337 results.
<< 9 10 11 12 13 14 15 16 [17] 18 19 20 21 22 23 24 >>
The 63rd REC: http://healthit.gov
Author: Heubusch, Kevin
Source: Journal of AHIMA
Publication Date: February 2012
In a January 6 blog post, Farzad Mostashari, MD, national coordinator for health IT, summarized a busy year at his office, highlighting 10 of 2011's "most notable developments in the world of health information technology and ONC."
Among these were 62 regional health IT extension ce....
On the HIPAA Hook
Author: Hicks, Andrew
Source: Journal of AHIMA
Publication Date: April 2014
Some healthcare business associates are still asking if HITECH-HIPAA impacts them. The answer is just as important to their affiliated healthcare providers.
Thousands of companies are now legally obligated to comply with the HITECH-HIPAA regulations because of their busines....
Recommendations by the Certification and Adoption Workgroup
Author: HIT Policy Committee
Source: Government (U.S.)
Publication Date: July 16, 2009
Meaningful Use Matrix
Author: HIT Policy Committee
Source: Government (U.S.)
Publication Date: July 16, 2009
[DRAFT] Template: Health Information Privacy and Security Breach Notification Letter
Author: Hjort, Beth M.
Source: AHIMA
Publication Date: November 24, 2009
Elements of a Breach Notification Letter
Author: Hjort, Beth M.
Source: Journal of AHIMA
Publication Date: February 2010
This month covered entities are subject to penalties for noncompliance with new federal privacy and security breach notification laws issued by the Department of Health and Human Services.
HHS issued an interim final rule titled “Breach Notification for Unsecured Protected Health Info....
Putting It in Writing: Updating BA Agreements to Cover Breach Notification
Author: Hjort, Beth M.; Rhodes, Harry B.
Source: Journal of AHIMA
Publication Date: June 2010
When ARRA extended sections of the HIPAA privacy and security rules to cover business associates (BAs), it created a seismic shift in their contractual relationships with covered entities (CEs). Further, the changes became effective simultaneous with other ARRA amendments that require CEs and....
Privacy After Death
Author: Hofman, Judi
Source: Journal of AHIMA
Publication Date: April 2013
Due to new HIPAA rules, HIM must strike an appropriate privacy balance when releasing decedent records
The Problem List beyond Meaningful Use: Part I: The Problems with Problem Lists
Author: Holmes, Casey
Source: Journal of AHIMA
Publication Date: February 2011
The meaningful use program requires that problem lists in the EHR use a common dictionary through coding. It is a good first step in boosting the usefulness of problem lists, but getting to the next level will be a harder challenge-agreeing on standardized content and use.
Last mont....
The Problem List beyond Meaningful Use: Part 2: Fixing the Problem List
Author: Holmes, Casey
Source: Journal of AHIMA
Publication Date: March 2011
Yesterday's problem lists aren't suited for tomorrow's electronic systems. Standardizing the content and use of problem lists will help leverage new tools, and new tools can help improve problem list accuracy.
The problem list, that cheat sheet to patient health, originated with Law....
<< 9 10 11 12 13 14 15 16 [17] 18 19 20 21 22 23 24 >>