20 results.
Holistic Approach to Network System Security
Author: Nelson, Doug
Source: Journal of AHIMA
Publication Date: May 1997
Introduction
Information security concerns increase with expanded healthcare data access across wide area networks, increased storage on network devices, and greater use outside an organization's electronic borders. Today's information systems network architectures are changing rapidly,....
Wireless Computing May Be the Ambulatory Answer
Author: Kuehn, Lynn
Source: Brief Encounter
Publication Date: June 02, 1997
Society has accepted the fact that telephones function very well without wires, freeing us from desktop chains. So, why not accept the fact that computing can happen the same way -- wireless, yet fully connected? PC Tablets
The technology exists today to create wireless local area....
Implementing the Wireless Computerized Patient Record
Author: Rhodes, Harry B.
Source: Journal of AHIMA
Publication Date: July 1997
The ability to provide timely, relevant, and accurate in-formation to the healthcare decision maker at the point of care is a critical success factor for any provider. For enterprises that operate in extremely competitive healthcare markets, the ability to meet this challenge could mean the d....
HIM Metamorphosis
Author: Kalata, Marcia
Source: Journal of AHIMA
Publication Date: October 1998
Five years ago, if someone had told me my organization would construct a new building without a chart room and would require half as many medical record clerks and that coders would work without stacks of charts at their desks, I'd have thought they were from a different planet. But....
Implementing the Enterprise Master Patient Index
Author: Adragna, Lisa
Source: Journal of AHIMA
Publication Date: October 1998
In implementing a cross-facility initiative, the importance of planning and understanding the implications for all facilities can't be overlooked. Here's how one integrated delivery network navigated the challenges of implementing a cross-facility enterprise master patient inde....
Security @ the Edge
Author: Boroditsky, Marc
Source: In Confidence (newsletter)
Publication Date: November 02, 2000
With the pending impact of the Health Insurance Portability and Accountability Act (HIPAA) requirements and the high hopes for fully automated e-medical informatics, healthcare information professionals must gain an appreciation for the edge of their networks. More than ever before, the edge....
Is Wireless Technology at Hand for Healthcare?
Author: Smith, Cheryl M.
Source: Journal of AHIMA
Publication Date: January 2001
It wasn’t so long ago that HIM professionals witnessed the introduction and use of computers to assist in performing everyday functions in an HIM department. The computerization of the master patient index moved us from typing patient demographic data and filing individual patient index cards....
On the Line: Professional Practice Solutions
Author: Hughes, Gwen
Source: Journal of AHIMA
Publication Date: May 2001
Q: I understand that inexpensive password recovery software can allow an unauthorized user to recover or crack someone else's password. If passwords are that easy to crack, are they worthwhile?
Q: Does the new HIPAA privacy rule require hospitals to obtain patient....
Turning Old Technology into New Systems
Author: Anderson, Ellen Miller
Source: Journal of AHIMA
Publication Date: November 2001
The need for updated technology rarely coincides with enough funds to purchase it. However, disparate technologies can be combined to meet information system needs without a major capital outlay. At Home Care Services, part of Group Health Cooperative (GHC) in Seattle, we created the On Call P....
Using Network Audits to Monitor Privacy and Security
Author: Shanley, Suzanne
Source: In Confidence (newsletter)
Publication Date: May 02, 2003
Under the security rule, covered entities must ensure that some process is put in place to record and review system access and activity. Audit controls are required to record any alterations to confidential patient information, including changes to content and the addition or deletion of info....
Understanding Telecommunications, Network Security, and HIPAA
Author: Ruano, Michael
Source: In Confidence (newsletter)
Publication Date: May 02, 2003
Part three in a 10-part series.
This article is the third of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. The third information security domain of telecommunications and network security is the largest and most compl....
Evaluating Wireless Security for the Electronic Health Record
Author: Smith, Andre
Source: In Confidence (newsletter)
Publication Date: October 02, 2003
The electronic health record (EHR) is the key to better healthcare from your hospital and private physician. There have been many concerns over the use of wireless technology with the EHR. These concerns are electromagnetic interference with other devices and personal health. Another major co....
Primer on Network Security
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: March 2004
The lack of specificity in HIPAA’s transmission security standard for “guarding against unauthorized access to electronic protected health information (EPHI) that is being transmitted over an electronic communications nework” may leave you a bit cold, especially the portion....
Securing Wireless Technology for Healthcare
Author: Retterer, John; Casto, Brian
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: May 2004
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
IT Primer for Health Information Exchange
Author: Durkin, Stacie; Just, Beth Haenke
Source: Journal of AHIMA
Publication Date: January 2008
When it comes to building data exchanges, an understanding of basic IT terminology helps HIM professionals serve as a bridge between technical and clinical professionals.
Clinical data exchange is poised to radically transform healthcare delivery. By connecting disparate he....
Testing and Monitoring Access Policy Controls: The Right Controls Can Boost Compliance and Efficiency
Author: Traverse, Cheryl
Source: Journal of AHIMA
Publication Date: May 2008
Testing and monitoring access policy controls are critical best practices for all healthcare organizations. By testing and monitoring IT resources, perimeter security systems, and technical user activities, organizations can ensure service delivery, the protection of the resources that deliver....
How Information Technology Supports Virtual HIM Departments
Author: Kohn, Deborah
Source: AHIMA eContent
Publication Date: March 02, 2009
Only in recent years has the widespread acceptance and use of computer systems and Internet-derived technologies allowed HIM departments of all types and sizes to be physically untethered from their organizations and exist virtually. From a technical perspective, an HIM department function....
Ensuring Remote Coding Compliance
Author: Comfort, Angie
Source: Journal of AHIMA - Coding Notes
Publication Date: April 2012
More and more HIM department managers are turning to remote coding. However, before implementing this staffing model, managers must answer several questions regarding the privacy and security of patient information, including:
What are the compliance risks?
How will privacy and secu....
Securing Wireless Technology for Healthcare (2013 update) - Retired
Author: Evans, Brian
Source: AHIMA practice brief
Publication Date: November 2013
Editor's note: This update supplants the May 2004 practice brief "Securing Wireless Technology for Healthcare"
Overview
Wireless local area network (WLAN) environments have evolved from simple, unmanaged stand-alone access points (APs) to organizationally managed system....
Standards for Safety, Security, and Interoperability of Medical Devices in an Integrated Health Information Environment
Author: Williams, Patricia A.H
Source: Journal of AHIMA
Publication Date: April 2017
Information sharing between healthcare organizations increasingly includes the use of electronic health records (EHRs) as well as data from medical devices that have been integrated into existing networks. When exchanging such data, providers should be mindful not only of the interoperabil....