Search Results

= Members only

Current search

540 results.

<< 7 8 9 10 11 12 13 14 15 [16] 17 18 19 20 21 22

Journal Q&A (6/03)

Author: AHIMA Professional Practice Team

Source: AHIMA Q and A

Publication Date: June 02, 2003

Q: What are a covered entity’s legal responsibilities when a former employee breaches confidentiality of information gained during his or her employment period?

A: Individual state laws would affect the outcome of litigation if charges were pressed through civil action. If the organ....

Sorting Out Employee Sanctions

Author: Burrington-Brown, Jill

Source: Journal of AHIMA

Publication Date: June 2003


Has your organization addressed sanctions related to privacy and security issues? Both the final privacy rule and final security rule address this issue. The privacy rule states that the covered entity must “have and apply appropriate sanctions against members of its workforce who fail to....

Accounting for Disclosure Cost Analysis Worksheet

Author: Dunn, Rose T

Source: External - used with permission

Publication Date: May 02, 2003

This worksheet has been developed to provide guidance on components to consider in developing the basis for a reasonable, cost-based charge for the Accounting for Disclosure (164.528). This worksheet is not intended to be all inclusive. Users are encouraged to discuss inclusions to this analysis with their facility’s cost accountant.

Calculating Costs for Accounting of Disclosures

Author: Dunn, Rose T

Source: Journal of AHIMA

Publication Date: May 2003


The privacy rule allows a covered entity to charge a cost-based fee for providing an accounting of disclosure (AOD). Has your organization determined these costs? Calculating the actual costs may be more involved than you think. This article will discuss the requirements for setting the fee an....

Catching Up with HIPAA: Managing Noncompliance

Author: Weintraub, Abner E.

Source: Journal of AHIMA

Publication Date: May 2003


With the April 14 HIPAA privacy deadline behind us, many covered entities are still struggling to become compliant. Limited budgets and staff, conflicting advice, and unforeseen delays have all conspired to keep many covered entities from meeting the deadline.


What do you tell....

Is Your NPP Your Best Defense?

Author: Lee, Michael R.

Source: Journal of AHIMA

Publication Date: April 2003


In the event of a privacy-related legal challenge, the content of your organization’s notice of privacy practices (NPP) will be a focal point for both plaintiff and defense arguments with respect to the protected health information (PHI) disclosure activities of your organization. Is your....

Computer Recycling: Are you Legally Prepared

Author: Harford, Joseph P.

Source: Journal of AHIMA

Publication Date: March 2003


None of these methods of disposal address healthcare organizations’ environmental or legal responsibilities. But how do you know if your organization is legally positioned to handle disposal of computer equipment? This article will address these concerns.

What Is Legal?
<....

Sample Policy: Protecting Patient Privacy from Outside Callers

Author: AHIMA

Source: Journal of AHIMA

Publication Date: February 2003


Background: It is customary for family members, legal guardians, and friends of patients at [name of hospital] to telephone the hospital, inquire in person about the condition of a patient, or to request other health information. Privacy regulations require that a patient’s identity or oth....

Protecting Verbal PHI: a Plan

Author: Birnbaum, Cassi L

Source: Journal of AHIMA

Publication Date: February 2003


Does your organization have a policy in place for protecting patient health information (PHI) over the phone?


This article will discuss how a workgroup at Children’s Hospital and Health Center (CHHC) in San Diego, CA, implemented a policy to protect verbal PHI and how your....

Staff Discovery Tools

Author:

Source: AHIMA web extra

Publication Date: February 02, 2003


Use one of the two approaches below to involve and educate staff on privacy issues. The second method uses a more structured approach.
1. Protected health information (PHI) is confidential information that includes a patient's identity and medical information. Identify instances where PHI....

<< 7 8 9 10 11 12 13 14 15 [16] 17 18 19 20 21 22