of a national study offers an overview.
Envision all of the players in the healthcare system—patients, providers, health plans, and payers. Now, envision all of the day-to-day processes t....

The Year That Was and the Year to Be

Author: Asmonga, Donald D.

Source: Journal of AHIMA

Publication Date: February 2011


The second session of the 111th Congress began with the Democrats in firm control of the House and Senate. Working from their position of power enabled the Democrats to pass healthcare reform.

Although Congress was mired in contentious debates, AHIMA still advocated for its public po....

Industry Awaits Phase 2 of HIPAA Audit Program

Author: Asmonga, Donald D.

Source: Journal of AHIMA

Publication Date: January 2015



The wait for the second round of mandated privacy and security audits from the Department of Health and Human Services’ (HHS) Office for Civil Rights (OCR) continues. OCR is currently working through final details for the revised audit plan as they await finalization of new technolog....

AHIMA Comments on Privacy Rule

Author: Asmonga, Donald D.

Source: Journal of AHIMA

Publication Date: March 2000


On January 18, 2000, AHIMA submitted comments to the Department of Health and Human Services (HHS) on the proposed rule for 45 Code of Federal Regulations (CFR), Parts 160 through 164: "Standards for Privacy of Individually Identifiable Health Information." The proposed rule....

Smart Training on Privacy and Security (expanded version)

Author: Bacik, Sandy

Source: Journal of AHIMA

Publication Date: April 2010



There is plenty of privacy and security training to be done, and many trainers struggle to get resources from their organizations and attention from their audiences. Sandy Bacik, CISSP, ISSMP, CISM, CGEIT, is a principal consultant at EnerNex and a former chief security officer. Here she o....

Smart Training on Privacy and Security

Author: Bacik, Sandy

Source: Journal of AHIMA

Publication Date: July 2010


ARRA's modifications to the HIPAA privacy and security rules are setting off a new round of training in facilities large and small. Trainers must fit the new training into existing schedules that already include organizational policies and procedures, HIPAA, and other regulations such as the R....

CPT Category III Codes Cover New, Emerging Technologies: New Codes Developed to Address Issues in Light of HIPAA

Author: Beebe, Michael

Source: Journal of AHIMA - Coding Notes

Publication Date: October 2003


In 1998, the American Medical Association (AMA) initiated the CPT-5 Project. This project was a broad-based and comprehensive effort to make needed and practical enhancements to the CPT code set that would address challenges presented by emerging user needs and HIPAA. One of the initiatives tha....

Security @ the Edge

Author: Boroditsky, Marc

Source: In Confidence (newsletter)

Publication Date: November 02, 2000


With the pending impact of the Health Insurance Portability and Accountability Act (HIPAA) requirements and the high hopes for fully automated e-medical informatics, healthcare information professionals must gain an appreciation for the edge of their networks. More than ever before, the edge....

Breach Notification Triggers Receive Update

Author: Bowen, Rita K.

Source: Journal of AHIMA - website

Publication Date: April 2013



The HIPAA Omnibus Rule, the new Final Rule modifying HIPAA, was published in the Federal Register on January 25, 2013. The amended rule went into effect on March 26 and full compliance is expected by September 23. For HIM professionals, the most far-reaching of the changes to HIPAA is that....

1 2 [3] 4 5 6 7 8 9 10 11 12