985 results.
<< 33 34 35 36 37 38 39 40 [41] 42 43 44 45 46 47 48 >>
New Focus on Process and Measure: Raising Data Quality with a Standard Coding Workflow and Benchmarks
Author: Wilson, Donna D; Hampton-Bagshaw, Kim; Jorwic, Therese M; Bishop, Jean; Giustina, Elizabeth
Source: Journal of AHIMA
Publication Date: March 2008
Collecting Root Cause to Improve Coding Quality Measurement
Author: e-HIM Work Group on Benchmark Standards for Clinical Coding Performance Measurement. Quality Subgroup
Source: AHIMA practice brief
Publication Date: March 2008
Enterprise Content Management from the Ground Up
Author: Nunn, Sandra L.
Source: Journal of AHIMA
Publication Date: February 2008
Litigation Response Planning and Policies for E-Discovery. AHIMA Model E-Discovery Policies: Preservation and Legal Hold for Health Information and Records
Author: AHIMA e-Discovery Task Force
Source: AHIMA web extra
Publication Date: February 02, 2008
Litigation Response Planning and Policies for E-Discovery. AHIMA Model E-Discovery Policies: Production and Disclosure of Health Information and Records for E-Discovery
Author: AHIMA e-Discovery Task Force
Source: AHIMA web extra
Publication Date: February 02, 2008
Litigation Response Planning and Policies for E-Discovery. AHIMA Model E-Discovery Policies: Retention, Storage, and Destruction of Paper and Electronic Health Information and Records
Author: AHIMA e-Discovery Task Force
Source: AHIMA web extra
Publication Date: February 02, 2008
Litigation Response Planning and Policies for E-Discovery. AHIMA Model E-Discovery Policies: Preparing for Pretrial Conference
Author: AHIMA e-Discovery Task Force
Source: AHIMA web extra
Publication Date: February 02, 2008
Litigation Response Planning and Policies for E-Discovery
Author: AHIMA e-Discovery Task Force
Source: AHIMA practice brief
Publication Date: February 2008
Sample Security Incident Response Report Form
Author: AHIMA Privacy and Security Practice Council (2007)
Source: Journal of AHIMA
Publication Date: January 2008
Data Breach Investigation and Mitigation Checklist
Author: AHIMA Privacy and Security Practice Council (2007)
Source: Journal of AHIMA
Publication Date: January 2008
<< 33 34 35 36 37 38 39 40 [41] 42 43 44 45 46 47 48 >>