337 results.
1 2 3 4 5 6 [7] 8 9 10 11 12 13 14
EHR 2014: Highlights of the Proposed Stage 2 Certification Rule
Author: Heubusch, Kevin
Source: Journal of AHIMA
Publication Date: May 2012
Access + Understanding: The Role of Health Literacy in Patient-Centric Health IT
Author: Heubusch, Kevin
Source: Journal of AHIMA
Publication Date: May 2010
Fall Preview: A Look at the Season’s Expected Rules
Author: Heubusch, Kevin
Source: Journal of AHIMA
Publication Date: November 2011
Little Breaches: OCR Releases First “Small Breach” Data
Author: Heubusch, Kevin
Source: Journal of AHIMA
Publication Date: October 2011
Breathing Room: Early Adopters Have More Time for Stage 2
Author: Heubusch, Kevin
Source: Journal of AHIMA
Publication Date: January 2012
Access Report: OCR Tries Subtraction through Addition in Accounting of Disclosure Rule
Author: Heubusch, Kevin
Source: Journal of AHIMA
Publication Date: July 2011
Pick One: Comparing the Medicare and Medicaid EHR Incentive Programs
Author: Heubusch, Kevin
Source: Journal of AHIMA
Publication Date: September 2011
A Possible Delay for Stage 2
Author: Heubusch, Kevin
Source: Journal of AHIMA
Publication Date: June 2011
Rules of Spring: Reviewing the Upcoming Regulations on HIPAA Privacy Rule Modifications
Author: Heubusch, Kevin
Source: Journal of AHIMA
Publication Date: April 2011
What’s New in 2: Top Changes in the Stage 2 Rule
Author: Heubusch, Kevin
Source: Journal of AHIMA
Publication Date: April 2012
The 63rd REC: http://healthit.gov
Author: Heubusch, Kevin
Source: Journal of AHIMA
Publication Date: February 2012
On the HIPAA Hook
Author: Hicks, Andrew
Source: Journal of AHIMA
Publication Date: April 2014
Recommendations by the Certification and Adoption Workgroup
Author: HIT Policy Committee
Source: Government (U.S.)
Publication Date: July 16, 2009
Meaningful Use Matrix
Author: HIT Policy Committee
Source: Government (U.S.)
Publication Date: July 16, 2009
[DRAFT] Template: Health Information Privacy and Security Breach Notification Letter
Author: Hjort, Beth M.
Source: AHIMA
Publication Date: November 24, 2009
Elements of a Breach Notification Letter
Author: Hjort, Beth M.
Source: Journal of AHIMA
Publication Date: February 2010
Putting It in Writing: Updating BA Agreements to Cover Breach Notification
Author: Hjort, Beth M.; Rhodes, Harry B.
Source: Journal of AHIMA
Publication Date: June 2010
Privacy After Death
Author: Hofman, Judi
Source: Journal of AHIMA
Publication Date: April 2013
The Problem List beyond Meaningful Use: Part I: The Problems with Problem Lists
Author: Holmes, Casey
Source: Journal of AHIMA
Publication Date: February 2011
The Problem List beyond Meaningful Use: Part 2: Fixing the Problem List
Author: Holmes, Casey
Source: Journal of AHIMA
Publication Date: March 2011
The Health Data Analyst’s To-Do List: Demand for Analytics Fueled by ARRA, PPACA, and ICD-10
Author: Hyde, Linda A.
Source: Journal of AHIMA
Publication Date: October 2010
Resolving Problem List Problems: HIM’s Role in Maintaining an Effective EHR Problem List
Author: Kadlec, Lesley
Source: Journal of AHIMA
Publication Date: November 2013
HIM Best Practices for Engaging Consumers in Their Overall Healthcare
Author: Kadlec, Lesley; Kirby, Annessa; Shaffer, Heidi; Warren, Paula
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: September 2015
Analyzing Clinical Quality Measures for Meaningful Use
Author: Kallem, Crystal
Source: Journal of AHIMA
Publication Date: November 2010
Health Information Exchange Readiness for Demonstrating Return on Investment and Quality of Care
Author: Khurshid, Anjum; Diana, Mark L; Jain, Rahul
Source: Perspectives in Health Information Management
Publication Date: 2015
1 2 3 4 5 6 [7] 8 9 10 11 12 13 14