Search Results

= Members only

Current search

540 results.

1 2 3 [4] 5 6

Privacy Architecture and e-Consent

Author: Connor, Kathleen

Source: Journal of AHIMA

Publication Date: June 2007


As the US prepares to implement a nationwide health information network (NHIN), one issue that repeatedly surfaces is how to appropriately protect the privacy and security of electronic health information. Of particular concern is how such a system can accommodate the various legal restriction....

Subpoena by Any Other Name Might Not be Legal

Author: Whitney, Jo Ellen

Source: Journal of AHIMA

Publication Date: May 2007


Generally when an opposing party is seeking medical records from a care provider, the first request is accompanied by a subpoena, which can be difficult for an HIM department to assess in terms of what-if any-records can be produced.

A subpoena accompanied by a HIPAA-compliant consen....

Reaffirming Your HIPAA Compliance Efforts

Author: Woloszyn, William

Source: Journal of AHIMA

Publication Date: April 2005


Two years after the HIPAA privacy compliance date, is it time for your organization to reassess your efforts and recommit to enforcing HIPAA?
Revisiting HIPAA’s Roots

The HIPAA privacy regulation was created in response to public healthcare concerns about the privacy of pa....

Outsourcing ROI: Does it Make Sense for You?

Author: Bellenghi, G. Michael

Source: Journal of AHIMA

Publication Date: April 2005


Governed by state and federal regulations, release of information (ROI) is a time-consuming and sensitive process. Failure to fulfill requests accurately and on time can have painful ramifications, affecting quality of patient care and prompting irate phone calls and legal action or fines. Not....

Journal Q&A (11/04)

Author: AHIMA Professional Practice Team

Source: AHIMA Q and A

Publication Date: November 02, 2004


Q: As a covered entity, do I need to have satisfactory assurance (as required by HIPAA) that an individual has been notified when I am served with a search warrant for a patient's protected health information (PHI)?
A: No. A search warrant is issued by a judge and is considered the same a....

HIPAA and Privacy: After the Compliance Date

Author: Mikels, Debbie

Source: AHIMA Convention

Publication Date: October 15, 2004

Abstract

This article reviews successful strategies in preparing for HIPAA Privacy compliance. There are ongoing challenges organizations will face after the compliance date, such as managing research issues, identifying all business associates, and managing the accounting of disclosures....

Managing HIPAA as Gatekeeper

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: September 2004


An unfortunate result of the HIPAA privacy rule is the emerging use of HIPAA as a gatekeeper, restricting the appropriate fl ow of protected health information (PHI). HIPAA is being cited as a reason not to disclose information without patient permission when needed for treatment, payment, or....

Assessing Privacy Risk in Outsourcing

Author: Davino, Margaret

Source: Journal of AHIMA

Publication Date: March 2004


Healthcare providers can outsource transcription, but they can’t outsource their obligation to safeguard privacy. Here’s how to minimize risk.
Healthcare providers are faced with multiple pressures, many of them financial. The need for management to meet financial constraints....

Electronic Record, Electronic Security

Author: Hagland, Mark

Source: Journal of AHIMA

Publication Date: February 2004


New technologies are enhancing the ability to protect patient information. But there’s more to successful implementation than just what’s inside the box.

Melanie Schattauer, RHIA, Jack Obert, and their colleagues at Mercy St. John’s Health System in Springfield, M....

Proof Is in the Policy

Author: Walsh, Tom

Source: Journal of AHIMA

Publication Date: February 2004


Proving security compliance later requires establishing documentation now. HIM professionals have a valuable role to play.

HIM professionals played central roles in their organization’s privacy efforts, ensuring that appropriate policies, procedures, and documents were in plac....

HIPAA and the EHR: Making Technical Safeguard Changes

Author: Fodor, Joseph

Source: Journal of AHIMA

Publication Date: January 2004


As electronic health records (EHRs) become more commonplace in healthcare, changes, adjustments, and improvements will be inevitable. When designing, implementing, upgrading, or remediating an EHR system, your organization’s implementation team should consider the impact of complying wit....

How Law, Investigation, Ethics Connect to HIPAA

Author: Ruano, Michael

Source: In Confidence (newsletter)

Publication Date: November 02, 2003


Part nine in a 10-part series.
This article is the ninth of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. The information security domain of law, investigation, and ethics covers these topics in depth and provides a p....

Handling Release of Information Over the Phone

Author: Hjort, Beth M.

Source: In Confidence (newsletter)

Publication Date: November 02, 2003


Q: Hospitals must have sensitive yet confidential policies for handling concerned family and friends with questions about loved ones within their facilities. How can a covered entity (CE) be confident about appropriate telephone release of information when it’s so difficult to validate a call....

Journal Q&A (9/03)

Author: AHIMA Professional Practice Team

Source: AHIMA Q and A

Publication Date: September 02, 2003

Q: Under HIPAA, how should covered entities respond to requests from public health officials who state that they need protected health information (PHI) to carry out their duties?

A: The privacy rule recognizes that PHI may be needed to respond to threats to public health, including the....

New Tool Streamlines HIPAA Assessment Process

Author: Cohen, Kathleen

Source: In Confidence (newsletter)

Publication Date: August 02, 2003


How are you making sure that your organization is complying with the HIPAA privacy regulations? Many hospitals are doing HIPAA rounds with privacy officers, going from unit to unit to assess and document HIPAA compliance. But trying to make sense of the data collected during HIPAA rounds can....

Journal Q&A (6/03)

Author: AHIMA Professional Practice Team

Source: AHIMA Q and A

Publication Date: June 02, 2003

Q: Under the privacy rule, how should a physician’s office handle a request from parents for a written statement recommending limitation of their child’s activities at school?

A: Most covered entities have policies requiring written requests or authorizations for disclosure of....

Oral Privacy and HIPAA: We Really Need to Talk

Author: Jacobs, Jodi

Source: In Confidence (newsletter)

Publication Date: June 02, 2003


Oral privacy is not a new need or requirement in healthcare. However, because it is now backed by a federal mandate, it is receiving newfound attention. With the passing of the April 14, 2003, deadline for HIPAA compliance, hospitals, pharmacies, clearinghouses, physician’s offices, military....

Cryptography and HIPAA: Breaking the Code

Author: Ruano, Michael

Source: In Confidence (newsletter)

Publication Date: June 02, 2003


Part four in a 10-part series.
This article is the fourth of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. The information security domain of cryptography is probably the most complex and mathematical of all the domai....

Obtaining Satisfactory Assurance for PHI Disclosure

Author: Quinsey, Carol Ann

Source: Journal of AHIMA

Publication Date: June 2003


Obtaining “satisfactory assurance” in the privacy rule may sound like something new, but the concept has been around for a long time. Do you know what it means and how it affects your HIM department? This article will explain what obtaining satisfactory assurance means and how it can....

Journal Q&A (6/03)

Author: AHIMA Professional Practice Team

Source: AHIMA Q and A

Publication Date: June 02, 2003

Q: What are a covered entity’s legal responsibilities when a former employee breaches confidentiality of information gained during his or her employment period?

A: Individual state laws would affect the outcome of litigation if charges were pressed through civil action. If the organ....

Sorting Out Employee Sanctions

Author: Burrington-Brown, Jill

Source: Journal of AHIMA

Publication Date: June 2003


Has your organization addressed sanctions related to privacy and security issues? Both the final privacy rule and final security rule address this issue. The privacy rule states that the covered entity must “have and apply appropriate sanctions against members of its workforce who fail to....

Accounting for Disclosure Cost Analysis Worksheet

Author: Dunn, Rose T

Source: External - used with permission

Publication Date: May 02, 2003

This worksheet has been developed to provide guidance on components to consider in developing the basis for a reasonable, cost-based charge for the Accounting for Disclosure (164.528). This worksheet is not intended to be all inclusive. Users are encouraged to discuss inclusions to this analysis with their facility’s cost accountant.

Calculating Costs for Accounting of Disclosures

Author: Dunn, Rose T

Source: Journal of AHIMA

Publication Date: May 2003


The privacy rule allows a covered entity to charge a cost-based fee for providing an accounting of disclosure (AOD). Has your organization determined these costs? Calculating the actual costs may be more involved than you think. This article will discuss the requirements for setting the fee an....

Catching Up with HIPAA: Managing Noncompliance

Author: Weintraub, Abner E.

Source: Journal of AHIMA

Publication Date: May 2003


With the April 14 HIPAA privacy deadline behind us, many covered entities are still struggling to become compliant. Limited budgets and staff, conflicting advice, and unforeseen delays have all conspired to keep many covered entities from meeting the deadline.


What do you tell....

Is Your NPP Your Best Defense?

Author: Lee, Michael R.

Source: Journal of AHIMA

Publication Date: April 2003


In the event of a privacy-related legal challenge, the content of your organization’s notice of privacy practices (NPP) will be a focal point for both plaintiff and defense arguments with respect to the protected health information (PHI) disclosure activities of your organization. Is your....

Computer Recycling: Are you Legally Prepared

Author: Harford, Joseph P.

Source: Journal of AHIMA

Publication Date: March 2003


None of these methods of disposal address healthcare organizations’ environmental or legal responsibilities. But how do you know if your organization is legally positioned to handle disposal of computer equipment? This article will address these concerns.

What Is Legal?
<....

Sample Policy: Protecting Patient Privacy from Outside Callers

Author: AHIMA

Source: Journal of AHIMA

Publication Date: February 2003


Background: It is customary for family members, legal guardians, and friends of patients at [name of hospital] to telephone the hospital, inquire in person about the condition of a patient, or to request other health information. Privacy regulations require that a patient’s identity or oth....

Protecting Verbal PHI: a Plan

Author: Birnbaum, Cassi L

Source: Journal of AHIMA

Publication Date: February 2003


Does your organization have a policy in place for protecting patient health information (PHI) over the phone?


This article will discuss how a workgroup at Children’s Hospital and Health Center (CHHC) in San Diego, CA, implemented a policy to protect verbal PHI and how your....

Staff Discovery Tools

Author:

Source: AHIMA web extra

Publication Date: February 02, 2003


Use one of the two approaches below to involve and educate staff on privacy issues. The second method uses a more structured approach.
1. Protected health information (PHI) is confidential information that includes a patient's identity and medical information. Identify instances where PHI....

1 2 3 [4] 5 6