Search Results

= Members only

Current search

573 results.

1 2 3 4 5 6 [7] 8 9 10 11 12

Creating Privacy Rule Implementation Efficiency

Author: Hughes, Gwen

Source: Journal of AHIMA

Publication Date: October 2002


Many HIM professionals will be called upon to perform an extraordinary feat during the next six months. They will be asked to bring one or more organizations into compliance with the HIPAA privacy rule by April 14, 2003. While this task is challenging in organizations that began such efforts a....

On the Line: Professional Practice Solutions

Author: Hughes, Gwen

Source: Journal of AHIMA

Publication Date: May 2001




Q: I understand that inexpensive password recovery software can allow an unauthorized user to recover or crack someone else's password. If passwords are that easy to crack, are they worthwhile?



Q: Does the new HIPAA privacy rule require hospitals to obtain patient....

HIPAA: It's Different for Manufacturers

Author: Humphrey, Heather L.

Source: Journal of AHIMA

Publication Date: February 2005


A few years ago, the Y2K crisis refocused the data world. Suddenly medical device manufacturers saw the inherent risks data brought to the business industry. What began with answering a simple question about date functionality quickly moved to conversations about personal information, its appr....

Countdown to Compliance: Privacy

Author: Ingram-Muhammad, Sybil

Source: Journal of AHIMA

Publication Date: February 2002


How far along the road to compliance with the HIPAA privacy regulation is your organization? This article tells you the steps you should be taking to get in compliance by the April 2003 deadline.

It is February 2002—14 months before your organization has to be compliant with th....

Oral Privacy and HIPAA: We Really Need to Talk

Author: Jacobs, Jodi

Source: In Confidence (newsletter)

Publication Date: June 02, 2003


Oral privacy is not a new need or requirement in healthcare. However, because it is now backed by a federal mandate, it is receiving newfound attention. With the passing of the April 14, 2003, deadline for HIPAA compliance, hospitals, pharmacies, clearinghouses, physician’s offices, military....

Stealth Software Deters PHI Theft

Author: Kawles, Terrance L.

Source: Journal of AHIMA

Publication Date: July 2003


As the leading edge of digital portability advances, the protections afforded the “portability” portion of HIPAA become strained. Under the final security standards, covered entities (CEs) must establish procedures and mechanisms to protect the confidentiality, integrity, and availab....

Safe at Home: Remote Coding Meets HIPAA

Author: Keough, Tim

Source: Journal of AHIMA

Publication Date: February 2004


Remote coding offers big benefits and unique security challenges. Here’s how one organization moves patient data securely across the Internet.

"Whatever, in connection with my professional practice, or not in connection with it, I see or hear, in the life of men, which ought....

Conducting a HIPAA Security Risk Assessment

Author: Klein, Jim

Source: AHIMA Convention

Publication Date: October 10, 2001


Introduction

Organizations covered under the Proposed Security Standards1 (the Draft Standard) are facing important regulatory compliance decisions for operational, technical, clinical, and administrative components of their enterprise. With the promulgation of the final Security Stand....

New Expedition Begins: Privacy Under HIPAA

Author: Kloss, Linda L

Source: Journal of AHIMA

Publication Date: February 2001




While all regulations under the Health Insurance Portability and Accountability Act (HIPAA) directly affect how we manage health information, the privacy regulations are central for HIM professionals. It has always been our privilege to serve as patient advocates for information priv....

Privacy -- an AHIMA Organizational Value

Author: Kloss, Linda L

Source: Journal of AHIMA

Publication Date: February 2003


Ten years ago, AHIMA drafted model federal legislation to protect confidential medical record information. We aimed to raise Congress’ awareness that protection for this most personal information was sorely lacking and that the absence of uniform legal protection was a barrier to the use....

HIPAA Electronic Data Interchange Transactions: The Impact on Healthcare Billing Processes with Special Emphasis on 837 Electronic Claims Transactions and 835 Electronic Remittance Transactions

Author: Kubas, Debbie; Buck, Shawna

Source: AHIMA Convention

Publication Date: October 21, 2005


Rules for HIPAA-compliant electronic transactions were finalized on October 16, 2000. The finalized HIPAA transaction standards required that claims filed electronically after October 16, 2002 (or after October 16, 2003, if you filed for an extension) had to be in the HIPAA-compliant electroni....

Performing a Baseline Security Assessment

Author: Lawson, Jayne W.

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
Performing a Baseline Security Assessment
Presented By Jayne W. Lawson, RHIA, Information Security Manager, Hartford Hospital Awareness and Accountability
Designate staff/team responsible for overseeing review process Determine sponsorship Educate h....

Is Your NPP Your Best Defense?

Author: Lee, Michael R.

Source: Journal of AHIMA

Publication Date: April 2003


In the event of a privacy-related legal challenge, the content of your organization’s notice of privacy practices (NPP) will be a focal point for both plaintiff and defense arguments with respect to the protected health information (PHI) disclosure activities of your organization. Is your....

Cybersecurity 101

Author: Lucci, Susan; Walsh, Tom

Source: Journal of AHIMA

Publication Date: November 2015



One of the most alarming statistics in the news, which is growing with intent and severity, is the prevalence of cyber-attacks, particularly in healthcare. It is an alarming trend that has gained a good deal of attention. For example, in July 2015, UCLA reported that up to 4.5 million pati....

HIPAA Changes Call for Revising BA Agreements

Author: McDavid, Jan P

Source: Journal of AHIMA

Publication Date: May 2013



Business associates (BAs) of HIPAA-covered entities like hospitals and doctor's offices should already be intimately acquainted with HIPAA's privacy and security regulations. BAs should already have business associate agreements with every covered entity with whom they work and assume resp....

Quick Take on Clearinghouses

Author: McLaughlin, Mark

Source: Journal of AHIMA

Publication Date: January 2001




HIPAA's provisions have brought healthcare clearinghouses into the spotlight. What is a clearinghouse, and how is its role affected by the new regulations? This article answers these questions.

A clearinghouse is typically used to collect, validate, and distribute insurance c....

Automation for Privacy and Security Compliance

Author: McLendon, Kelly

Source: Journal of AHIMA

Publication Date: March 2012


There has been a lack of enforcement of the privacy and security rules ever since HIPAA's inception. As such the adoption of comprehensive HIPAA compliance programs has lagged behind EHR development and implementation.

This in turn has caused little funding to be budgeted by provide....

Law Changes Patient Access to Clinical Lab Reports

Author: McLendon, Kelly

Source: Journal of AHIMA

Publication Date: October 2014



The US Department of Health and Human Services (HHS) continues to look for avenues to allow greater patient access to their own health information so that they may be more active in their healthcare management. HHS recently created final rules that remove the Clinical Laboratory Improveme....

Adapting BA Practices to Meet the Omnibus Rule

Author: McSteen, Thomas

Source: Journal of AHIMA

Publication Date: September 2013



The 2013 HIPAA Omnibus Rule marks a key milestone for implementation of the 2009 Health Information Technology for Economic and Clinical Health Act (HITECH). One of the most far-reaching impacts of HITECH and the Omnibus Rule is that business associates (BA) and their subcontractors now mu....

HIPAA Security Overview - Retired

Author: Miaoulis, William M

Source: AHIMA practice brief

Publication Date: November 2013


Editor’s note: This update replaces the April 2004 and the November 2010 practice briefs titled “A HIPAA Security Overview.”


The HIPAA security rule has remained unchanged since its implementation more than a decade ago. However, the Health Information Technology for Economic a....

HIPAA and Privacy: After the Compliance Date

Author: Mikels, Debbie

Source: AHIMA Convention

Publication Date: October 15, 2004

Abstract

This article reviews successful strategies in preparing for HIPAA Privacy compliance. There are ongoing challenges organizations will face after the compliance date, such as managing research issues, identifying all business associates, and managing the accounting of disclosures....

How an Integrated Delivery System Organized, Approached, and Monitored HIPAA Privacy Compliance: a Case Study

Author: Miller, Judith A.

Source: In Confidence (newsletter)

Publication Date: November 02, 2003


Advocate Health Care is a large, fully integrated not-for-profit healthcare delivery system in metropolitan Chicago. Many months prior to the April 14, 2003, deadline, Advocate began preparing for the HIPAA privacy compliance deadline.When April 14 arrived, Advocate’s associates and physician....

HIPAA Electronic Transactions

Author: Miller, Susan A

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
HIPAA Electronic Transactions
Presented by Susan A. Miller, Esquire, Corporate Regulatory & Compliance Manager, IDX Systems Company HIPAA Summary
Title II, Subtitle F—Administrative Simplification of the Health Insurance Portability and Accoun....

1 2 3 4 5 6 [7] 8 9 10 11 12