Search Results

= Members only

Current search

540 results.

1 2 [3] 4 5 6 7 8

Privacy and the EHR

Author: Nelson, Debra S

Source: AHIMA Convention

Publication Date: October 02, 2011


Determining how to implement privacy regulations and policies in an electronic record environment can not only be daunting but also thought of quite late in the EHR implementation process. Daily processes and tasks such as reviewing the medical record with patients to processing requests for a....

Privacy Rights Never Die: And Sometimes Complications Linger On

Author: AHIMA

Source: Journal of AHIMA

Publication Date: May 2011


The laws surrounding release of a deceased patient's records can lead to complex and frustrating situations in the HIM department. Just who has access rights depends on federal law, state law, and individual circumstances, illustrated by the two scenarios below.

Last summer the Office....

Low-Tech Threats in a High-Tech World

Author: Rollins, Genna

Source: Journal of AHIMA - website

Publication Date: April 2011



Despite the rise of health IT, healthcare providers still face daily privacy and security risks of the mundane variety—paper records are misplaced, improperly disclosed, or released without confidential information redacted. No matter the opportunities and risks that technology bring....

D.I.Y. R.O.I: Do It Yourself Release of Information

Author: Haas, Mark

Source: AHIMA Convention

Publication Date: September 29, 2010


BACKGROUND


The Massachusetts General Hospital (MGH) has seen a precipitous increase in the volume of release of information requests processed over the past five years. The Health Information Management department has struggled mightily with trying to handle this steady increas....

HITECH Security – A Practical Approach

Author: Rudloff, Rob

Source: AHIMA Convention

Publication Date: September 28, 2010


Background


HITECH has introduced new security requirements around HIPAA including new breach requirements and associated penalties. This paper addresses the information security and privacy requirements and provides practical solutions to address them. Many organizations already....

Data Security Compliance in IT Asset Disposition

Author: Adam, Chris

Source: AHIMA Convention

Publication Date: September 28, 2010


Introduction

Stories about the theft of confidential data have made headlines all too frequently over the past few years. This reality is forcing some businesses to face up to an inconvenient truth: Many organizations have no reliable procedures to ensure that the computers and rel....

Understanding the HIE Landscape

Author: AHIMA

Source: AHIMA practice brief

Publication Date: September 2010


The health information exchange (HIE) landscape has changed dramatically over the past five years. More HIEs are available to organizations and providers than ever before. Industry initiatives leveraging technological advances and the call for all Americans to have an electronic health record b....

Smart Training on Privacy and Security

Author: Bacik, Sandy

Source: Journal of AHIMA

Publication Date: July 2010


ARRA's modifications to the HIPAA privacy and security rules are setting off a new round of training in facilities large and small. Trainers must fit the new training into existing schedules that already include organizational policies and procedures, HIPAA, and other regulations such as the R....

Workflow for Breach Notification

Author: Walsh, Tom

Source: Journal of AHIMA

Publication Date: April 2010


Federal regulations that took effect in September 2009 require HIPAA covered entities and their business associates to notify individuals if their protected health information (PHI) was accessed or disclosed in an unauthorized manner or by unauthorized individuals. Certain exemptions apply, su....

Smart Training on Privacy and Security (expanded version)

Author: Bacik, Sandy

Source: Journal of AHIMA

Publication Date: April 2010



There is plenty of privacy and security training to be done, and many trainers struggle to get resources from their organizations and attention from their audiences. Sandy Bacik, CISSP, ISSMP, CISM, CGEIT, is a principal consultant at EnerNex and a former chief security officer. Here she o....

Snap Judgment

Author: AHIMA Professional Ethics Committee

Source: Journal of AHIMA - website

Publication Date: April 01, 2010





Anyone who is a member of AHIMA or holds its credentials agrees to abide by its code of ethics.


The code sets forth professional values and ethical principles, and it offers guidelines to which professionals aspire. “Ethical behaviors result from a pe....

Few Requests for Today’s Accountings

Author: AHIMA

Source: Journal of AHIMA

Publication Date: February 2010


HIPAA’s Accounting of Disclosure Provisions Led to Few Patient Requests; Now ARRA Is Upping the Ante

Provisions within the American Recovery and Reinvestment Act extend HIPAA’s accounting of disclosure regulations for providers who maintain electronic health records. The provisions a....

Elements of a Breach Notification Letter

Author: Hjort, Beth M.

Source: Journal of AHIMA

Publication Date: February 2010


This month covered entities are subject to penalties for noncompliance with new federal privacy and security breach notification laws issued by the Department of Health and Human Services.

HHS issued an interim final rule titled “Breach Notification for Unsecured Protected Health Info....

HIM Can Help in the Battle Against Medical Identity Theft

Author:

Source: AHIMA Today

Publication Date: October 07, 2009


The woman rushed into the emergency department at Massachusetts General Hospital (MGH) in extreme pain. She presented her insurance card and name to registration and was quickly examined by medical staff. Doctors determined the woman needed an emergency appendectomy. But staff soon realized tha....

Accounting of Disclosures: ARRA’s Impact

Author: Rhodes, Harry B.

Source: AHIMA Convention

Publication Date: October 05, 2009


The accounting of disclosures requirement is one of the most difficult HIPAA privacy rule compliance issues to implement. Following the August 2002 modifications to the privacy rule requirements, the accounting for disclosures requirement has stood out as the HIPAA requirement demanding the big....

Model Breach Notification Letter: Content and Format

Author: AHIMA

Source: AHIMA

Publication Date: August 24, 2009


High-level guidance outlining the content requirements for breach notification letters is provided in section 13402, "Notification in the Case of Breach," of the American Recovery and Reinvestment Act and state-level data breach notification and reporting laws in 44 states, the District of Colu....

Path to Security Breach Notification Regulation

Author: Rhodes, Harry B.

Source: AHIMA

Publication Date: August 24, 2009


Forty-four states, the District of Columbia, Puerto Rico, and the Virgin Islands enacted data breach notification and reporting laws well before the Health Information Technology for Economic and Clinical Health (HITECH) Act of the American Recovery and Reinvestment Act (ARRA) set the first f....

Sequestering EHR Data in IT Systems

Author: Miaoulis, William M

Source: Journal of AHIMA

Publication Date: May 2009


There can be three situations under which healthcare organizations may need to sequester (or segregate) certain data within a medical record: placing a legal hold in connection with litigation, limiting disclosures of a record pursuant to a request by a patient, and restricting access to sensi....

1 2 [3] 4 5 6 7 8