Search Results

= Members only

Current search

540 results.

<< 21 22 23 24 25 26 27 28 [29] 30 31 32 33 34 35 36 >>

Managing Exceptions to HIPAA's Patient Access Rule

Author: Hughes, Gwen

Source: Journal of AHIMA

Publication Date: October 2001




The HIPAA final privacy rule requires that covered entities allow individuals to access the medical and billing records maintained about them. However, the rule describes 10 exceptions. Accordingly, healthcare providers must establish a way to identify the medical and billing records....

Managing HIPAA as Gatekeeper

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: September 2004


An unfortunate result of the HIPAA privacy rule is the emerging use of HIPAA as a gatekeeper, restricting the appropriate fl ow of protected health information (PHI). HIPAA is being cited as a reason not to disclose information without patient permission when needed for treatment, payment, or....

Medical Identity Theft and the Red Flags Rule

Author: Apgar, Chris

Source: Journal of AHIMA - website

Publication Date: April 2009


Continuing our Health Information Privacy and Security Week series, today Chris Apgar, CISSP, president of Apgar & Associates LLC, takes a look at medical identity theft within the context of the Red Flags Rule.

Much is reported in the news about identity theft including new cat....

<< 21 22 23 24 25 26 27 28 [29] 30 31 32 33 34 35 36 >>