887 results.
<< 12 13 14 15 16 17 18 19 [20] 21 22 23 24 25 26 27 >>
Security Risk Analysis and Management: An Overview (2013 update)
Author: Walsh, Tom
Source: AHIMA practice brief
Publication Date: November 2013
Editor’s note: This update replaces the January 2011 practice brief “Security Risk Analysis and Management: An Overview.”
Managing risks is an essential step in operating any business. It’s impossible to eliminate all threats; however, healthcare organizati....
Data Mapping Best Practices (2013 update) - Retired
Author: AHIMA Work Group
Source: AHIMA practice brief
Publication Date: November 2013
This practice brief has been updated. See the latest version here.
Authorization Requirements for the Disclosure of Protected Health Information - Retired
Author: Dunn, Rose T; Rose, Angela Dinh; Wieland, LaVonne R.
Source: AHIMA practice brief
Publication Date: November 2013
Editor’s note: The following article supplants information contained in the October 2002 “Required Content for Authorizations to Disclose” Practice Brief.
The HIPAA privacy rule became effective April 14, 2003, and established standards for information disclosure....
Data Mapping and Its Impact on Data Integrity
Author: AHIMA
Source: AHIMA report
Publication Date: November 2013
This thought leadership paper explores the relationship of data mapping and data integrity assurance by providing guidance to avoid adverse outcomes involving the use of maps.
Five Risky HIE Practices that Threaten Data Integrity
Author: Landsbach, Grant; Just, Beth Haenke
Source: Journal of AHIMA
Publication Date: November 2013
In recent years health information exchange (HIE) has emerged as a trusted model for sharing patient information across hospitals and health systems to drive improved care coordination and, ultimately, quality and outcomes. The result of the convergence of advanced health information techn....
E- Discovery Litigation and Regulatory Investigation Response Planning: Crucial Components of Your Organization’s Information and Data Governance Processes
Author: AHIMA
Source: AHIMA practice brief
Publication Date: November 2013
I. What is E-Discovery?
E-discovery is defined as the pretrial legal process used to describe the method by which parties will obtain and review electronically stored information. The 2006 Federal Rules of Civil Procedure (FRCP) served to place electronically stored information (....
Keeping Information Clean: New Information Governance Efforts Challenge HIM to Sort Out Dirty Data
Author: Butler, Mary
Source: Journal of AHIMA
Publication Date: November 2013
In a hurry to deliver two dozen artisanal doughnuts to your office one Monday morning, the bicycle delivery man takes a spill in rush hour traffic. One dozen glazed pastries tumble out of the bakery box onto the sidewalk, collecting some dirt but still looking edible (five second rule!). T....
Redisclosure of Patient Health Information (2013 update)
Author: Downing, Kathy; Odia, Godwin
Source: AHIMA practice brief
Publication Date: November 2013
Editor’s note: This update supplants the 2009 practice brief “Redisclosure of Patient Health Information.”
Redisclosure is the act of sharing or releasing health information that was received from another source (e.g., external facility or provider) and made part....
Medical Records' Dynamic Nature: If It Isn't Written Down, It Didn't Happen. And If It Is Written Down, It Might Not Be What It Seems
Author: David, Gary; Vinkhuyzen, Erik
Source: Journal of AHIMA
Publication Date: November 2013
Documents are a fundamental component of any organization. In fact, no organization can exist without filing the proper paperwork. Documents are such a pervasive part of our everyday life that almost every parody of office work involves the specter of a burdensome documentation requirement....
Information Governance’s Privacy and Security Component
Author: Rose, Angela Dinh
Source: Journal of AHIMA
Publication Date: November 2013
In the most simple terms, information governance is the accountability framework and decision rights employed by an organization to ensure effective and efficient use of information across the enterprise. Ideally, this also achieves enterprise information management (EIM), which is the inf....
<< 12 13 14 15 16 17 18 19 [20] 21 22 23 24 25 26 27 >>