Search Results

= Members only

Current search

573 results.

1 2 3 4 5 6 7 8 [9] 10 11 12 13 14 15 16 >>

Smart Training on Privacy and Security (expanded version)

Author: Bacik, Sandy

Source: Journal of AHIMA

Publication Date: April 2010



There is plenty of privacy and security training to be done, and many trainers struggle to get resources from their organizations and attention from their audiences. Sandy Bacik, CISSP, ISSMP, CISM, CGEIT, is a principal consultant at EnerNex and a former chief security officer. Here she o....

Smart Training on Privacy and Security

Author: Bacik, Sandy

Source: Journal of AHIMA

Publication Date: July 2010


ARRA's modifications to the HIPAA privacy and security rules are setting off a new round of training in facilities large and small. Trainers must fit the new training into existing schedules that already include organizational policies and procedures, HIPAA, and other regulations such as the R....

Simple Steps to Tracking Disclosures

Author: Hughes, Gwen

Source: Journal of AHIMA

Publication Date: July 2002


The many exceptions to the HIPAA privacy rule’s accounting of disclosures standard make it difficult to determine what must be tracked. Although the rule gives patients the right to receive an accounting of disclosures of their health information, it lists several exceptions. This article....

Shifting from Reactive to Proactive HIPAA Audits

Author: Brinda, Danika

Source: Journal of AHIMA

Publication Date: January 2016



Stories about workforce members inappropriately accessing health information continue to plague the Department of Health and Human Services’ Data Breach Portal—which lists US provider data breaches that affect more than 500 individuals. Recently two data breaches reported on th....

Security @ the Edge

Author: Boroditsky, Marc

Source: In Confidence (newsletter)

Publication Date: November 02, 2000


With the pending impact of the Health Insurance Portability and Accountability Act (HIPAA) requirements and the high hopes for fully automated e-medical informatics, healthcare information professionals must gain an appreciation for the edge of their networks. More than ever before, the edge....

1 2 3 4 5 6 7 8 [9] 10 11 12 13 14 15 16 >>