Search Results

= Members only

Current search

573 results.

1 2 3 4 5 [6] 7 8

Making Your Data Warehouse HIPAA Compliant

Author: Reinke, Brian

Source: In Confidence (newsletter)

Publication Date: July 02, 2002


Now a proven technology, data warehousing is entering into widespread use. Detailed patient records of many organizations are now being electronically archived using data warehousing. The goal of using this computer technology is to retain information for years so it can be used for various m....

Accounting of Disclosures: ARRA’s Impact

Author: Rhodes, Harry B.

Source: AHIMA Convention

Publication Date: October 05, 2009


The accounting of disclosures requirement is one of the most difficult HIPAA privacy rule compliance issues to implement. Following the August 2002 modifications to the privacy rule requirements, the accounting for disclosures requirement has stood out as the HIPAA requirement demanding the big....

HIPAA's New Mandate for Psychotherapy Notes

Author: Rhodes, Harry B.

Source: Behavioral Health

Publication Date: July 02, 2001


The new HIPAA privacy final rule mandate that affords a higher level of privacy restriction to psychotherapy notes is creating a fair amount of confusion for healthcare providers. Restricted access to mental health records should not be something new to health information management profession....

High Cost of Privacy

Author: Rhodes, Harry B.

Source: In Confidence (newsletter)

Publication Date: January 02, 2001


Cost: how much money needs to be invested? By now, most of us have discussed the implementation of the Health Insurance Portability and Accountability Act (HIPAA) final rules with our administrators, and naturally the question has been raised, “Just how much is this going to cost me?”Most lik....

Marketing Privacy: HIPAA's New Sales Pitch

Author: Rhodes, Harry B.

Source: AHIMA Convention

Publication Date: October 10, 2001



Background

Direct marketing is the direct contact between a seller and a consumer. This type of targeted marketing has gained wide popularity as a marketing strategy in the late 20th century because it can be addressed directly. With increasing amounts of specific information avai....

Testimony on Behalf of The American Health Information Management Association (AHIMA) to the Privacy and Confidentiality Subcommittee of the National Committee of Vital and Health Statistics (NCVHS)

Author: Rode, Dan

Source: AHIMA testimony and comments

Publication Date: August 22, 2001

August 22, 2001


Mr. Rothstein, members of the Privacy and Confidentiality Subcommittee, ladies and gentlemen - good morning!

I am Dan Rode, vice president for the AHIMA. On behalf of the Association, its more than 40,000 members, and myself, thank you for the opportunity....

HHS Releases Final Rules for HIPAA Transactions, Code Sets

Author: Rode, Dan

Source: Journal of AHIMA

Publication Date: November 2000


HIM professionals have new HIPAA challenges to prepare for: this summer, the Department of Health and Human Services (HHS) released the highly anticipated final rule for certain transaction sets and codes.1 The rule was effective on October 16, 2000, and under HIPAA legislation, most....

Winding Road to the Privacy Rule

Author: Rode, Dan

Source: Journal of AHIMA

Publication Date: June 2001




We have a privacy rule. After years of effort from AHIMA members, the first national privacy standards were allowed to go into effect by Department of Health and Human Services (HHS) Secretary Tommy G. Thompson, with pressure from the White House.

It's time for HIM professi....

Understanding HIPAA Transactions and Code Sets

Author: Rode, Dan

Source: Journal of AHIMA

Publication Date: January 2001


The recently published final regulations for transactions and code sets under HIPAA are the light at the end of the tunnel in the quest for uniform healthcare standards-and the first step on a long road to HIPAA implementation. What are the standard transactions and code sets? This article tak....

Who's Covered by HIPAA (HIPAA on the Job)

Author: Rode, Dan

Source: Journal of AHIMA

Publication Date: March 2001




One of the mysteries of the administrative simplification section of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) is determining who is covered or comes under the requirements of the act. This article will examine HIPAA to unravel some of the mystery of &quo....

Quest for Patients' Trust Only Just Begun

Author: Rode, Dan

Source: Journal of AHIMA

Publication Date: November 2002


Some saw the final rule on HIPAA privacy, published in August 2002, as a crowning achievement after years of efforts to secure patient privacy. Others took a more negative view, claiming that big business had finally ensured unhampered access to patient data. HIM professionals, however, should....

HIPAA Compliance Extension Postpones Simplification Benefits

Author: Rode, Dan

Source: Journal of AHIMA

Publication Date: February 2002



Under the terms of the Health Insurance Portability and Accountability Act of 1996, February 2002 would mark the second anniversary of administrative simplification for all but the smallest of health plans, and one year of rules related to claims attachments. Instead, Congress just approve....

Take Another Look: Proposed Changes to Privacy Rule

Author: Rode, Dan

Source: Journal of AHIMA

Publication Date: May 2002


In late March, the Department of Health and Human Services (HHS) released proposed changes related to the HIPAA privacy standards. By the time you read this column, the 30-day comment period for these regulations will have already passed, although debate on these changes will still be in full....

HIPAA Marches On--Or Does It?

Author: Rode, Dan

Source: Journal of AHIMA

Publication Date: March 2005


HIPAA has taught us that standardization is hard. When the act was signed into law in 1996, the optimists among us believed that within four years the healthcare industry would be using a variety of uniform national administrative transactions, most associated with what we now call the revenue....

Transactions Delay Prompts Concern Among Covered Entities

Author: Rode, Dan

Source: Journal of AHIMA

Publication Date: March 2002


AHIMA recently attended a meeting of healthcare providers, payers, and staff representatives of the National Committee on Vital and Health Statistics (NCVHS) and the Centers for Medicare and Medicaid Services (CMS). Organized by the Association for Electronic Health Care Transactions, the meet....

NCVHS Groups Explore CPR, Privacy Rule Possibilities

Author: Rode, Dan

Source: Journal of AHIMA

Publication Date: October 2001




HIPAA's fifth anniversary was marked by meetings of two key subcommittees of the National Committee on Vital and Health Statistics (NCVHS): the standards (transactions) and security subcommittee and the privacy and confidentiality subcommittee. At the security subcommittee, experts fr....

Low-Tech Threats in a High-Tech World

Author: Rollins, Genna

Source: Journal of AHIMA - website

Publication Date: April 2011



Despite the rise of health IT, healthcare providers still face daily privacy and security risks of the mundane variety—paper records are misplaced, improperly disclosed, or released without confidential information redacted. No matter the opportunities and risks that technology bring....

How Law, Investigation, Ethics Connect to HIPAA

Author: Ruano, Michael

Source: In Confidence (newsletter)

Publication Date: November 02, 2003


Part nine in a 10-part series.
This article is the ninth of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. The information security domain of law, investigation, and ethics covers these topics in depth and provides a p....

Cryptography and HIPAA: Breaking the Code

Author: Ruano, Michael

Source: In Confidence (newsletter)

Publication Date: June 02, 2003


Part four in a 10-part series.
This article is the fourth of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. The information security domain of cryptography is probably the most complex and mathematical of all the domai....

Security and HIPAA: Protecting Your Operations

Author: Ruano, Michael

Source: In Confidence (newsletter)

Publication Date: August 02, 2003


Part six in a 10-part series.
This article is the sixth of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. The information security domain of operations security includes the topics of controls, protections, monitoring,....

Moving Toward a Unified Information Security Program

Author: Ruano, Michael

Source: Journal of AHIMA

Publication Date: January 2003


Is your organization up to the challenge of creating a unified information security program?


A unified information security program has been all but mandated for healthcare organizations by the federal government. HIPAA requires that electronic, paper, and oral patient identif....

Information Governance for Offsite Data Security

Author: Saharia, Devendra

Source: Journal of AHIMA

Publication Date: April 2016



Disruptive technology can turn any industry on its head—virtually overnight. Just five years ago, summoning a taxi was an inefficient, time-consuming effort that often involved dialing up a dispatcher, who contacted a driver, who would then make their way to your location, perhaps in an h....

On the Line: Professional Practice Solutions

Author: Smith, Cheryl M.

Source: Journal of AHIMA

Publication Date: February 2001




Q: Where can I find information on the interpretation of Joint Commission on Accreditation of Healthcare Organization standards?

Q: How does the Health Insurance Portability and Accountability Act of 1996 (HIPAA) define health information in the final rule for healthcare elec....

Mind Your Business Associate Access: Six Steps

Author: Sullivan, Tori E.

Source: Journal of AHIMA

Publication Date: October 2002


It's April 10, 2003, and a privacy officer is reviewing her policies for the imminent privacy regulations, title II of the Health Insurance Portability and Accountability Act (HIPAA) of 1996. The compliance deadline is April 13, 2003, and she is already feeling stressed about meeting the date.....

Information Security

Author: Tang, Paul C.

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
Information Security
Presented by Paul Tang, MD Information Systems Security
NRC Definition Security is the protection of information systems against unauthorized access to or modification of information, whether in storage, processing, or transit,....

1 2 3 4 5 [6] 7 8