113 results.
1 2 3 4 5 6 7 [8] 9 10 11 12
HIPAA Requirements for Secure Record Storage and Data Transfer
Author: Rosenbaum, Arnold S.; Nelson, Gina A.
Source: AHIMA Convention
Publication Date: October 15, 2004
HHS Secretary Tommy Thompson released the Final Regulations for Security Standards in final form in February 2003. The security standards were developed to help safeguard confidential health information, which is being processed increasingly by computers.
The mandates require covered ent....
Connecting with Consumers: Web-based Health Technologies and Keeping Them Secure
Author: Friedman, Beth; Pierson, Ed
Source: AHIMA Convention
Publication Date: October 15, 2004
Introduction
Do you remember the "good old days"--as in do you remember when all we had to worry about was modems.
In a recent article, Gary Hamel wrote, "The world is becoming turbulent faster than organizations are becoming resilient." And this affects both individuals and t....
Health Information Security: Revisiting the 80/20 Rule
Author: Kloss, Linda L
Source: Journal of AHIMA
Publication Date: February 2004
One of the most useful lessons I learned while working in healthcare quality improvement was the Pareto Principle, often referred to as the 80/20 rule. The concept is that in any endeavor, 20 percent of something is always responsible for 80 percent of the results.
This phenomenon i....
Using Web-based Report Management to Achieve HIPAA Compliance
Author: Levin, Jerry
Source: In Confidence (newsletter)
Publication Date: November 02, 2003
Access to patient information and the associated security and privacy issues required under HIPAA has set off a firestorm of concerns around technologies developed to address and simplify compliance. Executives charged with shepherding these technologies have been overwhelmed with the respons....
Protecting Your Assets: Identifying and Securing Against Vulnerabilities
Author: Banzhof, Carl
Source: In Confidence (newsletter)
Publication Date: October 02, 2003
In the past year alone, more than 4,100 new network vulnerabilities were identified and reported, according to Computer Emergency Response Team Coordination Center statistics. Throughout the past eight years, this number has dramatically increased, and as a result, IT professionals have inher....
Uncovering the Enemy Within: Utilizing Incident Response, Forensics
Author: Derhak, Mike
Source: In Confidence (newsletter)
Publication Date: September 02, 2003
Inappropriate sharing of protected health information. Sending intimidating e-mails. Browsing inappropriate Web sites. Downloading unauthorized Web content. Software, music, or video piracy. These are just a few examples of internal security breaches companies may face. According to the 2003....
Managing Applications, Systems Development Security Under HIPAA
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: September 02, 2003
Part seven in a 10-part series.
This article is the seventh of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. The information security domain of applications and systems development includes topics that cover the craft....
Security and HIPAA: Protecting Your Operations
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: August 02, 2003
Part six in a 10-part series.
This article is the sixth of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. The information security domain of operations security includes the topics of controls, protections, monitoring,....
Establishing Security Safeguards to Meet the Privacy Rule: What You Need to Know
Author: Gallagher, Lisa; Yale, Ken
Source: In Confidence (newsletter)
Publication Date: August 02, 2003
The HIPAA privacy rule requires that a covered entity (CE) institute appropriate administrative, technical, and physical measures to reasonably safeguard the privacy of protected health information (PHI). In order to keep information “private,” it must be kept safe or secure. Therefore, logic....
Building Privacy: Security Architecture, Models Under HIPAA
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: July 02, 2003
Part five in a 10-part series.
This article is the fifth of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. The information security domain of security architecture and models speaks to computer architectures, security....
1 2 3 4 5 6 7 [8] 9 10 11 12