Search Results

= Members only

Current search

573 results.

1 2 [3] 4 5 6 7 8

What's Next?

Author: Braithwaite, Bill

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
What's Next?
Presented by Bill Braithwaite, MD, PhD, FACMI, Senior Advisor on Health Information Policy, US Dept. Of HSS Hospital Systems Affected
Laboratory Pharmacy Radiology Registration (ADT) Orders Results Data Warehouse Management Master Perso....

Transactions Standards

Author: Braithwaite, Bill

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
Transactions Standards

Presented by Bill Braithwaite, MD, PhD, FACMI, Senior Advisor on Health Information Policy, US Dept. of HSS
Transaction Standards
NPRM published in 1998 (5/7/98 - 7/6/98) Adopts ASC X12N standards for transactions (e....

Shifting from Reactive to Proactive HIPAA Audits

Author: Brinda, Danika

Source: Journal of AHIMA

Publication Date: January 2016



Stories about workforce members inappropriately accessing health information continue to plague the Department of Health and Human Services’ Data Breach Portal—which lists US provider data breaches that affect more than 500 individuals. Recently two data breaches reported on th....

Code Sets

Author: Brooks, Patricia E.

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
Code Sets
Presented by Pat Brooks, RHIA
HCFA Standards for Electronic Transactions
HCFA-0149-P Published May 7, 1998 Final not yet published To be enacted 2 years after final notice (3 years for small plans)
Proposed Initial Standards for....

Safeguarding ePHI from Fire the Dry Way

Author: Brown, Karen

Source: Journal of AHIMA

Publication Date: March 2005


With HIPAA’s security rule compliance date right around the corner, many HIM professionals are still trying to determine if they have adequate safeguards in place to ensure the confidentiality, integrity, and availability of electronic protected health information (ePHI).

Many....

HIPAA Security: Don't Disband the Committee Just Yet

Author: Brown, Stephen C.

Source: Journal of AHIMA

Publication Date: May 2005


By now, every healthcare organization has faced the initial security compliance responsibilities associated with HIPAA. However, the compliance road has not yet been fully traveled. The nature of the rule makes compliance a recursive effort of reassessment, continual auditing, regular educatio....

On the Line: Professional Practice Solutions

Author: Burrington-Brown, Jill

Source: Journal of AHIMA

Publication Date: January 2002


Q: A couple were on vacation in my city when the husband suddenly became ill and died in our facility. The wife requested copies of the record to take home with her. She had listed herself as next of kin. Was it correct to give her a copy of the record?

Q: I am a manager of several d....

Does the Privacy Rule Hinder Patient Care?

Author: Burrington-Brown, Jill

Source: Journal of AHIMA

Publication Date: October 2004


When covered entities implemented the HIPAA privacy rule more than a year ago, the intention was to strengthen patient privacy protection and improve provider access to information, thereby improving quality of care. At times that can be a difficult balancing act.

The mainstream and....

On the Line: Professional Practice Solutions

Author: Burrington-Brown, Jill

Source: Journal of AHIMA

Publication Date: July 2002


Q: I work in a clinic setting. An attorney has requested copies of a patient's entire record. The record includes reports dictated by one of the clinic physicians at a local hospital during the patient's hospitalization. The attorney has the patient's permission. Are we allowed under HIPAA to....

Sorting Out Employee Sanctions

Author: Burrington-Brown, Jill

Source: Journal of AHIMA

Publication Date: June 2003


Has your organization addressed sanctions related to privacy and security issues? Both the final privacy rule and final security rule address this issue. The privacy rule states that the covered entity must “have and apply appropriate sanctions against members of its workforce who fail to....

HIPAA Breach Enforcement Roundup

Author: Cacciatore, Victoria; Downing, Katherine

Source: Journal of AHIMA

Publication Date: July 2014



Criminal attacks on healthcare systems have risen 100 percent since 2010, according to a recent Ponemon study.1 This makes it obvious that the privacy and security of patient health information is vulnerable and highly susceptible to data breach. The HIPAA Breach Notification Rule became e....

Leading the HIPAA Privacy Risk Assessment

Author: Callahan-Dennis, Jill

Source: AHIMA Convention

Publication Date: October 10, 2001




Introduction and Background

As part of their preparations for compliance with the Health Insurance Portability and Accountability Act (HIPAA), healthcare organizations need to compare their current information-handling and information-disclosure practices to the requirement....

New Tool Streamlines HIPAA Assessment Process

Author: Cohen, Kathleen

Source: In Confidence (newsletter)

Publication Date: August 02, 2003


How are you making sure that your organization is complying with the HIPAA privacy regulations? Many hospitals are doing HIPAA rounds with privacy officers, going from unit to unit to assess and document HIPAA compliance. But trying to make sense of the data collected during HIPAA rounds can....

Kaiser Permanente Approach

Author: Cooper, Ted

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
Organizing the Effort
Case Study: The Kaiser Permanente Approach
Presented by Ted Cooper, MD, National Director, Confidentiality & Security, Kaiser Permanente Kaiser Permanente
Kaiser Foundation Health Plan Kaiser Foundation Hospitals Region....

Updated Toolkit for Security Strategies

Author: Cooper, Ted

Source: Journal of AHIMA

Publication Date: July 2004


The first version of the Computer-based Patient Record Institute (CPRI) toolkit “Managing Information Security in Health Care” was published on the Web in May 1999 in response to the proposed HIPAA security and electronic signature standard of October 1998. The toolkit is intended....

Lessons Learned from a Security Assessment

Author: Cummings, Judy

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
Lessons Learned from a Security Assessment
Presented by Judy Cummings, Senior Manager, Strategic Development
Sharp Healthcare Information Systems Presentation Overview
After this presentation, you will know these things about a security assessm....

HIPAA: Preemption of State Laws

Author: Demuro, Paul

Source: AHIMA Convention

Publication Date: October 10, 2001




I. Preemption of State Laws

The general rule is that a standard, requirement, or implementation specification adopted under HIPAA that is contrary to a provision of state law preempts or supersedes the provision of State law. 45 CFR §160.203.

Contrary, when used....

New Privacy Officer's Game Plan

Author: Dennis, Jill Callahan

Source: Journal of AHIMA

Publication Date: February 2001




The HIPAA-mandated privacy officer role offers a new opportunity for HIM professionals. What skills are required, and what needs to be done first? This article answers these questions.
As healthcare organizations roll out their plans for HIPAA implementation, many HIM profession....

Clearing the HIPAA Cobwebs: New ONC Chief Privacy Officer Lucia Savage Focuses on Balancing Privacy and Security with Expanding Interoperable EHR Exchange

Author: Dimick, Chris

Source: Journal of AHIMA

Publication Date: April 2015



The spiders of time have been hard at work on the US healthcare privacy and security rules, to the point that their place in health IT interoperability has become fogged and is inhibiting their proper role in the meaningful exchange of health information, according to Lucia Savage, JD, th....

Reviewing the New HIPAA Rules

Author: Dimick, Chris

Source: AHIMA regulation analysis | Journal of AHIMA

Publication Date: March 2013



At 138 fine-print pages, the final rule detailing the HITECH Act’s modifications to HIPAA privacy and security requirements is not a quick or easy read. But it is an important read since the content of the Federal Register post drastically impacts HIM professionals and their business....

The New Privacy Officer

Author: Dimick, Chris

Source: Journal of AHIMA

Publication Date: April 2012



It has been a decade since the first privacy officers took their jobs in response to the HIPAA privacy rule. A slew of changes since then have added more responsibility, required more skills, and demanded more time of them than anyone could have imagined.

When Nancy Davis, R....

CMS’s 2009 Security Assessment Process

Author: Dinh, Angela K.

Source: Journal of AHIMA

Publication Date: September 2009


In 2008 the Centers for Medicare and Medicaid Services (CMS) conducted 10 HIPAA security assessments in covered entities (CEs) nationwide. CMS’s stated purpose was not to identify flaws but to gain a true understanding of industry compliance with the HIPAA security rule.

CMS co....

It's Time to Finalize Your Privacy Policies

Author: Dougherty, Michelle

Source: Journal of AHIMA

Publication Date: November 2002


You've attended seminars, read articles, outlined systems, and developed forms for implementing the privacy rule, but there is still one step left--actually writing the policies and procedures. For many practitioners, policies and procedures are important but are often put off, then forgotten.....

On the Line: Professional Practice Solutions

Author: Dougherty, Michelle

Source: Journal of AHIMA

Publication Date: November 2001


Q: Where can I find the updated data elements and data definitions for the Uniform Hospital Discharge Data Set (UHDDS)?

Q: Where can I find an easy-to-use glossary for terms in the HIPAA regulations?

Michelle Dougherty (michelle.dougherty@ahima.org) is an HIM practice manager....

Early Word on HIPAA Claims Attachments

Author: Dougherty, Michelle

Source: Journal of AHIMA

Publication Date: October 2001


If we could look into a crystal ball and see into the future, it would be much easier to prepare for HIPAA, particularly the electronic transaction standards. Because of the rarity of crystal balls these days, we must rely on other predictors at our disposal, such as the white paper issued by t....

Changing Face of Public Health Reporting

Author: Dougherty, Michelle

Source: Journal of AHIMA

Publication Date: April 2002


In recent months, anthrax outbreaks and concern over bioterrorism threats have created a greater need for the US to have a system to monitor and report public health information in a timely manner. The Centers for Disease Control and Prevention (CDC) are developing standards for a new approach....

1 2 [3] 4 5 6 7 8