540 results.
<< 39 40 41 42 43 44 45 46 47 [48] 49 50 51 52 53 54
State Security Breach Notification Laws
Author: National Conference of State Legislatures
Source: External web site
Publication Date: December 09, 2009
Statistically, What’s the Chance of a Breach?
Author: Wiedemann, Lou Ann
Source: Journal of AHIMA
Publication Date: March 2017
According to the Department of Health and Human Services Office for Civil Rights (OCR), from January 2016 to November 2016 approximately 169,013,996 people were affected by 1,737 healthcare breaches. The Ponemon Institute estimates that data breaches could cost the healthcare industry as m....
Staying Alert to Patient Rights Under HIPAA
Author: Apple, Gordon J.
Source: In Confidence (newsletter)
Publication Date: March 02, 2001
Privacy has been a central tenet of medical ethics for over 2,000 years. The Hippocratic Oath provides:
"All that may come to my knowledge in the exercise of my profession or in daily commerce with men, which ought not to be spread abroad, I will keep secret and will never reveal."
Stopping Thieves in Their Tracks: What HIM Professionals can do to Mitigate Medical Identity Theft
Author: Eramo, Lisa A
Source: Journal of AHIMA
Publication Date: August 2016
The clues are subtle but critical: Perhaps you get a bill for urgent care services you never received. Or upon reviewing your medical record through a patient portal, you see a diagnosis of back pain and multiple prescriptions for narcotic pain relievers.
Though not definiti....
Subpoena by Any Other Name Might Not be Legal
Author: Whitney, Jo Ellen
Source: Journal of AHIMA
Publication Date: May 2007
Generally when an opposing party is seeking medical records from a care provider, the first request is accompanied by a subpoena, which can be difficult for an HIM department to assess in terms of what-if any-records can be produced.
A subpoena accompanied by a HIPAA-compliant consen....
Suggested Activities for Healthcare Professionals [and] for the Public
Author: AHIMA
Source: AHIMA recognition week resources
Publication Date: April 13, 2009
Health Information Privacy and Security Week, April 2009
Surviving a CMS Security Investigation: Oregon Facility Shares an Early Look at the Process
Author: Hofman, Judi
Source: Journal of AHIMA
Publication Date: February 2009
Hospitals and other healthcare organizations are expecting greater scrutiny of their HIPAA compliance programs in 2009. Last year the Centers for Medicare and Medicaid Services (CMS) announced plans to ramp up its HIPAA enforcement efforts even before an Office of Inspector General report chid....
Swiped, Not Hacked: After a Year of Reporting, Theft Remains Main Cause of Breach
Author: AHIMA
Source: Journal of AHIMA
Publication Date: February 2011
With one year of breach reporting on the books this month, theft remains the most common cause of data breach in healthcare. Of the 217 large-scale breaches reported to the Department of Health and Human Services by mid-January 2011, 121 (56 percent) involved theft. Of those, 89 involved a lapt....
Synching up Privacy and Security
Author:
Source: AHIMA Today
Publication Date: October 13, 2008
Review of the October 2008 Privacy and Security Institute held in conjunction with AHIMA's Convention.
Taking a Second Look at Audit Data: How to Glean RAC Intelligence for Better HIM Performance
Author: Crump, Dawn; Tice, Carolyn
Source: Journal of AHIMA
Publication Date: October 2015
The mere mention of the words “payer audits” can send even the most confident and capable health information management (HIM) directors into downward spirals of frustration and overload. These feelings are well known to providers who have found themselves forced to tread the mu....
<< 39 40 41 42 43 44 45 46 47 [48] 49 50 51 52 53 54