Search Results

= Members only

Current search

985 results.

<< 10 11 12 13 14 15 16 17 [18] 19 20 21 22 23 24 25 >>

Identity Proofing: Just a Fancy Name for Verification?

Author: Herrin, Barry S.

Source: Journal of AHIMA

Publication Date: May 2007


Among the issues being brought to the fore in the movement to electronic health records (EHRs) is identity proofing. However, this is the same issue healthcare providers have faced for as long as patients have been contacting providers in ways other than face-to-face communications. This artic....

Policies and Procedures for a Legal EHR

Author: Quinsey, Carol Ann

Source: Journal of AHIMA

Publication Date: April 2007


As organizations move from paper to electronic health records (EHRs), one of the most critical steps is ensuring that there are policies that support the EHR as the legal health record.

Most managers know the importance of having up-to-date policies and procedures. Good pol....

Assessing and Improving EHR Data Quality: Model for Implementing an EHR Documentation Improvement Process

Author: AHIMA e-HIM Work Group on Assessing and Improving Healthcare Data Quality in the EHR

Source: Journal of AHIMA

Publication Date: March 2007


Improving data quality in an electronic healthcare environment requires a greater focus on standardized documentation procedures. With an EHR, the need to evaluate and improve healthcare data quality through concurrent assessment, data collection monitoring, and ongoing process improvement requ....

Linking Anti-fraud and Legal EHR Functions

Author: Dougherty, Michelle

Source: Journal of AHIMA

Publication Date: March 2007


The following statement could easily come from any material written on the legal electronic health record: “EHRs and information available through the NHIN [nationwide health information network] must fully comply with applicable federal and state law and meet the requirements of reliability an....

Ensuring Privacy and Security in Home Health

Author: Demster, Barbara

Source: Journal of AHIMA

Publication Date: January 2007




Every healthcare provider must customize its privacy and security program to fit its unique setting and needs. How an organization maintains its records (analog, paper, electronic, or mixed modes) drives its privacy and security procedures. While regulations provide the basic requirem....

Opening Pandora's Box: Pure Coding vs. Charge Master Driven Coding--a Case Study at Duke University Health System

Author: Stone, Fabian; Egan, Jeanne M.; LeBoutillier, Richard; Blackwelder, Dean

Source: AHIMA Convention

Publication Date: October 31, 2006

Opening Pandora’s Box: Pure Coding vs. Charge Master Driven Coding
A Case Study at Duke University Health System
Fabian Stone, MBA, MHA, Duke University Hospital
Jeanne Egan, MBA, RHIA, CHP, CCA, BearingPoint
Richard LeBoutillier, MPA, CPHQ, BearingPoint
Dean Blackwel....

<< 10 11 12 13 14 15 16 17 [18] 19 20 21 22 23 24 25 >>