Search Results

= Members only

Current search

573 results.

[1] 2 3 4 5 6

Winding Road to the Privacy Rule

Author: Rode, Dan

Source: Journal of AHIMA

Publication Date: June 2001




We have a privacy rule. After years of effort from AHIMA members, the first national privacy standards were allowed to go into effect by Department of Health and Human Services (HHS) Secretary Tommy G. Thompson, with pressure from the White House.

It's time for HIM professi....

Who's Covered by HIPAA (HIPAA on the Job)

Author: Rode, Dan

Source: Journal of AHIMA

Publication Date: March 2001




One of the mysteries of the administrative simplification section of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) is determining who is covered or comes under the requirements of the act. This article will examine HIPAA to unravel some of the mystery of &quo....

What's Next?

Author: Braithwaite, Bill

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
What's Next?
Presented by Bill Braithwaite, MD, PhD, FACMI, Senior Advisor on Health Information Policy, US Dept. Of HSS Hospital Systems Affected
Laboratory Pharmacy Radiology Registration (ADT) Orders Results Data Warehouse Management Master Perso....

What is Security Auditing?

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: November 2004


The HIPAA security rule includes a requirement for audit controls and to monitor and manage ongoing security for a variety of processes. But the requirement for internal audit was changed to “information security activity review,” and there is no other specific reference to auditin....

Web FAQ

Author: AHIMA Professional Practice Team

Source: AHIMA Q and A

Publication Date: October 2002

Because HIPAA gives patients the right to copy their medical records, does my facility have to supply a copy machine for this purpose or allow patients to take their records to a copy center?
According to section 164.520 of the HIPAA final privacy rule, an individual has "the right to inspect....

Updated Toolkit for Security Strategies

Author: Cooper, Ted

Source: Journal of AHIMA

Publication Date: July 2004


The first version of the Computer-based Patient Record Institute (CPRI) toolkit “Managing Information Security in Health Care” was published on the Web in May 1999 in response to the proposed HIPAA security and electronic signature standard of October 1998. The toolkit is intended....

Unique Patient Identifiers -- What Are the Options?

Author: Appavu, Soloman I.

Source: Journal of AHIMA

Publication Date: October 1999


HIPAA has brought patient identifiers into the spotlight. But what's the best option? The author of a national study offers an overview.
Envision all of the players in the healthcare system—patients, providers, health plans, and payers. Now, envision all of the day-to-day processes t....

Understanding the Privacy Rule's Amendments

Author: Hughes, Gwen

Source: Journal of AHIMA

Publication Date: November 2002


By now you know that amendments to the final privacy rule were published in the August 14, 2002, Federal Register. The amendments are intended to correct problems identified in the original privacy rule published on December 28, 2000.


This article presents a summary of some of....

Understanding HIPAA Transactions and Code Sets

Author: Rode, Dan

Source: Journal of AHIMA

Publication Date: January 2001


The recently published final regulations for transactions and code sets under HIPAA are the light at the end of the tunnel in the quest for uniform healthcare standards-and the first step on a long road to HIPAA implementation. What are the standard transactions and code sets? This article tak....

Trouble with Audit Controls

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: October 2004


The 2004 Phoenix Health System/HIMSS HIPAA compliance survey indicates that providers find audit controls the most difficult of the HIPAA security standards to implement.
While it is recognized that every organization must conduct a risk analysis to determine the systems or activities th....

Transactions Standards

Author: Braithwaite, Bill

Source: HIPAA Conference 2000

Publication Date: March 14, 2000

2000 HIPAA Conference Presentation
Transactions Standards

Presented by Bill Braithwaite, MD, PhD, FACMI, Senior Advisor on Health Information Policy, US Dept. of HSS
Transaction Standards
NPRM published in 1998 (5/7/98 - 7/6/98) Adopts ASC X12N standards for transactions (e....

Transactions Delay Prompts Concern Among Covered Entities

Author: Rode, Dan

Source: Journal of AHIMA

Publication Date: March 2002


AHIMA recently attended a meeting of healthcare providers, payers, and staff representatives of the National Committee on Vital and Health Statistics (NCVHS) and the Centers for Medicare and Medicaid Services (CMS). Organized by the Association for Electronic Health Care Transactions, the meet....

The Year That Was and the Year to Be

Author: Asmonga, Donald D.

Source: Journal of AHIMA

Publication Date: February 2011


The second session of the 111th Congress began with the Democrats in firm control of the House and Senate. Working from their position of power enabled the Democrats to pass healthcare reform.

Although Congress was mired in contentious debates, AHIMA still advocated for its public po....

The New Privacy Officer

Author: Dimick, Chris

Source: Journal of AHIMA

Publication Date: April 2012



It has been a decade since the first privacy officers took their jobs in response to the HIPAA privacy rule. A slew of changes since then have added more responsibility, required more skills, and demanded more time of them than anyone could have imagined.

When Nancy Davis, R....

Testimony on Behalf of The American Health Information Management Association (AHIMA) to the Privacy and Confidentiality Subcommittee of the National Committee of Vital and Health Statistics (NCVHS)

Author: Rode, Dan

Source: AHIMA testimony and comments

Publication Date: August 22, 2001

August 22, 2001


Mr. Rothstein, members of the Privacy and Confidentiality Subcommittee, ladies and gentlemen - good morning!

I am Dan Rode, vice president for the AHIMA. On behalf of the Association, its more than 40,000 members, and myself, thank you for the opportunity....

Testimony of the American Health Information Management Association to the National Committee on Vital and Health Statistics on Medical Code Sets

Author: Prophet, Sue

Source: AHIMA testimony and comments

Publication Date: February 06, 2002

February 6, 2002
Opening Comments

Good morning Mr. Chairman, members and staff of the National Committee on Vital and Health Statistics (NCVHS) Standards and Security subcommittee, ladies and gentlemen.   I am Sue Prophet, director of coding policy and compliance for the American Heal....

Take Another Look: Proposed Changes to Privacy Rule

Author: Rode, Dan

Source: Journal of AHIMA

Publication Date: May 2002


In late March, the Department of Health and Human Services (HHS) released proposed changes related to the HIPAA privacy standards. By the time you read this column, the 30-day comment period for these regulations will have already passed, although debate on these changes will still be in full....

Stealth Software Deters PHI Theft

Author: Kawles, Terrance L.

Source: Journal of AHIMA

Publication Date: July 2003


As the leading edge of digital portability advances, the protections afforded the “portability” portion of HIPAA become strained. Under the final security standards, covered entities (CEs) must establish procedures and mechanisms to protect the confidentiality, integrity, and availab....

State of HIPAA Privacy and Security Compliance 2005

Author: AHIMA

Source: AHIMA report

Publication Date: April 11, 2005

The results of a survey to assess the current state of HIPAA privacy and security within the healthcare industry.

AHIMA releases the results of this research in conjunction with the second annual National Health Information Privacy and Security Week, April 10-16, 2005. AHIMA is sponsoring National Health Information Privacy and Security Week to raise awareness among healthcare professionals, their employers, the media, and the public regarding the importance of protecting the privacy, confidentiality, and security of personal health information (PHI).

Standards Organizations Plan Collaboration

Author:

Source: Journal of AHIMA

Publication Date: June 2000


In March, the National Committee on Vital and Health Statistics (NCVHS) Subcommittee on Standards and Security reached an agreement with six standard-setting organizations. The six organizations include the Accredited Standards Committee X12, Dental Content Committee, Health Level Seven,....

Spoliation of Medical Evidence

Author: Tomes, Jonathan P.

Source: Journal of AHIMA

Publication Date: October 2005


To avoid the improper destruction or alteration of records, HIM departments must follow a retention schedule, train personnel, and ensure that corrections leave original entries intact.
Although the legal concept known as spoliation of evidence has been a part of the American legal syste....

Sorting Out Employee Sanctions

Author: Burrington-Brown, Jill

Source: Journal of AHIMA

Publication Date: June 2003


Has your organization addressed sanctions related to privacy and security issues? Both the final privacy rule and final security rule address this issue. The privacy rule states that the covered entity must “have and apply appropriate sanctions against members of its workforce who fail to....

Smart Training on Privacy and Security (expanded version)

Author: Bacik, Sandy

Source: Journal of AHIMA

Publication Date: April 2010



There is plenty of privacy and security training to be done, and many trainers struggle to get resources from their organizations and attention from their audiences. Sandy Bacik, CISSP, ISSMP, CISM, CGEIT, is a principal consultant at EnerNex and a former chief security officer. Here she o....

Smart Training on Privacy and Security

Author: Bacik, Sandy

Source: Journal of AHIMA

Publication Date: July 2010


ARRA's modifications to the HIPAA privacy and security rules are setting off a new round of training in facilities large and small. Trainers must fit the new training into existing schedules that already include organizational policies and procedures, HIPAA, and other regulations such as the R....

Simple Steps to Tracking Disclosures

Author: Hughes, Gwen

Source: Journal of AHIMA

Publication Date: July 2002


The many exceptions to the HIPAA privacy rule’s accounting of disclosures standard make it difficult to determine what must be tracked. Although the rule gives patients the right to receive an accounting of disclosures of their health information, it lists several exceptions. This article....

Shifting from Reactive to Proactive HIPAA Audits

Author: Brinda, Danika

Source: Journal of AHIMA

Publication Date: January 2016



Stories about workforce members inappropriately accessing health information continue to plague the Department of Health and Human Services’ Data Breach Portal—which lists US provider data breaches that affect more than 500 individuals. Recently two data breaches reported on th....

Security @ the Edge

Author: Boroditsky, Marc

Source: In Confidence (newsletter)

Publication Date: November 02, 2000


With the pending impact of the Health Insurance Portability and Accountability Act (HIPAA) requirements and the high hopes for fully automated e-medical informatics, healthcare information professionals must gain an appreciation for the edge of their networks. More than ever before, the edge....

Security Awareness: The Right Messages

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: April 2004


How many of you have warned your e-mail users about “phishers”—e-mail that appears to come from a trusted source asking the recipient to click on a link to update personal details? But the site is really a fake, and the e-mail is a scam to steal personal information.

[1] 2 3 4 5 6