Search Results

= Members only

Current search

540 results.

1 2 3 4 5 6 [7] 8 9 10 11 12 13 14 15 16 >>

Privacy and the EHR

Author: Nelson, Debra S

Source: AHIMA Convention

Publication Date: October 02, 2011


Determining how to implement privacy regulations and policies in an electronic record environment can not only be daunting but also thought of quite late in the EHR implementation process. Daily processes and tasks such as reviewing the medical record with patients to processing requests for a....

Privacy Rights Never Die: And Sometimes Complications Linger On

Author: AHIMA

Source: Journal of AHIMA

Publication Date: May 2011


The laws surrounding release of a deceased patient's records can lead to complex and frustrating situations in the HIM department. Just who has access rights depends on federal law, state law, and individual circumstances, illustrated by the two scenarios below.

Last summer the Office....

Low-Tech Threats in a High-Tech World

Author: Rollins, Genna

Source: Journal of AHIMA - website

Publication Date: April 2011



Despite the rise of health IT, healthcare providers still face daily privacy and security risks of the mundane variety—paper records are misplaced, improperly disclosed, or released without confidential information redacted. No matter the opportunities and risks that technology bring....

D.I.Y. R.O.I: Do It Yourself Release of Information

Author: Haas, Mark

Source: AHIMA Convention

Publication Date: September 29, 2010


BACKGROUND


The Massachusetts General Hospital (MGH) has seen a precipitous increase in the volume of release of information requests processed over the past five years. The Health Information Management department has struggled mightily with trying to handle this steady increas....

HITECH Security – A Practical Approach

Author: Rudloff, Rob

Source: AHIMA Convention

Publication Date: September 28, 2010


Background


HITECH has introduced new security requirements around HIPAA including new breach requirements and associated penalties. This paper addresses the information security and privacy requirements and provides practical solutions to address them. Many organizations already....

1 2 3 4 5 6 [7] 8 9 10 11 12 13 14 15 16 >>