Search Results

= Members only

Current search

573 results.

1 [2] 3 4 5 6 7 8 9 10 11 12 13 14 15 16 >>

What is Security Auditing?

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: November 2004

The HIPAA security rule includes a requirement for audit controls and to monitor and manage ongoing security for a variety of processes. But the requirement for internal audit was changed to “information security activity review,” and there is no other specific reference to auditin....


Author: AHIMA Professional Practice Team

Source: AHIMA Q and A

Publication Date: October 2002

Because HIPAA gives patients the right to copy their medical records, does my facility have to supply a copy machine for this purpose or allow patients to take their records to a copy center?
According to section 164.520 of the HIPAA final privacy rule, an individual has "the right to inspect....

Updated Toolkit for Security Strategies

Author: Cooper, Ted

Source: Journal of AHIMA

Publication Date: July 2004

The first version of the Computer-based Patient Record Institute (CPRI) toolkit “Managing Information Security in Health Care” was published on the Web in May 1999 in response to the proposed HIPAA security and electronic signature standard of October 1998. The toolkit is intended....

1 [2] 3 4 5 6 7 8 9 10 11 12 13 14 15 16 >>