Search Results

= Members only

Current search

573 results.

1 2 3 [4] 5 6 7 8 9 10 11 12

What's Next?

Author: Braithwaite, Bill

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
What's Next?
Presented by Bill Braithwaite, MD, PhD, FACMI, Senior Advisor on Health Information Policy, US Dept. Of HSS Hospital Systems Affected
Laboratory Pharmacy Radiology Registration (ADT) Orders Results Data Warehouse Management Master Perso....

Transactions Standards

Author: Braithwaite, Bill

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
Transactions Standards

Presented by Bill Braithwaite, MD, PhD, FACMI, Senior Advisor on Health Information Policy, US Dept. of HSS
Transaction Standards
NPRM published in 1998 (5/7/98 - 7/6/98) Adopts ASC X12N standards for transactions (e....

Shifting from Reactive to Proactive HIPAA Audits

Author: Brinda, Danika

Source: Journal of AHIMA

Publication Date: January 2016



Stories about workforce members inappropriately accessing health information continue to plague the Department of Health and Human Services’ Data Breach Portal—which lists US provider data breaches that affect more than 500 individuals. Recently two data breaches reported on th....

Code Sets

Author: Brooks, Patricia E.

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
Code Sets
Presented by Pat Brooks, RHIA
HCFA Standards for Electronic Transactions
HCFA-0149-P Published May 7, 1998 Final not yet published To be enacted 2 years after final notice (3 years for small plans)
Proposed Initial Standards for....

Safeguarding ePHI from Fire the Dry Way

Author: Brown, Karen

Source: Journal of AHIMA

Publication Date: March 2005


With HIPAA’s security rule compliance date right around the corner, many HIM professionals are still trying to determine if they have adequate safeguards in place to ensure the confidentiality, integrity, and availability of electronic protected health information (ePHI).

Many....

HIPAA Security: Don't Disband the Committee Just Yet

Author: Brown, Stephen C.

Source: Journal of AHIMA

Publication Date: May 2005


By now, every healthcare organization has faced the initial security compliance responsibilities associated with HIPAA. However, the compliance road has not yet been fully traveled. The nature of the rule makes compliance a recursive effort of reassessment, continual auditing, regular educatio....

On the Line: Professional Practice Solutions

Author: Burrington-Brown, Jill

Source: Journal of AHIMA

Publication Date: January 2002


Q: A couple were on vacation in my city when the husband suddenly became ill and died in our facility. The wife requested copies of the record to take home with her. She had listed herself as next of kin. Was it correct to give her a copy of the record?

Q: I am a manager of several d....

Does the Privacy Rule Hinder Patient Care?

Author: Burrington-Brown, Jill

Source: Journal of AHIMA

Publication Date: October 2004


When covered entities implemented the HIPAA privacy rule more than a year ago, the intention was to strengthen patient privacy protection and improve provider access to information, thereby improving quality of care. At times that can be a difficult balancing act.

The mainstream and....

On the Line: Professional Practice Solutions

Author: Burrington-Brown, Jill

Source: Journal of AHIMA

Publication Date: July 2002


Q: I work in a clinic setting. An attorney has requested copies of a patient's entire record. The record includes reports dictated by one of the clinic physicians at a local hospital during the patient's hospitalization. The attorney has the patient's permission. Are we allowed under HIPAA to....

Sorting Out Employee Sanctions

Author: Burrington-Brown, Jill

Source: Journal of AHIMA

Publication Date: June 2003


Has your organization addressed sanctions related to privacy and security issues? Both the final privacy rule and final security rule address this issue. The privacy rule states that the covered entity must “have and apply appropriate sanctions against members of its workforce who fail to....

HIPAA Breach Enforcement Roundup

Author: Cacciatore, Victoria; Downing, Katherine

Source: Journal of AHIMA

Publication Date: July 2014



Criminal attacks on healthcare systems have risen 100 percent since 2010, according to a recent Ponemon study.1 This makes it obvious that the privacy and security of patient health information is vulnerable and highly susceptible to data breach. The HIPAA Breach Notification Rule became e....

Leading the HIPAA Privacy Risk Assessment

Author: Callahan-Dennis, Jill

Source: AHIMA Convention

Publication Date: October 10, 2001




Introduction and Background

As part of their preparations for compliance with the Health Insurance Portability and Accountability Act (HIPAA), healthcare organizations need to compare their current information-handling and information-disclosure practices to the requirement....

New Tool Streamlines HIPAA Assessment Process

Author: Cohen, Kathleen

Source: In Confidence (newsletter)

Publication Date: August 02, 2003


How are you making sure that your organization is complying with the HIPAA privacy regulations? Many hospitals are doing HIPAA rounds with privacy officers, going from unit to unit to assess and document HIPAA compliance. But trying to make sense of the data collected during HIPAA rounds can....

Kaiser Permanente Approach

Author: Cooper, Ted

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
Organizing the Effort
Case Study: The Kaiser Permanente Approach
Presented by Ted Cooper, MD, National Director, Confidentiality & Security, Kaiser Permanente Kaiser Permanente
Kaiser Foundation Health Plan Kaiser Foundation Hospitals Region....

Updated Toolkit for Security Strategies

Author: Cooper, Ted

Source: Journal of AHIMA

Publication Date: July 2004


The first version of the Computer-based Patient Record Institute (CPRI) toolkit “Managing Information Security in Health Care” was published on the Web in May 1999 in response to the proposed HIPAA security and electronic signature standard of October 1998. The toolkit is intended....

Lessons Learned from a Security Assessment

Author: Cummings, Judy

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
Lessons Learned from a Security Assessment
Presented by Judy Cummings, Senior Manager, Strategic Development
Sharp Healthcare Information Systems Presentation Overview
After this presentation, you will know these things about a security assessm....

1 2 3 [4] 5 6 7 8 9 10 11 12