20 results.
[1] 2
Standards for Safety, Security, and Interoperability of Medical Devices in an Integrated Health Information Environment
Author: Williams, Patricia A.H
Source: Journal of AHIMA
Publication Date: April 2017
Information sharing between healthcare organizations increasingly includes the use of electronic health records (EHRs) as well as data from medical devices that have been integrated into existing networks. When exchanging such data, providers should be mindful not only of the interoperabil....
Securing Wireless Technology for Healthcare (2013 update) - Retired
Author: Evans, Brian
Source: AHIMA practice brief
Publication Date: November 2013
Editor's note: This update supplants the May 2004 practice brief "Securing Wireless Technology for Healthcare"
Overview
Wireless local area network (WLAN) environments have evolved from simple, unmanaged stand-alone access points (APs) to organizationally managed system....
Ensuring Remote Coding Compliance
Author: Comfort, Angie
Source: Journal of AHIMA - Coding Notes
Publication Date: April 2012
More and more HIM department managers are turning to remote coding. However, before implementing this staffing model, managers must answer several questions regarding the privacy and security of patient information, including:
What are the compliance risks?
How will privacy and secu....
How Information Technology Supports Virtual HIM Departments
Author: Kohn, Deborah
Source: AHIMA eContent
Publication Date: March 02, 2009
Only in recent years has the widespread acceptance and use of computer systems and Internet-derived technologies allowed HIM departments of all types and sizes to be physically untethered from their organizations and exist virtually. From a technical perspective, an HIM department function....
Testing and Monitoring Access Policy Controls: The Right Controls Can Boost Compliance and Efficiency
Author: Traverse, Cheryl
Source: Journal of AHIMA
Publication Date: May 2008
Testing and monitoring access policy controls are critical best practices for all healthcare organizations. By testing and monitoring IT resources, perimeter security systems, and technical user activities, organizations can ensure service delivery, the protection of the resources that deliver....
IT Primer for Health Information Exchange
Author: Durkin, Stacie; Just, Beth Haenke
Source: Journal of AHIMA
Publication Date: January 2008
When it comes to building data exchanges, an understanding of basic IT terminology helps HIM professionals serve as a bridge between technical and clinical professionals.
Clinical data exchange is poised to radically transform healthcare delivery. By connecting disparate he....
Securing Wireless Technology for Healthcare
Author: Retterer, John; Casto, Brian
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: May 2004
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
Primer on Network Security
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: March 2004
The lack of specificity in HIPAA’s transmission security standard for “guarding against unauthorized access to electronic protected health information (EPHI) that is being transmitted over an electronic communications nework” may leave you a bit cold, especially the portion....
Evaluating Wireless Security for the Electronic Health Record
Author: Smith, Andre
Source: In Confidence (newsletter)
Publication Date: October 02, 2003
The electronic health record (EHR) is the key to better healthcare from your hospital and private physician. There have been many concerns over the use of wireless technology with the EHR. These concerns are electromagnetic interference with other devices and personal health. Another major co....
Using Network Audits to Monitor Privacy and Security
Author: Shanley, Suzanne
Source: In Confidence (newsletter)
Publication Date: May 02, 2003
Under the security rule, covered entities must ensure that some process is put in place to record and review system access and activity. Audit controls are required to record any alterations to confidential patient information, including changes to content and the addition or deletion of info....
[1] 2