Search Results

= Members only

Current search

573 results.

1 [2] 3 4 5 6 7 8

Spoliation of Medical Evidence

Author: Tomes, Jonathan P.

Source: Journal of AHIMA

Publication Date: October 2005


To avoid the improper destruction or alteration of records, HIM departments must follow a retention schedule, train personnel, and ensure that corrections leave original entries intact.
Although the legal concept known as spoliation of evidence has been a part of the American legal syste....

Sorting Out Employee Sanctions

Author: Burrington-Brown, Jill

Source: Journal of AHIMA

Publication Date: June 2003


Has your organization addressed sanctions related to privacy and security issues? Both the final privacy rule and final security rule address this issue. The privacy rule states that the covered entity must “have and apply appropriate sanctions against members of its workforce who fail to....

Smart Training on Privacy and Security (expanded version)

Author: Bacik, Sandy

Source: Journal of AHIMA

Publication Date: April 2010



There is plenty of privacy and security training to be done, and many trainers struggle to get resources from their organizations and attention from their audiences. Sandy Bacik, CISSP, ISSMP, CISM, CGEIT, is a principal consultant at EnerNex and a former chief security officer. Here she o....

Smart Training on Privacy and Security

Author: Bacik, Sandy

Source: Journal of AHIMA

Publication Date: July 2010


ARRA's modifications to the HIPAA privacy and security rules are setting off a new round of training in facilities large and small. Trainers must fit the new training into existing schedules that already include organizational policies and procedures, HIPAA, and other regulations such as the R....

Simple Steps to Tracking Disclosures

Author: Hughes, Gwen

Source: Journal of AHIMA

Publication Date: July 2002


The many exceptions to the HIPAA privacy rule’s accounting of disclosures standard make it difficult to determine what must be tracked. Although the rule gives patients the right to receive an accounting of disclosures of their health information, it lists several exceptions. This article....

Shifting from Reactive to Proactive HIPAA Audits

Author: Brinda, Danika

Source: Journal of AHIMA

Publication Date: January 2016



Stories about workforce members inappropriately accessing health information continue to plague the Department of Health and Human Services’ Data Breach Portal—which lists US provider data breaches that affect more than 500 individuals. Recently two data breaches reported on th....

Security @ the Edge

Author: Boroditsky, Marc

Source: In Confidence (newsletter)

Publication Date: November 02, 2000


With the pending impact of the Health Insurance Portability and Accountability Act (HIPAA) requirements and the high hopes for fully automated e-medical informatics, healthcare information professionals must gain an appreciation for the edge of their networks. More than ever before, the edge....

Security Awareness: The Right Messages

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: April 2004


How many of you have warned your e-mail users about “phishers”—e-mail that appears to come from a trusted source asking the recipient to click on a link to update personal details? But the site is really a fake, and the e-mail is a scam to steal personal information.

Security and HIPAA: Protecting Your Operations

Author: Ruano, Michael

Source: In Confidence (newsletter)

Publication Date: August 02, 2003


Part six in a 10-part series.
This article is the sixth of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. The information security domain of operations security includes the topics of controls, protections, monitoring,....

Safeguarding ePHI from Fire the Dry Way

Author: Brown, Karen

Source: Journal of AHIMA

Publication Date: March 2005


With HIPAA’s security rule compliance date right around the corner, many HIM professionals are still trying to determine if they have adequate safeguards in place to ensure the confidentiality, integrity, and availability of electronic protected health information (ePHI).

Many....

Safe at Home: Remote Coding Meets HIPAA

Author: Keough, Tim

Source: Journal of AHIMA

Publication Date: February 2004


Remote coding offers big benefits and unique security challenges. Here’s how one organization moves patient data securely across the Internet.

"Whatever, in connection with my professional practice, or not in connection with it, I see or hear, in the life of men, which ought....

Review of the 2002 Department of Health and Human Service Notice of Proposed Rule Making for The Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy Regulations

Author: AHIMA Policy and Government Relations Team

Source: AHIMA regulation analysis

Publication Date: April 02, 2002


Status

After almost a year's delay, the Department of Health and Human Services (HHS) published its promised recommendations to change and clarify the HIPAA Privacy Regulations that were originally published, as a "final rule" by HHS on December 28, 2000, in the Federal Re....

Reviewing the New HIPAA Rules

Author: Dimick, Chris

Source: AHIMA regulation analysis | Journal of AHIMA

Publication Date: March 2013



At 138 fine-print pages, the final rule detailing the HITECH Act’s modifications to HIPAA privacy and security requirements is not a quick or easy read. But it is an important read since the content of the Federal Register post drastically impacts HIM professionals and their business....

Reporting Security Incidents

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: March 2005


HIPAA requires covered entities “implement policies and procedures to address security incidents.” There is one implementation specification: to “identify and respond to suspected or known security incidents; mitigate, to the extent practical, harmful effects of security inci....

Releasing Information of Deceased Patients

Author: Herrin, Barry S.

Source: Journal of AHIMA

Publication Date: January 2009


Developed when modern law concepts were first formed, the mortmain, or “dead hand,” rule prevented the church from exercising undue influence over a soon-to-be-dead penitent to obtain a gift of an individual’s lands in remission of his or her sins. These statutes evolved over....

Reaffirming Your HIPAA Compliance Efforts

Author: Woloszyn, William

Source: Journal of AHIMA

Publication Date: April 2005


Two years after the HIPAA privacy compliance date, is it time for your organization to reassess your efforts and recommit to enforcing HIPAA?
Revisiting HIPAA’s Roots

The HIPAA privacy regulation was created in response to public healthcare concerns about the privacy of pa....

Quick Take on Clearinghouses

Author: McLaughlin, Mark

Source: Journal of AHIMA

Publication Date: January 2001




HIPAA's provisions have brought healthcare clearinghouses into the spotlight. What is a clearinghouse, and how is its role affected by the new regulations? This article answers these questions.

A clearinghouse is typically used to collect, validate, and distribute insurance c....

Quest for Patients' Trust Only Just Begun

Author: Rode, Dan

Source: Journal of AHIMA

Publication Date: November 2002


Some saw the final rule on HIPAA privacy, published in August 2002, as a crowning achievement after years of efforts to secure patient privacy. Others took a more negative view, claiming that big business had finally ensured unhampered access to patient data. HIM professionals, however, should....

1 [2] 3 4 5 6 7 8