Search Results

= Members only

Current search

985 results.

<< 3 4 5 6 7 8 9 10 [11] 12 13 14 15 16 17 18 >>

Navigating a Compliant Breach Management Process

Author: Downing, Katherine

Source: AHIMA practice brief | Journal of AHIMA

Publication Date: June 2014

The purpose of AHIMA’s new Breach Management Toolkit is to provide a comprehensive collection of resources and best practices to help healthcare organizations and health information management (HIM) professionals navigate their way through the Health Insurance Portability and Accountability Act (HIPAA) Breach Notification Rule and the overall breach management process. The toolkit is intended to raise awareness of the importance and responsibility of everyone within the organization to report HIPAA breaches to the appropriate designated personnel, as well as provide breach prevention education and training.

Managing the Integrity of Patient Identity in Health Information Exchange (2014 update)

Author: AHIMA Work Group

Source: AHIMA practice brief | Journal of AHIMA

Publication Date: May 2014

This Practice Brief explores the complexity of patient identification integrity, including how organizations can manage patient identification systems from front end data capture to back end quality control as an ongoing process and carry local quality operations into health information exchange efforts. It urges industry stakeholders to recognize that now is a critical time to address accuracy in patient identification systems.

Computer-assisted Coding Toolkit

Author: AHIMA Work Group

Source: AHIMA toolkit

Publication Date: May 2014

This toolkit provides many of the necessary tools and documents necessary for a successful implementation. It will be helpful to those who wish to plan and prepare for the implementation of CAC in ambulatory (including physician), acute care inpatient, or outpatient hospital settings.

Privacy and Security Audits of Electronic Health Information (2014 update)

Author: Walsh, Tom; Miaoulis, William M

Source: AHIMA practice brief | Journal of AHIMA

Publication Date: March 2014

In a perfect world, access controls alone would ensure the privacy and security of electronic protected health information (ePHI). However, the complexities of today’s healthcare environment make it extremely challenging to limit access to the minimum information necessary that members of the workforce require in order to perform their jobs.

<< 3 4 5 6 7 8 9 10 [11] 12 13 14 15 16 17 18 >>