Search Results

= Members only

Current search

573 results.

[1] 2 3 4 5 6

2004 HIPAA Privacy & Security Compliance Survey

Author: AHIMA

Source: AHIMA

Publication Date: April 12, 2004

The results of a survey conducted by AHIMA to assess the current state of HIPAA privacy within the healthcare industry. These results are being released in conjunction with the first annual National Health Information Privacy and Security Week.

Access Controls: Striking the Right Balance

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: January 2005


As healthcare organizations put the finishing touches on their HIPAA security compliance plans, many are finding that updating access controls is not easy. Clinicians often scoff at the word “control” in general and at “access control” in particular. Not all products ar....

Accounting for Disclosure Cost Analysis Worksheet

Author: Dunn, Rose T

Source: External - used with permission

Publication Date: May 02, 2003

This worksheet has been developed to provide guidance on components to consider in developing the basis for a reasonable, cost-based charge for the Accounting for Disclosure (164.528). This worksheet is not intended to be all inclusive. Users are encouraged to discuss inclusions to this analysis with their facility’s cost accountant.

Accounting of Disclosures: ARRA’s Impact

Author: Rhodes, Harry B.

Source: AHIMA Convention

Publication Date: October 05, 2009


The accounting of disclosures requirement is one of the most difficult HIPAA privacy rule compliance issues to implement. Following the August 2002 modifications to the privacy rule requirements, the accounting for disclosures requirement has stood out as the HIPAA requirement demanding the big....

Adapting BA Practices to Meet the Omnibus Rule

Author: McSteen, Thomas

Source: Journal of AHIMA

Publication Date: September 2013



The 2013 HIPAA Omnibus Rule marks a key milestone for implementation of the 2009 Health Information Technology for Economic and Clinical Health Act (HITECH). One of the most far-reaching impacts of HITECH and the Omnibus Rule is that business associates (BA) and their subcontractors now mu....

A First Peek at the Privacy Regulations

Author: AHIMA

Source: Journal of AHIMA

Publication Date: August 2010


The office for Civil Rights got a late start on the HITECH privacy regulations (due last February), and it's clear from the draft rule it released in July that the office still has almost as many questions as answers on how to enact the HITECH provisions. However, the release does offer a good....

AHIMA Advantage E-alert [Special edition]

Author: AHIMA

Source: AHIMA newsletter

Publication Date: February 13, 2003

HHS to Release Final HIPAA Security Rule February 20; HIPAA Transaction and Code Set Standards Modifications Announced

AHIMA Comments on Privacy Rule

Author: Asmonga, Donald D.

Source: Journal of AHIMA

Publication Date: March 2000


On January 18, 2000, AHIMA submitted comments to the Department of Health and Human Services (HHS) on the proposed rule for 45 Code of Federal Regulations (CFR), Parts 160 through 164: "Standards for Privacy of Individually Identifiable Health Information." The proposed rule....

AHIMA Position Statement: Privacy Official

Author: AHIMA

Source: AHIMA position statement

Publication Date: February 15, 2001


Position



The American Health Information Management Association (AHIMA) recognizes the increased complexity of protecting patients' privacy while managing access to, and release of, information about patients and other healthcare consumers. Credentialed health information ma....

AHIMA State Privacy Law Resource tool

Author: AHIMA

Source: AHIMA

Publication Date: May 21, 2003


Welcome to the AHIMA State Privacy Law Resource tool. This tool provides AHIMA members with web links to sites with specific information regarding the final HIPAA privacy rules and their interaction with state laws and regulations. On many of these sites, you will find access to HIPAA preemptio....

Are Ethics Guiding Your Workplace?

Author: Yokubaitis, Pamela R.

Source: Journal of AHIMA

Publication Date: September 2003



Sanctions under the HIPAA regulations mean serious financial consequences for healthcare professionals who release protected health information to others without following proper disclosure protocols. But HIM professionals should not be motivated by fear of financial consequences alone. Ou....

Are You Ready for a HIPAA Audit?

Author: Wiedemann, Lou Ann

Source: Journal of AHIMA

Publication Date: April 2017



Editor’s Note: The following is an excerpt from the new “External HIPAA Audit Readiness Toolkit” developed by AHIMA. The full toolkit is free for AHIMA members.


THE HITECH OMNIBUS Rule mandated that the US Department of Health and Human Services (HHS) condu....

Automation for Privacy and Security Compliance

Author: McLendon, Kelly

Source: Journal of AHIMA

Publication Date: March 2012


There has been a lack of enforcement of the privacy and security rules ever since HIPAA's inception. As such the adoption of comprehensive HIPAA compliance programs has lagged behind EHR development and implementation.

This in turn has caused little funding to be budgeted by provide....

Breach Notification Triggers Receive Update

Author: Bowen, Rita K.

Source: Journal of AHIMA - website

Publication Date: April 2013



The HIPAA Omnibus Rule, the new Final Rule modifying HIPAA, was published in the Federal Register on January 25, 2013. The amended rule went into effect on March 26 and full compliance is expected by September 23. For HIM professionals, the most far-reaching of the changes to HIPAA is that....

By the Rules: Making Security Policies Stick

Author: Zender, Anne

Source: Journal of AHIMA

Publication Date: October 1999


Considerable attention has been paid to the development of organizationwide information security policies—especially what they should contain and how they should be put in place. But enforcing these policies isn't always easy. We asked four information security experts to give us....

Calculating Costs for Accounting of Disclosures

Author: Dunn, Rose T

Source: Journal of AHIMA

Publication Date: May 2003


The privacy rule allows a covered entity to charge a cost-based fee for providing an accounting of disclosure (AOD). Has your organization determined these costs? Calculating the actual costs may be more involved than you think. This article will discuss the requirements for setting the fee an....

Catching Up with HIPAA: Managing Noncompliance

Author: Weintraub, Abner E.

Source: Journal of AHIMA

Publication Date: May 2003


With the April 14 HIPAA privacy deadline behind us, many covered entities are still struggling to become compliant. Limited budgets and staff, conflicting advice, and unforeseen delays have all conspired to keep many covered entities from meeting the deadline.


What do you tell....

Changing Face of Public Health Reporting

Author: Dougherty, Michelle

Source: Journal of AHIMA

Publication Date: April 2002


In recent months, anthrax outbreaks and concern over bioterrorism threats have created a greater need for the US to have a system to monitor and report public health information in a timely manner. The Centers for Disease Control and Prevention (CDC) are developing standards for a new approach....

Checking In on Accounting of Disclosures

Author: Downing, Kathy; McLendon, Kelly

Source: Journal of AHIMA

Publication Date: November 2013



Accounting of disclosures (AOD) is one "patient right" listed within the HIPAA Privacy Rule. Since the rules were implemented in 2003, AOD has been a topic of much discussion but has not generated much regulatory action from the US Department of Health and Human Services' (HHS) Office for....

Clearing the HIPAA Cobwebs: New ONC Chief Privacy Officer Lucia Savage Focuses on Balancing Privacy and Security with Expanding Interoperable EHR Exchange

Author: Dimick, Chris

Source: Journal of AHIMA

Publication Date: April 2015



The spiders of time have been hard at work on the US healthcare privacy and security rules, to the point that their place in health IT interoperability has become fogged and is inhibiting their proper role in the meaningful exchange of health information, according to Lucia Savage, JD, th....

CMS’s 2009 Security Assessment Process

Author: Dinh, Angela K.

Source: Journal of AHIMA

Publication Date: September 2009


In 2008 the Centers for Medicare and Medicaid Services (CMS) conducted 10 HIPAA security assessments in covered entities (CEs) nationwide. CMS’s stated purpose was not to identify flaws but to gain a true understanding of industry compliance with the HIPAA security rule.

CMS co....

Code Sets

Author: Brooks, Patricia E.

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
Code Sets
Presented by Pat Brooks, RHIA
HCFA Standards for Electronic Transactions
HCFA-0149-P Published May 7, 1998 Final not yet published To be enacted 2 years after final notice (3 years for small plans)
Proposed Initial Standards for....

Code Sets: Improving the Quality of Coded Data

Author: Prophet, Sue

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
Code Sets: Improving the Quality of Coded Data
The Healthcare Provider Perspective
Sue Prophet, RHIA, CCS
Director, Classification and Coding, AHIMA Current Problems with Use of Code Sets
Lack of acceptance of valid codes (e.g., V and E co....

Conducting a HIPAA Security Risk Assessment

Author: Klein, Jim

Source: AHIMA Convention

Publication Date: October 10, 2001


Introduction

Organizations covered under the Proposed Security Standards1 (the Draft Standard) are facing important regulatory compliance decisions for operational, technical, clinical, and administrative components of their enterprise. With the promulgation of the final Security Stand....

Conference Handouts

Author: AHIMA

Source: HIPAA Conference 2000

Publication Date: March 13, 2000






 

Conference Handouts


If you weren't able to attend the HIPAA Conference in March, you can review the text of handouts and presentations provided at the sessions.

....

Countdown to Compliance: Privacy

Author: Ingram-Muhammad, Sybil

Source: Journal of AHIMA

Publication Date: February 2002


How far along the road to compliance with the HIPAA privacy regulation is your organization? This article tells you the steps you should be taking to get in compliance by the April 2003 deadline.

It is February 2002—14 months before your organization has to be compliant with th....

Countdown to HIPAA Claims Attachments

Author: Giannangelo, Kathy

Source: Journal of AHIMA

Publication Date: October 2005


With the clock ticking down to the HIPAA national provider identifier compliance deadline, HIM professionals should start thinking about the next HIPAA standard on the horizon, claims attachments. While not one of the original eight administrative transactions approved for use in the healthcar....

CPT Category III Codes Cover New, Emerging Technologies: New Codes Developed to Address Issues in Light of HIPAA

Author: Beebe, Michael

Source: Journal of AHIMA - Coding Notes

Publication Date: October 2003


In 1998, the American Medical Association (AMA) initiated the CPT-5 Project. This project was a broad-based and comprehensive effort to make needed and practical enhancements to the CPT code set that would address challenges presented by emerging user needs and HIPAA. One of the initiatives tha....

Creating Privacy Rule Implementation Efficiency

Author: Hughes, Gwen

Source: Journal of AHIMA

Publication Date: October 2002


Many HIM professionals will be called upon to perform an extraordinary feat during the next six months. They will be asked to bring one or more organizations into compliance with the HIPAA privacy rule by April 14, 2003. While this task is challenging in organizations that began such efforts a....

Cryptography and HIPAA: Breaking the Code

Author: Ruano, Michael

Source: In Confidence (newsletter)

Publication Date: June 02, 2003


Part four in a 10-part series.
This article is the fourth of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. The information security domain of cryptography is probably the most complex and mathematical of all the domai....

Cybersecurity 101

Author: Lucci, Susan; Walsh, Tom

Source: Journal of AHIMA

Publication Date: November 2015



One of the most alarming statistics in the news, which is growing with intent and severity, is the prevalence of cyber-attacks, particularly in healthcare. It is an alarming trend that has gained a good deal of attention. For example, in July 2015, UCLA reported that up to 4.5 million pati....

Debate Surrounding Unique Health Identifier Continues

Author: Wheatley, Victoria

Source: Journal of AHIMA

Publication Date: February 2004


Whatever happened to the unique health identifier for individuals (UHI)? The UHI was one of four identifiers included in HIPAA. In July 1998 the Department of Health and Human Services (HHS) and the former Health Care Financing Administration (now the Centers for Medicare and Medicaid Services....

De-identification and the Sharing of Big Data

Author: White, Susan E

Source: Journal of AHIMA

Publication Date: April 2013



One of the newest buzz words in data analytics is “Big Data,” and the data created through the healthcare industry is some of the “biggest” around. The widespread implementation of electronic health records (EHRs) and the need to share data to measure quality and ma....

[1] 2 3 4 5 6