Search Results

= Members only

Current search

540 results.

1 [2] 3 4 5 6

HITECH Frequently Asked Privacy, Security Questions: Part 3

Author: Rose, Angela Dinh; Greene, Adam H

Source: Journal of AHIMA | AHIMA Q and A

Publication Date: March 2014

This article concludes a three-part series discussing the most commonly asked questions regarding compliance requirements surrounding the final HITECH Omnibus Rule, released in January 2013. It highlights the updated requirements and provides answers to questions regarding decedent protected health information (PHI), the release of immunization records to schools, and the enhanced request for restrictions requirements.

Checking In on Accounting of Disclosures

Author: Downing, Kathy; McLendon, Kelly

Source: Journal of AHIMA

Publication Date: November 2013



Accounting of disclosures (AOD) is one "patient right" listed within the HIPAA Privacy Rule. Since the rules were implemented in 2003, AOD has been a topic of much discussion but has not generated much regulatory action from the US Department of Health and Human Services' (HHS) Office for....

The Healthcare Wall of Shame

Author: AHIMA

Source: Journal of AHIMA

Publication Date: November 2013


While stolen laptops and hacking of healthcare computer networks have dominated the headlines, healthcare privacy and security experts warn that covered entities are ignoring the risks posed by unsecured paper records.


In response to new additions to the Office for Civil Rights'....

Performing a Breach Risk Assessment - Retired

Author: AHIMA

Source: AHIMA practice brief | Journal of AHIMA

Publication Date: September 2013


On August 24, 2009, the US Department of Health and Human Services (HHS) published 45 CFR Parts 160 and 164 Breach Notification for Unsecured Protected Health Information; Interim Final Rule to implement the breach notification provisions of the Health Information Technology for Economic and Cl....

Adapting BA Practices to Meet the Omnibus Rule

Author: McSteen, Thomas

Source: Journal of AHIMA

Publication Date: September 2013



The 2013 HIPAA Omnibus Rule marks a key milestone for implementation of the 2009 Health Information Technology for Economic and Clinical Health Act (HITECH). One of the most far-reaching impacts of HITECH and the Omnibus Rule is that business associates (BA) and their subcontractors now mu....

HIPAA Changes Call for Revising BA Agreements

Author: McDavid, Jan P

Source: Journal of AHIMA

Publication Date: May 2013



Business associates (BAs) of HIPAA-covered entities like hospitals and doctor's offices should already be intimately acquainted with HIPAA's privacy and security regulations. BAs should already have business associate agreements with every covered entity with whom they work and assume resp....

Breach Notification Triggers Receive Update

Author: Bowen, Rita K.

Source: Journal of AHIMA - website

Publication Date: April 2013



The HIPAA Omnibus Rule, the new Final Rule modifying HIPAA, was published in the Federal Register on January 25, 2013. The amended rule went into effect on March 26 and full compliance is expected by September 23. For HIM professionals, the most far-reaching of the changes to HIPAA is that....

Treating Healthcare with Health "I"T

Author: Dimick, Chris

Source: Journal of AHIMA

Publication Date: September 2012




Patient-Centric Stage 2 Meaningful Use Measures Considered Treatment for Ailing US Health System



The US healthcare system is ill. Higher costs, sicker patients, and struggling providers are the symptoms of the disease that has sent industry stakeholders scrambling t....

Data Ownership Evolves with Technology

Author: Demster, Barbara

Source: Journal of AHIMA

Publication Date: September 2012


Technology has transformed the world of health information management (HIM), bringing about change for many of the field’s longstanding professional concepts and work methods. The classic rule of ownership in the words-on-paper era of health records was that “the paper (physical medium) belong....

Tips for Record Requests

Author: AHIMA

Source: Journal of AHIMA

Publication Date: April 2012


If patients have never requested their medical records from their doctor or hospital before, the process can seem complicated. However, a few basic steps can help streamline the process:

Read online or call the facility's HIM department for information specific to your request. This....

HIPAA Compliance for Clinician Texting

Author: Greene, Adam H

Source: Journal of AHIMA

Publication Date: April 2012



The HIPAA privacy and security rules need not act as an obstacle to efficient communications, but keeping texting compliant requires planning and diligence.

Text (or SMS) messaging has become nearly ubiquitous on mobile devices. According to one survey, approximately 72 perce....

Ensuring Remote Coding Compliance

Author: Comfort, Angie

Source: Journal of AHIMA - Coding Notes

Publication Date: April 2012


More and more HIM department managers are turning to remote coding. However, before implementing this staffing model, managers must answer several questions regarding the privacy and security of patient information, including:
What are the compliance risks?
How will privacy and secu....

A New Age for Mental and Substance Abuse Health Records: Considerations for Protecting Highly Sensitive Records in Electronic Systems

Author: Gorton, Elisa R.

Source: Journal of AHIMA

Publication Date: April 2012


Mental health and substance abuse records are generally recognized as containing "sensitive" protected health information (PHI) in need of privacy and security measures above and beyond what is required by HIPAA. There was a time when this sensitive PHI was kept separate and apart from a patie....

The New Privacy Officer

Author: Dimick, Chris

Source: Journal of AHIMA

Publication Date: April 2012



It has been a decade since the first privacy officers took their jobs in response to the HIPAA privacy rule. A slew of changes since then have added more responsibility, required more skills, and demanded more time of them than anyone could have imagined.

When Nancy Davis, R....

Documentation Trends in the Health Record

Author: Dooling, Julie A

Source: Journal of AHIMA

Publication Date: March 2012


The meaningful use program is well under way, helping providers and organizations adopt EHRs to capture complete and comprehensive documentation. To qualify for incentives in stage 1, organizations have adjusted their documentation processes to meet certain objectives and measures and will con....

Automation for Privacy and Security Compliance

Author: McLendon, Kelly

Source: Journal of AHIMA

Publication Date: March 2012


There has been a lack of enforcement of the privacy and security rules ever since HIPAA's inception. As such the adoption of comprehensive HIPAA compliance programs has lagged behind EHR development and implementation.

This in turn has caused little funding to be budgeted by provide....

How to Request Your Medical Records

Author: Dimick, Chris

Source: Journal of AHIMA - website

Publication Date: March 2012



If you’ve never requested your medical records from your doctor or hospital before, the process can seem complicated. However, understanding the law and the basic requirements will ease the process.

The Record Request Process


The basic process for requesting a medica....

Privacy and the EHR

Author: Nelson, Debra S

Source: AHIMA Convention

Publication Date: October 02, 2011


Determining how to implement privacy regulations and policies in an electronic record environment can not only be daunting but also thought of quite late in the EHR implementation process. Daily processes and tasks such as reviewing the medical record with patients to processing requests for a....

Privacy Rights Never Die: And Sometimes Complications Linger On

Author: AHIMA

Source: Journal of AHIMA

Publication Date: May 2011


The laws surrounding release of a deceased patient's records can lead to complex and frustrating situations in the HIM department. Just who has access rights depends on federal law, state law, and individual circumstances, illustrated by the two scenarios below.

Last summer the Office....

Low-Tech Threats in a High-Tech World

Author: Rollins, Genna

Source: Journal of AHIMA - website

Publication Date: April 2011



Despite the rise of health IT, healthcare providers still face daily privacy and security risks of the mundane variety—paper records are misplaced, improperly disclosed, or released without confidential information redacted. No matter the opportunities and risks that technology bring....

D.I.Y. R.O.I: Do It Yourself Release of Information

Author: Haas, Mark

Source: AHIMA Convention

Publication Date: September 29, 2010


BACKGROUND


The Massachusetts General Hospital (MGH) has seen a precipitous increase in the volume of release of information requests processed over the past five years. The Health Information Management department has struggled mightily with trying to handle this steady increas....

HITECH Security – A Practical Approach

Author: Rudloff, Rob

Source: AHIMA Convention

Publication Date: September 28, 2010


Background


HITECH has introduced new security requirements around HIPAA including new breach requirements and associated penalties. This paper addresses the information security and privacy requirements and provides practical solutions to address them. Many organizations already....

Data Security Compliance in IT Asset Disposition

Author: Adam, Chris

Source: AHIMA Convention

Publication Date: September 28, 2010


Introduction

Stories about the theft of confidential data have made headlines all too frequently over the past few years. This reality is forcing some businesses to face up to an inconvenient truth: Many organizations have no reliable procedures to ensure that the computers and rel....

Understanding the HIE Landscape

Author: AHIMA

Source: AHIMA practice brief

Publication Date: September 2010


The health information exchange (HIE) landscape has changed dramatically over the past five years. More HIEs are available to organizations and providers than ever before. Industry initiatives leveraging technological advances and the call for all Americans to have an electronic health record b....

Smart Training on Privacy and Security

Author: Bacik, Sandy

Source: Journal of AHIMA

Publication Date: July 2010


ARRA's modifications to the HIPAA privacy and security rules are setting off a new round of training in facilities large and small. Trainers must fit the new training into existing schedules that already include organizational policies and procedures, HIPAA, and other regulations such as the R....

Workflow for Breach Notification

Author: Walsh, Tom

Source: Journal of AHIMA

Publication Date: April 2010


Federal regulations that took effect in September 2009 require HIPAA covered entities and their business associates to notify individuals if their protected health information (PHI) was accessed or disclosed in an unauthorized manner or by unauthorized individuals. Certain exemptions apply, su....

Smart Training on Privacy and Security (expanded version)

Author: Bacik, Sandy

Source: Journal of AHIMA

Publication Date: April 2010



There is plenty of privacy and security training to be done, and many trainers struggle to get resources from their organizations and attention from their audiences. Sandy Bacik, CISSP, ISSMP, CISM, CGEIT, is a principal consultant at EnerNex and a former chief security officer. Here she o....

Snap Judgment

Author: AHIMA Professional Ethics Committee

Source: Journal of AHIMA - website

Publication Date: April 01, 2010





Anyone who is a member of AHIMA or holds its credentials agrees to abide by its code of ethics.


The code sets forth professional values and ethical principles, and it offers guidelines to which professionals aspire. “Ethical behaviors result from a pe....

Few Requests for Today’s Accountings

Author: AHIMA

Source: Journal of AHIMA

Publication Date: February 2010


HIPAA’s Accounting of Disclosure Provisions Led to Few Patient Requests; Now ARRA Is Upping the Ante

Provisions within the American Recovery and Reinvestment Act extend HIPAA’s accounting of disclosure regulations for providers who maintain electronic health records. The provisions a....

Elements of a Breach Notification Letter

Author: Hjort, Beth M.

Source: Journal of AHIMA

Publication Date: February 2010


This month covered entities are subject to penalties for noncompliance with new federal privacy and security breach notification laws issued by the Department of Health and Human Services.

HHS issued an interim final rule titled “Breach Notification for Unsecured Protected Health Info....

1 [2] 3 4 5 6