200 results.
<< 5 6 7 8 9 10 [11] 12 13 14 15 16 17 18 19 20
Keeping Online Personal Records Private: Security and Privacy Considerations for Web-based PHR Systems
Author: Srinivasan, Anil
Source: Journal of AHIMA
Publication Date: January 2006
As Web-based personal health record (PHR) systems grow in popularity, it is important that they be managed and maintained responsibly. Online PHRs must provide the same security and privacy controls required of other electronic systems that handle personal health information. This article pres....
Maintaining a Legally Sound Health Record: Paper and Electronic
Author: E-HIM Work Group on Maintaining the Legal EHR
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: November 2005
This practice brief has been retired. It is made available for historical purposes only.
Spoliation of Medical Evidence
Author: Tomes, Jonathan P.
Source: Journal of AHIMA
Publication Date: October 2005
To avoid the improper destruction or alteration of records, HIM departments must follow a retention schedule, train personnel, and ensure that corrections leave original entries intact.
Although the legal concept known as spoliation of evidence has been a part of the American legal syste....
Destroying Data the DoD Way: Military Standards Help Ensure Compliance for Electronic Data Security
Author: Keating, Angie Singer
Source: Journal of AHIMA
Publication Date: July 2005
The unauthorized use of confidential or sensitive information contained on computer hard drives is a serious problem facing most healthcare organizations. Organizations that do not require proper hard-drive sanitation as part of their total information destruction program face regulatory viola....
How to Safely Recycle PCs
Author: Quinsey, Carol Ann
Source: Journal of AHIMA
Publication Date: June 2005
Securing the privacy of both protected health information and personal information should be a primary concern when personal computers have outlived their usefulness. Recycling or disposing of a computer safely can be a challenge.
It’s not enough to simply give an old computer....
Certificate of Destruction: What It Is, What It's Not
Author: Johnson, Robert J.
Source: Journal of AHIMA
Publication Date: June 2005
Major healthcare facilities generally choose to meet their document destruction needs through outsourcing. The certificate of destruction (COD) is virtually the universal documentation or audit trail in the outsourced security shredding world. It shows who destroyed what and when they did it.<....
Health Records Get Personal: A Technology Outlook for Consumer Access to Personal Health Information
Author: Friedman, Beth
Source: Journal of AHIMA
Publication Date: January 2005
From banking to travel, consumers manage a variety of personal records online. Now providers are experimenting with several ways to give consumers more control over their health records.
Every day consumers log on to the Internet to access bank accounts, stock portfolios, and travel itin....
When the Writ Hits the Fan: the Importance of Managing Electronic Health Records as Business Documents
Author: Kohn, Deborah
Source: Journal of AHIMA
Publication Date: September 2004
Your healthcare facility is digitally capturing information at a staggering pace. But if a subpoena showed up tomorrow, could you produce the information you need?
While mounds of analog paper and film continue to overwhelm most healthcare organization record and film libraries, the fac....
Primer on Encryption
Author: Amatayakul, Margret
Source: Journal of AHIMA
Publication Date: June 2004
Encryption is an addressable implementation specification under HIPAA’s access control and transmission security standards. Many providers are grappling with just how to address these specifications:
Is there a difference between the two specifications, and if so, what is the diff....
Forgiveness Means Never Having to Say You're Not Insured
Author: Johnson, Robert J.
Source: Journal of AHIMA
Publication Date: May 2004
Various types of insurance are vital to the healthcare industry to protect institutions, physicians, and patients. But what is the appropriate type of insurance to indemnify data destruction providers? This article will explain a misconception about insurance that may be putting both HIM prof....
<< 5 6 7 8 9 10 [11] 12 13 14 15 16 17 18 19 20