Search Results

= Members only

Current search

20 results.

Holistic Approach to Network System Security

Author: Nelson, Doug

Source: Journal of AHIMA

Publication Date: May 1997


Introduction
Information security concerns increase with expanded healthcare data access across wide area networks, increased storage on network devices, and greater use outside an organization's electronic borders. Today's information systems network architectures are changing rapidly,....

Wireless Computing May Be the Ambulatory Answer

Author: Kuehn, Lynn

Source: Brief Encounter

Publication Date: June 02, 1997


Society has accepted the fact that telephones function very well without wires, freeing us from desktop chains. So, why not accept the fact that computing can happen the same way -- wireless, yet fully connected? PC Tablets

The technology exists today to create wireless local area....

Implementing the Wireless Computerized Patient Record

Author: Rhodes, Harry B.

Source: Journal of AHIMA

Publication Date: July 1997


The ability to provide timely, relevant, and accurate in-formation to the healthcare decision maker at the point of care is a critical success factor for any provider. For enterprises that operate in extremely competitive healthcare markets, the ability to meet this challenge could mean the d....

Implementing the Enterprise Master Patient Index

Author: Adragna, Lisa

Source: Journal of AHIMA

Publication Date: October 1998


In implementing a cross-facility initiative, the importance of planning and understanding the implications for all facilities can't be overlooked. Here's how one integrated delivery network navigated the challenges of implementing a cross-facility enterprise master patient inde....

HIM Metamorphosis

Author: Kalata, Marcia

Source: Journal of AHIMA

Publication Date: October 1998



Five years ago, if someone had told me my organization would construct a new building without a chart room and would require half as many medical record clerks and that coders would work without stacks of charts at their desks, I'd have thought they were from a different planet. But....

Security @ the Edge

Author: Boroditsky, Marc

Source: In Confidence (newsletter)

Publication Date: November 02, 2000


With the pending impact of the Health Insurance Portability and Accountability Act (HIPAA) requirements and the high hopes for fully automated e-medical informatics, healthcare information professionals must gain an appreciation for the edge of their networks. More than ever before, the edge....

Is Wireless Technology at Hand for Healthcare?

Author: Smith, Cheryl M.

Source: Journal of AHIMA

Publication Date: January 2001


It wasn’t so long ago that HIM professionals witnessed the introduction and use of computers to assist in performing everyday functions in an HIM department. The computerization of the master patient index moved us from typing patient demographic data and filing individual patient index cards....

On the Line: Professional Practice Solutions

Author: Hughes, Gwen

Source: Journal of AHIMA

Publication Date: May 2001




Q: I understand that inexpensive password recovery software can allow an unauthorized user to recover or crack someone else's password. If passwords are that easy to crack, are they worthwhile?



Q: Does the new HIPAA privacy rule require hospitals to obtain patient....

Turning Old Technology into New Systems

Author: Anderson, Ellen Miller

Source: Journal of AHIMA

Publication Date: November 2001


The need for updated technology rarely coincides with enough funds to purchase it. However, disparate technologies can be combined to meet information system needs without a major capital outlay. At Home Care Services, part of Group Health Cooperative (GHC) in Seattle, we created the On Call P....

Primer on Network Security

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: March 2004


The lack of specificity in HIPAA’s transmission security standard for “guarding against unauthorized access to electronic protected health information (EPHI) that is being transmitted over an electronic communications nework” may leave you a bit cold, especially the portion....

How Information Technology Supports Virtual HIM Departments

Author: Kohn, Deborah

Source: AHIMA eContent

Publication Date: March 02, 2009



Only in recent years has the widespread acceptance and use of computer systems and Internet-derived technologies allowed HIM departments of all types and sizes to be physically untethered from their organizations and exist virtually. From a technical perspective, an HIM department function....

Ensuring Remote Coding Compliance

Author: Comfort, Angie

Source: Journal of AHIMA - Coding Notes

Publication Date: April 2012


More and more HIM department managers are turning to remote coding. However, before implementing this staffing model, managers must answer several questions regarding the privacy and security of patient information, including:
What are the compliance risks?
How will privacy and secu....

Standards for Safety, Security, and Interoperability of Medical Devices in an Integrated Health Information Environment

Author: Williams, Patricia A.H

Source: Journal of AHIMA

Publication Date: April 2017



Information sharing between healthcare organizations increasingly includes the use of electronic health records (EHRs) as well as data from medical devices that have been integrated into existing networks. When exchanging such data, providers should be mindful not only of the interoperabil....