540 results.
<< 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 [54]
When Confidential Information Is Needed in Litigation
Author: Hedges, Ron
Source: AHIMA blog post | Journal of AHIMA - website
Publication Date: April 09, 2015
Legal consequences flow from the use or abuse of EHR. This monthly column presents examples of what those consequences can be.
Last month I wrote about the possible consequences for a healthcare provider which violated HIPAA when it produced personal health information (PHI)....
When Doctors and Patients Troll Each Other, PHI Protection Suffers
Author: Journal of AHIMA Staff
Source: Journal of AHIMA
Publication Date: August 2016
A lot of good things are happening in healthcare in the name of transparency. Rating systems, usually in the form of a designated number of stars, are now being assigned by the public to hospitals, physicians, and nursing homes. And it’s become easier for consumers to comparison shop when they....
When to Send a Breach Notification: New HIPAA Rules Revise “Harm” Standard
Author: Warner, Diana
Source: Journal of AHIMA
Publication Date: April 2013
The HITECH Act’s omnibus HIPAA modification final rule, released January 25, 2013, finalized sweeping changes to privacy and security regulations. Though much of the proposed rule was adopted, the omnibus rule included major changes made to the “harm threshold” standard i....
Where to Begin with Cyber Defense
Author: Lewis, Sharon; McDonald, Kevin B
Source: Journal of AHIMA
Publication Date: April 2015
As data is made more readily available through a growing number of public and private channels, understanding the risks is critical. Patients expect organizations to take the steps required to protect their sensitive and personal information as it is being produced, processed, shared, and....
Who Are You? Authenticating Consumer Identity is Becoming Increasingly Important in Healthcare
Author:
Source: Journal of AHIMA
Publication Date: September 2014
For consumers in the United States, the answer to the question “Who are you?” is becoming increasingly important, especially in relation to one’s healthcare. Safe and secure access to a person’s health information hinges on how their online identity is established and used—especially as m....
Who Has Rights to a Deceased Patient’s Records?
Author: Dimick, Chris
Source: Journal of AHIMA - website
Publication Date: August 2009
August 4, 2009 @ 8:02 pm
A son calls the HIM department and requests his deceased father’s medical records. Shortly afterward, the man’s wife requests the records, also. Then a man calls identifying himself as the executor of the estate. Who is authorized to access th....
Workflow for Breach Notification
Author: Walsh, Tom
Source: Journal of AHIMA
Publication Date: April 2010
Federal regulations that took effect in September 2009 require HIPAA covered entities and their business associates to notify individuals if their protected health information (PHI) was accessed or disclosed in an unauthorized manner or by unauthorized individuals. Certain exemptions apply, su....
Working Offshore: the Case for Transcription and Coding
Author: von Grey, Michael L.; Iwinski, David Jr.
Source: AHIMA Convention
Publication Date: October 15, 2004
Presentation Overview
The demand for Health information management staff to fill coding and transcription roles outstrips current or projected supply. At the same time, cost pressures continue to mount on healthcare providers. In the longer run, productivity-enhancing technologies such as spe....
You've Been Served: What Might Happen When Responding to a Subpoena
Author: Hedges, Ron
Source: AHIMA blog post | Journal of AHIMA - website
Publication Date: March 12, 2015
Legal consequences flow from the use or abuse of EHR. This monthly column presents examples of what those consequences can be.
Healthcare providers receive and respond to subpoenas on a regular basis. Providers routinely produce personal health information (PHI) when doing so....
You've Got Inappropriate Mail
Author: Planchon, Don
Source: In Confidence (newsletter)
Publication Date: July 02, 2000
The use of e-mail and Internet access as a communication and research tool is now of strategic importance to both healthcare providers and consumers worldwide. However, use, or rather misuse, of these communication tools has introduced a host of security and legal threats uncontrolled by trad....
<< 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 [54]