573 results.
1 2 3 4 5 [6] 7 8 9 10 11 12
HIPAA - Organizing the Effort
Author: Grant, Karen G.; Adair, Deborah A.
Source: AHIMA Convention
Publication Date: September 23, 2002
HIPAA Compliance for Clinician Texting
Author: Greene, Adam H
Source: Journal of AHIMA
Publication Date: April 2012
The HIPAA privacy and security rules need not act as an obstacle to efficient communications, but keeping texting compliant requires planning and diligence.
Text (or SMS) messaging has become nearly ubiquitous on mobile devices. According to one survey, approximately 72 perce....
HHS Steps up HIPAA Audits: Now Is the Time to Review Security Policies and Procedures
Author: Greene, Adam H
Source: Journal of AHIMA
Publication Date: October 2011
Now Is the Time to Review Security Policies and Procedures
In June 2011 the Department of Health and Human Services awarded KPMG a $9.2-million contract to create an audit protocol and audit organizational compliance with the HIPAA privacy and security requirements.1 The co....
OCR Clarifies Policy on Medical Record Request Fees
Author: Greene, Adam H
Source: Journal of AHIMA
Publication Date: April 2016
In 2009, CONGRESS passed the Health Information Technology for Economic and Clinical Health (HITECH) Act, which granted individuals a right to have a copy of their records sent to a third party, according to 42 U.S.C. § 17935(e) of the regulation.
Unfortunately, many attorn....
In the Wake of HIPAA: Where Have We Been and Where Will We Go From Here?
Author: Gross, Bradley
Source: AHIMA Convention
Publication Date: October 15, 2004
The Past
One of the most basic tenets of freedom is the right to privacy. Indeed, Americans can trace their privacy rights back to colonial times, when the framers of the Constitution declared that American citizens had the "right to personal security and security in [their] documents."....
HIPAA Compliance: State of the Art
Author: Guilfoy, Helene; Koss, Shannah; Fisher, Micheal
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
2000 HIPAA Conference Presentation
HIPAA Compliance: State of the Art
Presented by Helene Guilfoy, HIPAA Consultant, Insource Management Group
Shannah Koss, HIPAA National Practice Director, IBM Corp.
Micheal Fisher, Director HIPAA Solutions Group, DAOU Systems, Inc. Agenda
....
Taking Pages from Other Notebooks: What Lessons Can Chief Privacy Officers Learn from Other Industries?
Author: Hagland, Mark
Source: Journal of AHIMA
Publication Date: February 2002
HIM professionals are stepping up to the newly created role of privacy officer in many organizations. But privacy officers have been around for years in other industries. What can we learn from them about positioning this role?
Banking and financial services, telecommunications....
Journey of 1,000 Miles: Are Providers Really Ready for HIPAA's Privacy Requirements
Author: Hagland, Mark
Source: Journal of AHIMA
Publication Date: February 2001
Healthcare leaders say there’s no time to waste on serious compliance work, and HIM professionals will be at the heart of the action in this area.
Eunice Little isn’t nervous about HIPAA. After all, she and her colleagues at UCLA Medical Center in Los Angeles are in the small m....
Electronic Record, Electronic Security
Author: Hagland, Mark
Source: Journal of AHIMA
Publication Date: February 2004
New technologies are enhancing the ability to protect patient information. But there’s more to successful implementation than just what’s inside the box.
Melanie Schattauer, RHIA, Jack Obert, and their colleagues at Mercy St. John’s Health System in Springfield, M....
Practice Toolkit: Substance Abuse Treatment Programs
Author: Haines, Pamela T.
Source: Journal of AHIMA
Publication Date: March 2005
HIPAA’s privacy rule has heightened awareness about confidentiality of healthcare information among the general public. However, pockets of confusion still exist. Misunderstandings between healthcare providers and law enforcement officials (LEOs) abound about the laws governing protected....
Reconciling the Privacy Rule and Substance Abuse Record Confidentiality
Author: Haines, Pamela T.
Source: Journal of AHIMA
Publication Date: November 2004
According to the 2002 National Survey on Drug Use and Health, an estimated 22 million Americans age 12 and older were classified with substance dependence or abuse; that is 9.4 percent of the total US population. A new report from the Substance Abuse and Mental Health Services Administration (....
Special Considerations for Business Associate Agreements: Substance Abuse Treatment, Federal Law Present Challenges
Author: Haines, Pamela T.
Source: Journal of AHIMA
Publication Date: April 2004
If you are writing business associate agreements for a healthcare provider these days, you have probably discovered there are often no magic words or formulas that will produce an agreement. Although sample forms available from various sources may be helpful, generally no two business associat....
Complying with the Privacy Rule during a Disaster. Part 2: An Overview of Interim Management
Author: Halpert, Aviva M.
Source: Journal of AHIMA
Publication Date: May 2008
An HIM department’s disaster management plan is an iterative process with four identifiable phases that cycle continuously: plan development, back-up, recovery, and interim management. The first part of this series in the April 2008 issue provided an overview of plan development, data ba....
Complying with the Privacy Rule during a Disaster. Part 1: An Overview of Plan Development, Data Backup, and Recovery
Author: Halpert, Aviva M.
Source: Journal of AHIMA
Publication Date: April 2008
Disaster management for an HIM department is an iterative process with four identifiable phases that cycle continuously: plan development, back-up, recovery, and interim management. In subsequent iterations of the cycle, plan re-evaluation replaces plan development.
Regardless of wh....
New Standards Focus on Information Security
Author: Hanken, Mary Alice
Source: Journal of AHIMA
Publication Date: March 1998
The federal legislation for the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and the need in healthcare for security of confidential data have come together to heighten the interest in security standards for electronic health information systems. Th....
You Can't Throw IT in the Dumpster Anymore: Tips for Finding a Qualified Electronic Waste Disposal Service
Author: Harford, Joseph P.; Rizzo, Karen
Source: Journal of AHIMA
Publication Date: January 2006
One of the many challenges of the HIPAA age is handling the millions of outdated computers and associated peripheral devices. Once a back-burner issue, computer disposal is now front and center in the healthcare industry. The need to secure a health organization’s network goes well beyon....
Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
Author: Hash, Joan; Bowen, Pauline; Johnson, Arnold; Smith, Carla; Steinberg, Daniel
Source: Government (U.S.)
Publication Date: March 02, 2005
HIPAA Compliance in U.S. Hospitals: A Self-Report of Progress Toward the Security Rule
Author: Having, Karen; Davis, Diane C.
Source: Perspectives in Health Information Management
Publication Date: November 2005
Abstract
In January 2004, a random sampling of 1,000 U.S. hospitals was surveyed by researchers at a midwestern university to determine perceived level of compliance with the security requirements of the federal Health Insurance Portability and Accountability Act (HIPAA). Exa....
HIPAA's Place in Court-Ordered Discovery: Determining What's Legal During Litigation Health Record Requests
Author: Hedges, Ron; Brady, Kevin
Source: Journal of AHIMA
Publication Date: September 2014
Every Health information management (HIM) professional, lawyer, and healthcare consumer should be familiar with the Health Insurance Portability and Accountability Act (HIPAA). For healthcare consumers, HIPAA offers protections and rights of access to personal health information. For HIM....
Releasing Information of Deceased Patients
Author: Herrin, Barry S.
Source: Journal of AHIMA
Publication Date: January 2009
Developed when modern law concepts were first formed, the mortmain, or “dead hand,” rule prevented the church from exercising undue influence over a soon-to-be-dead penitent to obtain a gift of an individual’s lands in remission of his or her sins. These statutes evolved over....
Access Report: OCR Tries Subtraction through Addition in Accounting of Disclosure Rule
Author: Heubusch, Kevin
Source: Journal of AHIMA
Publication Date: July 2011
The Office for Civil Rights proposed rule on the HITECH modifications to the HIPAA accounting of disclosure provision contains an interesting attempt to balance the mandates of the statute with the realities of today's accountings.
OCR was faced with the difficult task of expanding a....
Too Much Privacy? OCR Proposes Easing Protections on Decedent Records
Author: Heubusch, Kevin
Source: Journal of AHIMA
Publication Date: September 2010
The HIPAA privacy rule generally conveys to individuals the same rights in death that they held in life. Two current proposals would change that, reducing the protections that covered entities currently must afford a deceased patient's record and easing access to decedent records by family....
On the HIPAA Hook
Author: Hicks, Andrew
Source: Journal of AHIMA
Publication Date: April 2014
Some healthcare business associates are still asking if HITECH-HIPAA impacts them. The answer is just as important to their affiliated healthcare providers.
Thousands of companies are now legally obligated to comply with the HITECH-HIPAA regulations because of their busines....
Patient Identity Integrity
Author: HIMSS Patient Identity Integrity Work Group
Source: External web site
Publication Date: December 02, 2009
Industry standards, interfaces, algorithms, unique identifiers, business processes, data accuracy, data quality, training, and medical devices are variables that influence the ability to build and sustain a database in a high state of identity integrity.
Controlling PHI Flowdown and Record Copying under HIPAA
Author: Hjort, Beth M.
Source: In Confidence (newsletter) | AHIMA Q and A
Publication Date: September 02, 2001
Q: I understand that HIPAA’s privacy rule sets up expectations for covered entities to help ensure that protected health information disclosed to business associates is restricted for redisclosure. How can covered entities control them?
A: The Department of Health and Human Services rea....
Consent for Uses and Disclosures of Information (2002 update)
Author: Hjort, Beth M.
Source: AHIMA practice brief
Publication Date: October 2002
This practice brief appendix has been retired. It is made available for historical purposes only.
HIPAA Privacy Checklist
Author: Hjort, Beth M.
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: June 2001
This practice brief has been retired. It is made available for historical purposes only.
Security Audits (2003 update)
Author: Hjort, Beth M.
Source: AHIMA practice brief
Publication Date: November 2003
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
HIPAA Privacy and Security Training (2003 update)
Author: Hjort, Beth M.
Source: AHIMA practice brief
Publication Date: November 2003
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
Understanding HIPAA Privacy Compliance Investigations
Author: Hjort, Beth M.
Source: In Confidence (newsletter)
Publication Date: June 02, 2003
Question: Under what circumstances would our organization be investigated for HIPAA privacy compliance?
Answer: The complaint investigation process will be complaint driven. The Department of Health and Human Services’ Office for Civil Rights (OCR), the enforcement body for the privacy....
Protecting Confidentiality in Healthcare Education Programs
Author: Hjort, Beth M.
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: September 2003
This practice brief has been retired. It is made available for historical purposes only.
Handling Release of Information Over the Phone
Author: Hjort, Beth M.
Source: In Confidence (newsletter)
Publication Date: November 02, 2003
Q: Hospitals must have sensitive yet confidential policies for handling concerned family and friends with questions about loved ones within their facilities. How can a covered entity (CE) be confident about appropriate telephone release of information when it’s so difficult to validate a call....
On the Line (October 2004)
Author: Hjort, Beth M.
Source: AHIMA Q and A | Journal of AHIMA
Publication Date: October 2004
Q: We are concerned about listing reported abuse cases on the accounting of disclosures (AoD) due to potential retaliation against an alleged victim or one who accompanies a victim for treatment. Is it acceptable to exclude abuse cases from the AoD?
A: Abuse cases pose special HIPAA....
HIPAA Privacy and Security Training (2002)
Author: Hjort, Beth M.
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: April 2002
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
Understanding the Minimum Necessary Standard (2003 update)
Author: Hjort, Beth M.; Hughes, Gwen
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: March 2003
This practice brief has been retired. It is made available for historical purposes only.
Healthcare Breach Management: Business Associate Agreement Addendum
Author: Hjort, Beth M.; Rhodes, Harry B.
Source: AHIMA Advocacy and Policy
Publication Date: January 22, 2010
Putting It in Writing: Updating BA Agreements to Cover Breach Notification
Author: Hjort, Beth M.; Rhodes, Harry B.
Source: Journal of AHIMA
Publication Date: June 2010
When ARRA extended sections of the HIPAA privacy and security rules to cover business associates (BAs), it created a seismic shift in their contractual relationships with covered entities (CEs). Further, the changes became effective simultaneous with other ARRA amendments that require CEs and....
HIPAA Audit and System Activity Review: Developing a Process that Focuses on the Greatest Risks First
Author: Hofler, Linda D.; Hardee, Joy; Dildy, Kenneth; Burleson, Deeanna; Grady, Jamie
Source: Journal of AHIMA
Publication Date: March 2005
The privacy and security rules require audits and system activity reviews. Here is one health system's process, a systematic approach that focuses on areas of greatest risk.
Ensuring the privacy and confidentiality of patient information is fundamental to HIM, but it has taken on a new le....
Privacy After Death
Author: Hofman, Judi
Source: Journal of AHIMA
Publication Date: April 2013
Due to new HIPAA rules, HIM must strike an appropriate privacy balance when releasing decedent records
Answering the Call: Meeting Medical Privacy Training Requirements
Author: Hubbartt, William S.
Source: In Confidence (newsletter)
Publication Date: March 02, 2003
Over the past two years, health information managers have been involved in planning and implementing workplace changes in anticipation of the medical privacy requirements of HIPAA. One of those compliance requirements is to provide employee training.
Organizations subject to HIPAA must....
Preemption of the HIPAA Privacy Rule (2002)
Author: Hughes, Gwen
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: February 2002
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
Required Content for Authorizations to Disclose (2002 update)
Author: Hughes, Gwen
Source: AHIMA practice brief
Publication Date: October 2002
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
Notice of Information Practices (2001)
Author: Hughes, Gwen
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: May 2001
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
Getting Your Arms Around HIPAA
Author: Hughes, Gwen
Source: Journal of AHIMA
Publication Date: April 2001
Have you read the new HIPAA final privacy rules yet? Are you overwhelmed? I've been spending a lot of time poring over the privacy rules and I've seen many similarities between the new privacy rules and the Uniform Health Information Act (UHIA) passed in Washington and Montana about....
Managing Exceptions to HIPAA's Patient Access Rule
Author: Hughes, Gwen
Source: Journal of AHIMA
Publication Date: October 2001
The HIPAA final privacy rule requires that covered entities allow individuals to access the medical and billing records maintained about them. However, the rule describes 10 exceptions. Accordingly, healthcare providers must establish a way to identify the medical and billing records....
Release of Information for Marketing or Fund-Raising Purposes (2001)
Author: Hughes, Gwen
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: May 2001
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
Simple Steps to Tracking Disclosures
Author: Hughes, Gwen
Source: Journal of AHIMA
Publication Date: July 2002
The many exceptions to the HIPAA privacy rules accounting of disclosures standard make it difficult to determine what must be tracked. Although the rule gives patients the right to receive an accounting of disclosures of their health information, it lists several exceptions. This article....
Redisclosure of Patient Health Information (2001)
Author: Hughes, Gwen
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: September 2001
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
Defining the Designated Record Set
Author: Hughes, Gwen
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: January 2003
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
Understanding the Privacy Rule's Amendments
Author: Hughes, Gwen
Source: Journal of AHIMA
Publication Date: November 2002
By now you know that amendments to the final privacy rule were published in the August 14, 2002, Federal Register. The amendments are intended to correct problems identified in the original privacy rule published on December 28, 2000.
This article presents a summary of some of....
1 2 3 4 5 [6] 7 8 9 10 11 12