Search Results

= Members only

Current search

4010 results.

1 2 3 4 [5] 6 7 8 9 10 11 12 13 14 15 16 >>

Reporting Security Incidents

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: March 2005


HIPAA requires covered entities “implement policies and procedures to address security incidents.” There is one implementation specification: to “identify and respond to suspected or known security incidents; mitigate, to the extent practical, harmful effects of security inci....

What's Your HIPAA ETA? (HIPAA on the Job)

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: January 2002


If you are thinking about HIPAA’s privacy compliance date of April 14, 2003, think again! Privacy compliance is about ongoing learning: education, training, and awareness (ETA).

While it is true that the final privacy rule only calls for work force training on hire and when th....

What is Security Auditing?

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: November 2004


The HIPAA security rule includes a requirement for audit controls and to monitor and manage ongoing security for a variety of processes. But the requirement for internal audit was changed to “information security activity review,” and there is no other specific reference to auditin....

Getting Ready for HIPAA Privacy Rules

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: April 2000


What do the proposed privacy regulations mean to HIM professionals—and what can you do now to begin to prepare? The author takes an in-depth look at the proposed rules.
The Health Insurance Portability and Accountability Act (HIPAA) of 1996 is bringing significant changes to the ma....

Trouble with Audit Controls

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: October 2004


The 2004 Phoenix Health System/HIMSS HIPAA compliance survey indicates that providers find audit controls the most difficult of the HIPAA security standards to implement.
While it is recognized that every organization must conduct a risk analysis to determine the systems or activities th....

HIPAA Security Shopping List (HIPAA on the Job)

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: May 2004


Many information security officials are barraged with requests for the latest security tools. Such shopping lists often do not reflect a structured plan or a true risk analysis to justify their cost or human resource requirements. This column describes some of the latest tools, how you can ev....

Primer on Encryption

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: June 2004


Encryption is an addressable implementation specification under HIPAA’s access control and transmission security standards. Many providers are grappling with just how to address these specifications:
Is there a difference between the two specifications, and if so, what is the diff....

Access Controls: Striking the Right Balance

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: January 2005


As healthcare organizations put the finishing touches on their HIPAA security compliance plans, many are finding that updating access controls is not easy. Clinicians often scoff at the word “control” in general and at “access control” in particular. Not all products ar....

Kick Starting the Security Risk Analysis

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: July 2004


Many covered entities are just now starting to approach the compliance aspects of the HIPAA security rule. Why discuss “compliance aspects” and not standards or controls, as we did when preparing for the privacy rule? Privacy and security are long-standing concepts to healthcare,....

Ambulatory versus Acute Care EHRs

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: June 2006


EHR systems for clinics differ from those used in hospitals. But does that mean they can’t get along?
Although every electronic health record (EHR) is intended to capture data from multiple sources and to be used at the point of care for clinical decision making, there are signific....

State of the Computer-based Patient Record

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: October 1998


Value, experiments, promises, disappointments, hype, compromises, and change all characterize the status of the computer-based patient record (CPR). An industry expert offers some perspective on where the CPR has been and where it's going.

In 1873, Florence Nightingale lamented her....

Primer on Network Security

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: March 2004


The lack of specificity in HIPAA’s transmission security standard for “guarding against unauthorized access to electronic protected health information (EPHI) that is being transmitted over an electronic communications nework” may leave you a bit cold, especially the portion....

Security Awareness: The Right Messages

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: April 2004


How many of you have warned your e-mail users about “phishers”—e-mail that appears to come from a trusted source asking the recipient to click on a link to update personal details? But the site is really a fake, and the e-mail is a scam to steal personal information.

Managing HIPAA as Gatekeeper

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: September 2004


An unfortunate result of the HIPAA privacy rule is the emerging use of HIPAA as a gatekeeper, restricting the appropriate fl ow of protected health information (PHI). HIPAA is being cited as a reason not to disclose information without patient permission when needed for treatment, payment, or....

Making Amendments Meaningful

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: February 2005


Now that we’re well entrenched in compliance with the privacy rule and headed toward the electronic health record (EHR), the personal health record (PHR), and regional health information organizations (RHIOs), amendments may seem like a mundane topic. But, as this article explains, it is....

Statement on Health Information Confidentiality: A Joint Position Statement

Author: American Medical Informatics Association (AMIA); AHIMA

Source: AHIMA position statement | Journal of AHIMA

Publication Date: July 2006


July 2006
The American Medical Informatics Association (AMIA) and the American Health Information Management Association (AHIMA) have a long history of working to protect the confidentiality of individuals’ health information and to promote fair information practices. Public confidence t....

Turning Old Technology into New Systems

Author: Anderson, Ellen Miller

Source: Journal of AHIMA

Publication Date: November 2001


The need for updated technology rarely coincides with enough funds to purchase it. However, disparate technologies can be combined to meet information system needs without a major capital outlay. At Home Care Services, part of Group Health Cooperative (GHC) in Seattle, we created the On Call P....

New Directions for Long Term Care

Author: Anderson, Rhonda L.

Source: Journal of AHIMA

Publication Date: June 2000


Compliance has always been with us, from the days of routine chart audits and care evaluation processes. But today HIM professionals in long term care find themselves facing the challenges of compliance as never before.

In recent years, the Office of Inspector General (OIG) has inc....

Lighting the Mobile Information FHIR: How FHIRframe Could Dramatically Improve Mobile Health and Change HIM in the Process

Author: Anwar, Mohd; Doss, Christopher

Source: Journal of AHIMA

Publication Date: September 2015



Emerging mobile health (mHealth) technologies provide new methods for collecting physiological, behavioral, or environmental data and the outcomes of interventions. These wireless devices and sensors, such as smartphones and personal health devices, can support continuous health monitoring....

Medical Identity Theft and the Red Flags Rule

Author: Apgar, Chris

Source: Journal of AHIMA - website

Publication Date: April 2009


Continuing our Health Information Privacy and Security Week series, today Chris Apgar, CISSP, president of Apgar & Associates LLC, takes a look at medical identity theft within the context of the Red Flags Rule.

Much is reported in the news about identity theft including new cat....

Closer Look at the Red Flag Rules

Author: Apgar, Chris

Source: Journal of AHIMA - website

Publication Date: November 21, 2008



* * *


Healthcare organizations must be in compliance with the FTC’s red flag rules by May 1, 2009. The rules, which require financial institutions and creditors to establish identity theft protection programs, were included in the Fair and Accurate Credit Transactions Act pas....

Unique Patient Identifiers -- What Are the Options?

Author: Appavu, Soloman I.

Source: Journal of AHIMA

Publication Date: October 1999


HIPAA has brought patient identifiers into the spotlight. But what's the best option? The author of a national study offers an overview.
Envision all of the players in the healthcare system—patients, providers, health plans, and payers. Now, envision all of the day-to-day processes t....

Putting the ICD-10-CM/PCS GEMs into Practice (2016 update) - Retired

Author: Archer, Anita; Campbell, Angela; D'Amato, Cheryl; McLeod, Melissa; Rugg, Donna

Source: AHIMA practice brief | Journal of AHIMA

Publication Date: January 2016


Editor's Note: This Practice Brief supersedes the May 2013 and March 2010 Practice Briefs titled "Putting the ICD-10-CM/PCS GEMs into Practice."


Mappings between ICD-9-CM and ICD-10-CM/PCS will play a critical role in the successful utilization of ICD-10-CM/PCS. The Centers for Me....

ICD-10's Impact Reaches Far Beyond Coding: Examining the New Code Sets' Revenue Cycle Implications

Author: Arends-Marquez, Alexa; Knight, Nicole; Thomas-Flowers, Dwan

Source: Journal of AHIMA - Coding Notes | Journal of AHIMA

Publication Date: November 2014



The implications of ICD-10-CM/PCS (ICD-10) for coding operations are a common topic of industry discussion, but the impact of ICD-10 reaches far beyond coding alone. ICD-10 is embedded in the entire revenue cycle for providers. The conversion will impact almost every aspect of operations,....

Clinical Documentation Improvement in the Outpatient Setting

Author: Arrowood, Danita; Johnson, Laurie M.; Wieczorek, Michelle M.

Source: Journal of AHIMA - Coding Notes | Journal of AHIMA

Publication Date: July 2015



Clinical documentation improvement (CDI) programs have proven their worth with over a decade of success and continued role expansion in the inpatient setting. As the healthcare industry prepares for new initiatives such as value-based purchasing, electronic health records (EHRs), and ICD-1....

How Can I Help You? Top 10 Customer Service Tips for HIM Professionals

Author: Aschettino, Lucia; Birnbaum, Cassi L; Crocker, Janice; Grebner, Leah A.; McNicholas, Faith C.

Source: Journal of AHIMA

Publication Date: May 2013



Health information management (HIM) best practices state that it is important for HIM professionals to focus not just on the information but also on internal and external customers. Customers have varied, and ever-changing, needs that must be met by HIM professionals. Both internal and ext....

Advancing HIM Issues in 2004: the Quiet Storm

Author: Asmonga, Donald D.

Source: Journal of AHIMA

Publication Date: February 2005


Although healthcare headed the 108th Congress’s agenda in the first session, its second session included little in the way of HIM issues, focusing instead on election-year topics. However, the healthcare-lite agenda didn’t stop AHIMA from advancing its work in 2004.
A New Voi....

IHC Eyes E-health Code of Ethics

Author: Asmonga, Donald D.

Source: Journal of AHIMA

Publication Date: June 2000


The privacy of personal information on the Internet is a hot topic nationwide. Is an e-health code of ethics in order? AHIMA and several other organizations are offering guidance this spring to the industry's first attempt at one.

Together with the American Medical Informa....

1 2 3 4 [5] 6 7 8 9 10 11 12 13 14 15 16 >>