Search Results

= Members only

Current search

540 results.

1 2 3 [4] 5 6 7 8

Guidance Specifying the Technologies and Methodologies That Render Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals for Purposes of the Breach Notification Requirements ... [of ARRA]

Author: U.S. Department of Health and Human Services. Office of the Secretary

Source: Government (U.S.)

Publication Date: April 27, 2009

[Federal Register: April 27, 2009 (Volume 74, Number 79)] [Rules and Regulations] [Page 19006-19010] From the Federal Register Online via GPO Access [wais.access.gpo.gov] [DOCID:fr27ap09-11] ======================================================================= ------------------------------------....

Medical Identity Theft and the Red Flags Rule

Author: Apgar, Chris

Source: Journal of AHIMA - website

Publication Date: April 2009


Continuing our Health Information Privacy and Security Week series, today Chris Apgar, CISSP, president of Apgar & Associates LLC, takes a look at medical identity theft within the context of the Red Flags Rule.

Much is reported in the news about identity theft including new cat....

Untangling Privacy

Author: Dimick, Chris

Source: Journal of AHIMA

Publication Date: February 2009


Health IT won’t advance far without resolving the complex issue of privacy protections. Can a complicated situation be teased apart thread by thread?

The debate on privacy has become very public.

Privacy advocates, health IT advocates, providers, HIM professionals, fe....

Releasing Information of Deceased Patients

Author: Herrin, Barry S.

Source: Journal of AHIMA

Publication Date: January 2009


Developed when modern law concepts were first formed, the mortmain, or “dead hand,” rule prevented the church from exercising undue influence over a soon-to-be-dead penitent to obtain a gift of an individual’s lands in remission of his or her sins. These statutes evolved over....

Management Practices for the Release of Information

Author: Bock, Linda J.; Demster, Barbara; Dinh, Angela K.; Gorton, Elisa R.; Lantis, James R. Jr.

Source: AHIMA practice brief | Journal of AHIMA

Publication Date: November 2008


Exchange of health information is an essential function to the provision of high-quality and cost-effective healthcare. The information should be complete and timely for its intended purpose. While this sounds straightforward, often it is not an easy task in the complex medical and legal envir....

Releasing Records from Other Providers

Author: Herrin, Barry S.

Source: Journal of AHIMA

Publication Date: November 2008


Question: Should organizations include records of other providers when responding to a release of information?

Answer: Yes. There are three reasons this is so.

First, there is no law or regulation that generally prohibits the redisclosure of information received from anot....

Reinsourcing Release of Information

Author: Haas, Mark

Source: AHIMA Convention

Publication Date: October 17, 2008


BACKGROUND


“Outsourcing” was one of the buzzwords in US businesses for the first half of the decade. The mere mention of the word or its close relative, “offshoring”, had a polarizing effect on employers, employees and customers. However, half-way through t....

Raising Awareness of Medical Identity Theft: For Consumers, Prevention Starts with Guarding, Monitoring Health Information

Author: Rinehart-Thompson, Laurie A.

Source: Journal of AHIMA

Publication Date: October 2008


Financial identity theft has become ubiquitous in our global society. Its consequences are familiar, and fear of its repercussions has created a widespread reliance on credit bureaus for protection. According to the Federal Trade Commission, 8.3 million Americans were reportedly affected by fi....

Handling Sensitive Information in an NHIN

Author: Dimick, Chris

Source: Journal of AHIMA

Publication Date: February 2008


The topic of sensitive health data and how to keep it private in the electronic age is one of the most complex issues facing the development of a nationwide, interoperable health information exchange network.

Physicians need accurate medical records to provide adequate care. Yet pati....

Damage of Medical Identity Theft

Author:

Source: Journal of AHIMA

Publication Date: January 2008


HIM Professionals “Single Most Important Group” in Finding Solutions

Medical identity theft can wreck the lives of its victims and cost healthcare organizations money and time. But HIM professionals can help mitigate this growing problem, according to Pam Dixon, executive director of....

Privacy in the Spotlight

Author: Dimick, Chris

Source: Journal of AHIMA

Publication Date: November 2007


Varying privacy practices that pose barriers to health information exchange are putting HIM concerns in the national spotlight.
The 35-year-old Minnesota woman’s winter vacation in the neighboring state of Wisconsin was going great, until her ski snapped and the accident happened. B....

Breaking Down Privacy and Security Barriers to HIE

Author: Rhodes, Harry B.

Source: Journal of AHIMA

Publication Date: November 2007


As noted in the article “Confusion Continues over HIPAA Minimum Necessary Standards,” (J AHIMA, Nov-Dec 2007) the state-level research under the HISPC project identified a number of privacy and security barriers to health information exchange (HIE). Several reports came from this p....

Guiding Privacy Decisions in an e-HIM Environment

Author: AHIMA

Source: AHIMA Advantage

Publication Date: August 2007


Technology facilitates the collection, management, sharing, and storing of health information. Yet we must ensure privacy and security of health information in order to ensure better usage. HIM professionals can use our skills and knowledge to help achieve solid footing on this issue. Who is le....

1 2 3 [4] 5 6 7 8