113 results.
1 2 3 [4] 5 6 7 8 9 10 11 12
Guidelines for a Compliant Business Associate Agreement - Retired
Author: AHIMA
Source: AHIMA practice brief
Publication Date: November 2013
This 2013 practice brief version has been retired and is retained here for historical purposes. Read the 2016 updated version of this Practice Brief here.
The Privacy Rule portion of the Health Insurance Portability and Accountability Act (HIPAA) of 1996 defines a "business....
HIPAA Security Overview - Retired
Author: Miaoulis, William M
Source: AHIMA practice brief
Publication Date: November 2013
Editor’s note: This update replaces the April 2004 and the November 2010 practice briefs titled “A HIPAA Security Overview.”
The HIPAA security rule has remained unchanged since its implementation more than a decade ago. However, the Health Information Technology for Economic a....
The Healthcare Wall of Shame
Author: AHIMA
Source: Journal of AHIMA
Publication Date: November 2013
While stolen laptops and hacking of healthcare computer networks have dominated the headlines, healthcare privacy and security experts warn that covered entities are ignoring the risks posed by unsecured paper records.
In response to new additions to the Office for Civil Rights'....
The Privacy and Security of Occupational Health Records
Author: AHIMA
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: April 2013
The Occupational Safety and Health Administration (OSHA) defines an “occupational medical record” as an occupation-related, chronological, cumulative record, regardless of the form or process by which it is maintained (i.e., paper document, microfiche, microfilm, or automatic data processing me....
Patient Portals: Express Lane on the Health Information Highway
Author: Eramo, Lisa A
Source: Journal of AHIMA
Publication Date: September 2012
No information request traffic jams.
No toll road trips to the physical HIM department.
Just an open and instant route to patient health information.
But building and managing a patient portal requires HIM knowledge and expertise.
Patient portals are rapid....
HIPAA Compliance for Clinician Texting
Author: Greene, Adam H
Source: Journal of AHIMA
Publication Date: April 2012
The HIPAA privacy and security rules need not act as an obstacle to efficient communications, but keeping texting compliant requires planning and diligence.
Text (or SMS) messaging has become nearly ubiquitous on mobile devices. According to one survey, approximately 72 perce....
Ensuring Remote Coding Compliance
Author: Comfort, Angie
Source: Journal of AHIMA - Coding Notes
Publication Date: April 2012
More and more HIM department managers are turning to remote coding. However, before implementing this staffing model, managers must answer several questions regarding the privacy and security of patient information, including:
What are the compliance risks?
How will privacy and secu....
Keeping It Private: Staying Compliant with the HIPAA Privacy and Security Rules
Author: Tomes, Jonathan P.
Source: Journal of AHIMA
Publication Date: March 2012
HHS's renewed interest in auditing for compliance is a good reminder to covered entities to ensure their privacy and security programs are up to date.
The Department of Health and Human Services' (HHS) announcement of a new program to audit compliance with the HIPAA priva....
Automation for Privacy and Security Compliance
Author: McLendon, Kelly
Source: Journal of AHIMA
Publication Date: March 2012
There has been a lack of enforcement of the privacy and security rules ever since HIPAA's inception. As such the adoption of comprehensive HIPAA compliance programs has lagged behind EHR development and implementation.
This in turn has caused little funding to be budgeted by provide....
Managing Compliance in Healthcare An Integrated Approach to Privacy, Security, and Identity Management
Author: Shim, Steven
Source: AHIMA Convention
Publication Date: October 02, 2011
Overview
This is a unique and challenging time for the healthcare industry in terms of Health Information Technology (IT) adoption and satisfying regulatory requirements such as the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and HITECH Act privacy and security com....
1 2 3 [4] 5 6 7 8 9 10 11 12