754 results.
1 2 3 [4] 5 6 7 8 9 10 11 12 13 14 15 16 >>
What Caused the Breach? An Examination of Use of Information Technology and Health Data Breaches
Author: Wikina, Suanu Bliss
Source: Perspectives in Health Information Management
Publication Date: October 2014
Weighing the Stark Law Exceptions
Author: Howrey, Linda
Source: Journal of AHIMA
Publication Date: August 2008
Web-based HIPAA Training Provides a Myriad of Options
Author: Bowley, Kathleen
Source: In Confidence (newsletter)
Publication Date: January 02, 2003
Web-based HIPAA Tools Offer Concrete Solutions to Common Problems
Author: Niles, Dirk F.
Source: In Confidence (newsletter)
Publication Date: February 02, 2003
Walking the Tightrope—Coding Compliance in the Electronic Age
Author: Williams, Vickie J.
Source: AHIMA Convention
Publication Date: October 17, 2008
Voluntary Disclosure of Coding Errors and Resulting Overpayments
Author: Hayman, Russell
Source: AHIMA Convention
Publication Date: October 21, 2005
Verbal/Telephone Order Authentication and Time Frames (2012 update)
Author: AHIMA
Source: AHIMA practice brief
Publication Date: August 2012
Verbal/Telephone Order Authentication and Time Frames (2010 update)
Author: AHIMA
Source: AHIMA practice brief
Publication Date: June 2010
Verbal/Telephone Order Authentication and Time Frames (2001)
Author: Dougherty, Michelle
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: February 2001
V Codes
Author: American Hospital Association
Source: External - used with permission
Publication Date: October 02, 1996
1 2 3 [4] 5 6 7 8 9 10 11 12 13 14 15 16 >>