337 results.
<< 19 20 21 22 [23] 24 25 26 27 28 29 30 31 32 33 34
Metadata and Meaningful Use
Author: Viola, Allison F.; Mookencherry, Shefali
Source: Journal of AHIMA
Publication Date: February 2012
The healthcare industry will find out soon if ONC intends to include metadata requirements in stage 2 of the meaningful use program. Many feel it is too soon. But given metadata's potential to support health information exchange, the expanded and standardized use of metadata tagging....
Missing Pieces: Healthcare Waits on Regulations That Will Fill in the ARRA Puzzle
Author: Rode, Dan
Source: Journal of AHIMA
Publication Date: July 2010
As this issue goes to press, healthcare remains unsettled, waiting on the publication of key rules related to ARRA and the HITECH Act.
Until these rules appear, providers cannot assess with any certainty their willingness and ability to apply for the meaningful use incentive program....
Model Breach Notification Letter: Content and Format
Author: AHIMA
Source: AHIMA
Publication Date: August 24, 2009
High-level guidance outlining the content requirements for breach notification letters is provided in section 13402, "Notification in the Case of Breach," of the American Recovery and Reinvestment Act and state-level data breach notification and reporting laws in 44 states, the District of Colu....
Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification Rules Under the Health Information Technology for Economic and Clinical Health Act and the Genetic Information Nondiscrimination Act; Other Modifications to the HIPAA Rules
Author: U.S. Department of Health and Human Services
Source: Government (U.S.)
Publication Date: January 25, 2013
Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification Rules Under the Health Information Technology for Economic and Clinical Health Act and the Genetic Information Nondiscrimination Act; Other Modifications to the HIPAA Rules; Final Rule
Author: U.S. Office for Civil Rights
Source: U.S. Department of Health & Human Services | U.S. Office for Civil Rights
Publication Date: January 2013
Rule modifies HIPAA by implementing statutory amendments under HITECH to strengthen the privacy and security protection for individuals’ health information; modifies the Breach Notification Rule under the HITECH Act, modifes the HIPAA Privacy Rule to strengthen the privacy protections for genetic information and makes certain other modifications to the HIPAA Privacy, Security, Breach Notification, and Enforcement Rules (the HIPAA Rules) to improve their workability and effectiveness and to increase flexibility for and decrease burden on regulated entities.
National Committee on Vital and Health Statistics Report of Hearing on “Meaningful Use” of Health Information Technology, April 28-29, 2009
Author: Amatayakul, Margret
Source: U.S. National Committee for Vital and Health Statistics
Publication Date: May 19, 2009
Navigating a Compliant Breach Management Process
Author: Downing, Katherine
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: June 2014
The purpose of AHIMA’s new Breach Management Toolkit is to provide a comprehensive collection of resources and best practices to help healthcare organizations and health information management (HIM) professionals navigate their way through the Health Insurance Portability and Accountability Act (HIPAA) Breach Notification Rule and the overall breach management process. The toolkit is intended to raise awareness of the importance and responsibility of everyone within the organization to report HIPAA breaches to the appropriate designated personnel, as well as provide breach prevention education and training.
NHIN Direct: ONC Keeps It Simple in Effort to Jumpstart Data Exchange
Author: Dimick, Chris
Source: Journal of AHIMA
Publication Date: June 2010
The federal government is creating a stripped-down version of the nationwide health information network to aid the meaningful use program. What does it mean for HIEs?
Simple is not a word typically associated with electronic health information exchange. For years, the act of sending....
No Harm Done? Assessing Risk of Harm under the Federal Breach Notification Rule
Author: Dimick, Chris
Source: Journal of AHIMA
Publication Date: August 2010
Provisions within the HITECH Act require that covered entities notify individuals if their protected health information is breached. However, the current regulation allows an exemption if the risk of harm is slight. Assessing risk can be subjective, and privacy officers have been working to cr....
Notice to the Secretary of HHS of Breach of Unsecured Protected Health Information
Author: U.S. Office for Civil Rights
Source: Government (U.S.) | U.S. Department of Health & Human Services
Publication Date: October 02, 2009
<< 19 20 21 22 [23] 24 25 26 27 28 29 30 31 32 33 34