754 results.
[1] 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
Pitfalls in Endovascular Coding
Author: Zielske, David R.
Source: AHIMA Convention
Publication Date: October 15, 2004
By the Rules: Making Security Policies Stick
Author: Zender, Anne
Source: Journal of AHIMA
Publication Date: October 1999
Dual Accreditation Presents Challenges, Opportunities
Author: Zender, Anne
Source: Journal of AHIMA
Publication Date: February 2000
Steps to Internal Audits for Physician Office Records
Author: Zeisset, Ann M.; Scichilone, Rita A
Source: Journal of AHIMA - Coding Notes
Publication Date: October 1999
Instituting an Enterprise-wide PHI Disclosure Management Strategy
Author: Zeiour, Collette; Twiggs, Mariela
Source: Journal of AHIMA
Publication Date: April 2015
Hospice Coding Left Out?
Author: Zastoupil, Shawna
Source: AHIMA newsletter article | CodeWrite
Publication Date: October 2016
Reaffirming Your HIPAA Compliance Efforts
Author: Woloszyn, William
Source: Journal of AHIMA
Publication Date: April 2005
HIPAA Collaborative of Wisconsin
Author: Wisconsin Health Information Management Association
Source: AHIMA Foundation
Publication Date: February 28, 2003
Building an Information Technology Security Awareness and Training Program
Author: Wilson, Mark; Hash, Joan
Source: Government (U.S.)
Publication Date: October 02, 2003
Recovery Audit Program Changes
Author: Wilson, Donna D
Source: CodeWrite
Publication Date: February 2015
Revisiting Unrelated Surgical Procedures (MS-DRGs 981-989)
Author: Wilson, Donna D
Source: CodeWrite
Publication Date: February 2016
Managing Governmental Audits
Author: Wilson, Donna D
Source: AHIMA Convention
Publication Date: September 26, 2010
Five RAC Coding Targets: Demonstration Program Identified Key Areas of Improper Payment
Author: Wilson, Donna D
Source: Journal of AHIMA - Coding Notes
Publication Date: May 2009
RAC Inpatient Coding Denials: Key Areas of Improper Payment in permanent program
Author: Wilson, Donna D
Source: Journal of AHIMA - Coding Notes
Publication Date: March 2012
Walking the Tightrope—Coding Compliance in the Electronic Age
Author: Williams, Vickie J.
Source: AHIMA Convention
Publication Date: October 17, 2008
Transitioning to a Principle Based Privacy Compliance
Author: Williams, Jutta; Thomason, Mary
Source: AHIMA Convention
Publication Date: October 02, 2011
Laboratory Services Regulations Impact National Coverage Decisions, HIM
Author: Willard, Dianne
Source: Journal of AHIMA
Publication Date: October 2002
What Caused the Breach? An Examination of Use of Information Technology and Health Data Breaches
Author: Wikina, Suanu Bliss
Source: Perspectives in Health Information Management
Publication Date: October 2014
Filling a Critical Niche: HIM and the Corporate Compliance Committee
Author: Wieland, LaVonne R.
Source: Journal of AHIMA
Publication Date: October 2000
Compliance in the Physician Office
Author: Wieland, LaVonne R.
Source: AHIMA Convention
Publication Date: October 10, 2001
Are You Ready for a HIPAA Audit?
Author: Wiedemann, Lou Ann
Source: Journal of AHIMA
Publication Date: April 2017
Seasoning Your Compliance Plan with PEPPER: How to Read PEPPER Data on Payment Errors
Author: Wiedemann, Lou Ann
Source: Journal of AHIMA
Publication Date: January 2007
Amendment, Corrections and Deletions Technical Paper
Author: Wiedemann, Lou Ann
Source: AHIMA Convention
Publication Date: October 02, 2011
Data Quality Audit: Understanding Coding Variations
Author: Whittome, Helen; Crook, Gail
Source: IFHRO Congress | AHIMA Convention
Publication Date: October 15, 2004
ACO Primer: Reviewing the Proposed Rule on Accountable Care Organizations
Author: White, Susan E; Kallem, Crystal; Viola, Allison F.; Bronnert, June
Source: Journal of AHIMA
Publication Date: June 2011
De-identification and the Sharing of Big Data
Author: White, Susan E
Source: Journal of AHIMA
Publication Date: April 2013
Predictive Modeling 101: How CMS’s Newest Fraud Prevention Tool Works and What It Means for Providers
Author: White, Susan E
Source: Journal of AHIMA
Publication Date: September 2011
Outlining Changes in the Joint Commission's Sentinel Event Policy
Author: Welch, Julie J.
Source: Journal of AHIMA
Publication Date: September 1998
Catching Up with HIPAA: Managing Noncompliance
Author: Weintraub, Abner E.
Source: Journal of AHIMA
Publication Date: May 2003
HIPAA Compliance: Is Outsourcing the Answer?
Author: Watkins, Larry
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
Evaluating Alerts and Triggers: Determining Whether Alerts and Triggers Are Part of the Legal Health Record
Author: Warner, Diana
Source: Journal of AHIMA
Publication Date: March 2010
Prepare Now for Meaningful Use Attestation and Compliance Audits
Author: Warner, Diana
Source: Journal of AHIMA
Publication Date: March 2014
Regulations Governing Research (2013 update) - Retired
Author: Warner, Diana
Source: AHIMA practice brief
Publication Date: May 2013
When to Send a Breach Notification: New HIPAA Rules Revise “Harm” Standard
Author: Warner, Diana
Source: Journal of AHIMA
Publication Date: April 2013
Privacy and Security Audits of Electronic Health Information (2014 update)
Author: Walsh, Tom; Miaoulis, William M
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: March 2014
Security Risk Analysis and Management: An Overview (2013 update)
Author: Walsh, Tom
Source: AHIMA practice brief
Publication Date: November 2013
Security Risk Analysis and Management: an Overview (2011 update)
Author: Walsh, Tom
Source: AHIMA practice brief
Publication Date: January 2011
Privacy and Security Audits of Electronic Health Information (2013 update)
Author: Walsh, Tom
Source: AHIMA practice brief
Publication Date: November 2013
Workflow for Breach Notification
Author: Walsh, Tom
Source: Journal of AHIMA
Publication Date: April 2010
Proof Is in the Policy
Author: Walsh, Tom
Source: Journal of AHIMA
Publication Date: February 2004
Legal Pitfalls of HIPAA
Author: Waller, Adele A.
Source: HIPAA Conference 2000
Publication Date: March 14, 2000
Guerrilla HIPAA: Increasing Security, Efficiency, and Convenience with Direct Personal Assurance
Author: Walker, Trevor Hight
Source: In Confidence (newsletter)
Publication Date: July 02, 2000
HIPAA Compliance Strategies: Why Traditional Models May Work
Author: Wagg, Dorothy Grandolfi
Source: In Confidence (newsletter)
Publication Date: June 02, 2001
Learning the Laws Behind Compliance
Author: Wagg, Dorothy Grandolfi
Source: Journal of AHIMA
Publication Date: May 2000
Privacy Compliance: Maintaining the Gains
Author: Vogt, Nancy
Source: Journal of AHIMA
Publication Date: October 2005
AHIMA comments regarding the development of a Recovery Audit Contractor (RAC) Program for the Medicare Part C and D Programs
Author: Viola, Allison F.
Source: AHIMA Advocacy and Policy
Publication Date: February 25, 2011
Compliance, Medical Records, and the FBI: Preventing Fraud and Abuse
Author: Vincze, L. Stephan
Source: Journal of AHIMA
Publication Date: January 1998
Employee Confidentiality Training for the Electronic Health Record: A Systematic Review of Literature
Author: VanderMolen, Julia; Prince, Alesha; Neu, Emily; DeKraker, Rachael
Source: Educational Perspectives in Health Informatics and Information Management
Publication Date: October 2015
HIPAA Privacy Guidance. Personal Representatives
Author: U.S. Office for Civil Rights
Source: Government (U.S.)
Publication Date: December 02, 2002
HIPAA Privacy Guidance. Restrictions on Government Access to Health Information
Author: U.S. Office for Civil Rights
Source: Government (U.S.)
Publication Date: December 02, 2002
[1] 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16