Search Results

= Members only

Current search

573 results.

1 2 3 4 5 [6] 7 8 9 10 11 12

HIPAA Compliance for Clinician Texting

Author: Greene, Adam H

Source: Journal of AHIMA

Publication Date: April 2012



The HIPAA privacy and security rules need not act as an obstacle to efficient communications, but keeping texting compliant requires planning and diligence.

Text (or SMS) messaging has become nearly ubiquitous on mobile devices. According to one survey, approximately 72 perce....

OCR Clarifies Policy on Medical Record Request Fees

Author: Greene, Adam H

Source: Journal of AHIMA

Publication Date: April 2016



In 2009, CONGRESS passed the Health Information Technology for Economic and Clinical Health (HITECH) Act, which granted individuals a right to have a copy of their records sent to a third party, according to 42 U.S.C. § 17935(e) of the regulation.


Unfortunately, many attorn....

Electronic Record, Electronic Security

Author: Hagland, Mark

Source: Journal of AHIMA

Publication Date: February 2004


New technologies are enhancing the ability to protect patient information. But there’s more to successful implementation than just what’s inside the box.

Melanie Schattauer, RHIA, Jack Obert, and their colleagues at Mercy St. John’s Health System in Springfield, M....

Practice Toolkit: Substance Abuse Treatment Programs

Author: Haines, Pamela T.

Source: Journal of AHIMA

Publication Date: March 2005


HIPAA’s privacy rule has heightened awareness about confidentiality of healthcare information among the general public. However, pockets of confusion still exist. Misunderstandings between healthcare providers and law enforcement officials (LEOs) abound about the laws governing protected....

New Standards Focus on Information Security

Author: Hanken, Mary Alice

Source: Journal of AHIMA

Publication Date: March 1998


The federal legislation for the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and the need in healthcare for security of confidential data have come together to heighten the interest in security standards for electronic health information systems. Th....

Releasing Information of Deceased Patients

Author: Herrin, Barry S.

Source: Journal of AHIMA

Publication Date: January 2009


Developed when modern law concepts were first formed, the mortmain, or “dead hand,” rule prevented the church from exercising undue influence over a soon-to-be-dead penitent to obtain a gift of an individual’s lands in remission of his or her sins. These statutes evolved over....

On the HIPAA Hook

Author: Hicks, Andrew

Source: Journal of AHIMA

Publication Date: April 2014



Some healthcare business associates are still asking if HITECH-HIPAA impacts them. The answer is just as important to their affiliated healthcare providers.


Thousands of companies are now legally obligated to comply with the HITECH-HIPAA regulations because of their busines....

Handling Release of Information Over the Phone

Author: Hjort, Beth M.

Source: In Confidence (newsletter)

Publication Date: November 02, 2003


Q: Hospitals must have sensitive yet confidential policies for handling concerned family and friends with questions about loved ones within their facilities. How can a covered entity (CE) be confident about appropriate telephone release of information when it’s so difficult to validate a call....

On the Line (October 2004)

Author: Hjort, Beth M.

Source: AHIMA Q and A | Journal of AHIMA

Publication Date: October 2004


Q: We are concerned about listing reported abuse cases on the accounting of disclosures (AoD) due to potential retaliation against an alleged victim or one who accompanies a victim for treatment. Is it acceptable to exclude abuse cases from the AoD?

A: Abuse cases pose special HIPAA....

HIPAA Audit and System Activity Review: Developing a Process that Focuses on the Greatest Risks First

Author: Hofler, Linda D.; Hardee, Joy; Dildy, Kenneth; Burleson, Deeanna; Grady, Jamie

Source: Journal of AHIMA

Publication Date: March 2005


The privacy and security rules require audits and system activity reviews. Here is one health system's process, a systematic approach that focuses on areas of greatest risk.
Ensuring the privacy and confidentiality of patient information is fundamental to HIM, but it has taken on a new le....

Getting Your Arms Around HIPAA

Author: Hughes, Gwen

Source: Journal of AHIMA

Publication Date: April 2001




Have you read the new HIPAA final privacy rules yet? Are you overwhelmed? I've been spending a lot of time poring over the privacy rules and I've seen many similarities between the new privacy rules and the Uniform Health Information Act (UHIA) passed in Washington and Montana about....

Managing Exceptions to HIPAA's Patient Access Rule

Author: Hughes, Gwen

Source: Journal of AHIMA

Publication Date: October 2001




The HIPAA final privacy rule requires that covered entities allow individuals to access the medical and billing records maintained about them. However, the rule describes 10 exceptions. Accordingly, healthcare providers must establish a way to identify the medical and billing records....

Simple Steps to Tracking Disclosures

Author: Hughes, Gwen

Source: Journal of AHIMA

Publication Date: July 2002


The many exceptions to the HIPAA privacy rule’s accounting of disclosures standard make it difficult to determine what must be tracked. Although the rule gives patients the right to receive an accounting of disclosures of their health information, it lists several exceptions. This article....

Understanding the Privacy Rule's Amendments

Author: Hughes, Gwen

Source: Journal of AHIMA

Publication Date: November 2002


By now you know that amendments to the final privacy rule were published in the August 14, 2002, Federal Register. The amendments are intended to correct problems identified in the original privacy rule published on December 28, 2000.


This article presents a summary of some of....

1 2 3 4 5 [6] 7 8 9 10 11 12