Search Results

= Members only

Current search

95 results.

[1] 2

Information Governance for Offsite Data Security

Author: Saharia, Devendra

Source: Journal of AHIMA

Publication Date: April 2016



Disruptive technology can turn any industry on its head—virtually overnight. Just five years ago, summoning a taxi was an inefficient, time-consuming effort that often involved dialing up a dispatcher, who contacted a driver, who would then make their way to your location, perhaps in an h....

Tips for Preventing and Responding to a Ransomware Attack

Author: Butler, Mary

Source: Journal of AHIMA - website

Publication Date: April 01, 2016

As predicted, 2016 is proving to be the year of ransomware, with multiple reported incidents making news as we approach April. As they become startlingly more common, it’s important that HIM professionals be aware of how preventable they are, says Tom Walsh, CISSP, founder and managing partner of tw-Security. Just as with other types of data breaches, ransomware attacks are the result of human intervention—that’s also where they end.

Evaluating the Information Governance Principles for Healthcare: Integrity and Protection

Author: Datskovsky, Galina; Hedges, Ron; Empel, Sofia; Washington, Lydia

Source: Journal of AHIMA

Publication Date: April 2015



Editor’s note: This is the second in a series of four articles that discuss the eight Information Governance Principles for Healthcare.


AHIMA’s new Information Governance Principles for Healthcare (IGPHC) provides a framework for healthcare organizations to enhance their ab....

The 10 Security Domains (Updated 2013) - Retired

Author: AHIMA

Source: AHIMA practice brief

Publication Date: October 2013


Editor's note: This update supersedes the February 2004, February 2010, and May 2012 practice briefs "The 10 Security Domains."


In today's healthcare environment, HIM professionals must understand basic information security principles to fully protect the privacy of information. T....

The New Privacy Officer

Author: Dimick, Chris

Source: Journal of AHIMA

Publication Date: April 2012



It has been a decade since the first privacy officers took their jobs in response to the HIPAA privacy rule. A slew of changes since then have added more responsibility, required more skills, and demanded more time of them than anyone could have imagined.

When Nancy Davis, R....

10 Security Domains (2011 update)

Author: AHIMA

Source: AHIMA practice brief

Publication Date: July 2011

This is the original web version of the practice brief, published in the May 2012 Journal of AHIMA. This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.

Encryption Basics

Author: Stine, Kevin; Dang, Quynh

Source: Journal of AHIMA

Publication Date: May 2011


Healthcare and health IT professionals are entrusted with protecting the privacy and confidentiality of patient data. To provide this protection, these professionals frequently look to commonly accepted technologies and methodologies to safeguard the data while at rest and in transit. One tech....

Cloud Computing 101

Author: Dinh, Angela K.

Source: Journal of AHIMA

Publication Date: April 2011


In the past several years cloud computing has gained substantial recognition. However, it is still a relatively new concept for those in the healthcare industry.

Before adopting cloud-based services or applications, organizations need to understand how cloud computing works, the typ....

2009 HIMSS Security Survey

Author: HIMSS

Source: External web site

Publication Date: November 03, 2009

This study addressed security enviroments, including access to patient data, access tracking and audit logs, and medical identity theft, as well as preparedness and approaches for meeting new privacy and security requirements contained in ARRA.

2008 HIMSS Security Survey

Author:

Source: External web site

Publication Date: October 28, 2008

This report provides the results of a survey of IT and security professionals addressing security environments in healthcare organizations, including access to patient data, tracking and audit logs, network security, and medical identity theft.

Updated Toolkit for Security Strategies

Author: Cooper, Ted

Source: Journal of AHIMA

Publication Date: July 2004


The first version of the Computer-based Patient Record Institute (CPRI) toolkit “Managing Information Security in Health Care” was published on the Web in May 1999 in response to the proposed HIPAA security and electronic signature standard of October 1998. The toolkit is intended....

Primer on Encryption

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: June 2004


Encryption is an addressable implementation specification under HIPAA’s access control and transmission security standards. Many providers are grappling with just how to address these specifications:
Is there a difference between the two specifications, and if so, what is the diff....

Safe at Home: Remote Coding Meets HIPAA

Author: Keough, Tim

Source: Journal of AHIMA

Publication Date: February 2004


Remote coding offers big benefits and unique security challenges. Here’s how one organization moves patient data securely across the Internet.

"Whatever, in connection with my professional practice, or not in connection with it, I see or hear, in the life of men, which ought....

Electronic Record, Electronic Security

Author: Hagland, Mark

Source: Journal of AHIMA

Publication Date: February 2004


New technologies are enhancing the ability to protect patient information. But there’s more to successful implementation than just what’s inside the box.

Melanie Schattauer, RHIA, Jack Obert, and their colleagues at Mercy St. John’s Health System in Springfield, M....

HIPAA and the EHR: Making Technical Safeguard Changes

Author: Fodor, Joseph

Source: Journal of AHIMA

Publication Date: January 2004


As electronic health records (EHRs) become more commonplace in healthcare, changes, adjustments, and improvements will be inevitable. When designing, implementing, upgrading, or remediating an EHR system, your organization’s implementation team should consider the impact of complying wit....

Online Records Serve Patients, Clinicians, and HIM

Author: Foster, Erica; Martin, Holly; Partin, Mary; Lockshaw, Jim; Fogelman, Adam; Folz-Murphy, Nancy; Harris, C Martin

Source: Journal of AHIMA

Publication Date: September 2003


Patients want online access to their health information but clinicians and HIM professionals don’t need any more work. The solution? An online medical record driven by the EHR. Here’s one organization’s success story.

If your own increasing Internet usage isn’t p....

Moving Toward a Unified Information Security Program

Author: Ruano, Michael

Source: Journal of AHIMA

Publication Date: January 2003


Is your organization up to the challenge of creating a unified information security program?


A unified information security program has been all but mandated for healthcare organizations by the federal government. HIPAA requires that electronic, paper, and oral patient identif....

Uniting Security Forces Against Risk

Author: Wagner, Lew

Source: Journal of AHIMA

Publication Date: June 2002


Threats to your facility’s physical and information security become more complex all the time. To create a truly effective security program, consider developing an integrated security program that encompasses both traditional and information technology protection. The result? A strong, st....

Changing Face of Public Health Reporting

Author: Dougherty, Michelle

Source: Journal of AHIMA

Publication Date: April 2002


In recent months, anthrax outbreaks and concern over bioterrorism threats have created a greater need for the US to have a system to monitor and report public health information in a timely manner. The Centers for Disease Control and Prevention (CDC) are developing standards for a new approach....

Handling a Security Breach: Lessons Learned

Author: Dougherty, Michelle

Source: Journal of AHIMA

Publication Date: February 2002


Consider this: your facility just received a call from a reporter asking for a comment. He’s writing an article on a hacker who accessed your network, downloaded patient medical information, and distributed copies to the press.


If your facility experienced a security inci....

Data Transmission: A World of Possibilities

Author: Smith, Deborah A.

Source: Journal of AHIMA

Publication Date: May 2001




In a landscape of regulation and consolidation, healthcare providers must find new, cost-effective ways to communicate sensitive data with partners. Observations, lab results, and admission-discharge-transfer data must be shared accurately, confidentially, and in a timely manner with....

Information Security: It Takes a Community

Author: Hjort, Beth M.

Source: Journal of AHIMA

Publication Date: January 2001


The Health Insurance Portability and Accountability Act of 1996 (HIPAA) reinforces what HIM professionals have known for a long time: security training is a prudent and valuable mission for an organization to support. Besides the obvious need for compliance with this new federal mandate, it’s....

Access Audit Trails: En Route to Security

Author: Halpert, Aviva M.

Source: Journal of AHIMA

Publication Date: September 2000


An electronic access audit trail can be an effective security tool if the right conditions are in place. In this article, learn how to ensure that your organization has the right technology, procedures, mechanisms, and plans to implement an audit trail.
Working with healthcare informatio....

Following the Electronic Trail

Author:

Source: Journal of AHIMA

Publication Date: September 2000


How can you protect patient information while maintaining immediate access for qualified employees? HIM professionals across the country are taking leadership roles in developing and managing audit trails for computerized health information. Here are a few of their success storie....

[1] 2