Article by Ken Terry – InformationWeek July 05, 2012 10:38 AM Healthcare providers have yet to agree on the best way to protect the privacy of personal health information (PHI) in health information exchanges (HIEs), but John Halamka, MD, has an opinion. …
Tag: phi
Electronic Submission of Medical Docs Trial Goes Live
Article posted March 13, 2012 on HealthLeadersMedia.com A year ago this month, CMS announced its esMD tool, which is an option for providers to electronically send medical documentation that is requested of them by recovery auditors and other government entities contractors. Phase …
HHS Secretary Sebelius Confirms ICD-10 Deadline to be Postponed
From February 17th article posted on HealthLeaders Media Health and Human Services Secretary Kathleen Sebelius said Thursday that the federal government will delay for an unspecified time the implementation date for the ICD-10 diagnostic and procedural coding system. In a media release …
EHRs Linked to Errors, Harm, AMA Says
From InformationWeek article by Ken Terry A new AMA report on patient safety in ambulatory care finds that safety problems are widespread but that little is known about which problems cause the most harm. Among the uncertainties cited by the AMA researchers …
The Alphabet Soup of Medical Information: EHR, EMR and PHR
Many people have tossed around the terms EHR and EMR as being one and the same and indeed, they are similar. Add to the mix the acronym PHR too; however, they are not the same thing and it’s essential that all service …
What is encryption and how does it make a file secure?
Encryption is a security measure to ensure that a file is locked from any unwanted viewers. It basically locks a file and prevents anyone from viewing the file until it has been decrypted. When you use encryption software to lock a file …
Is having login and password access to my computer sufficient to meet HIPAA/HITECH guidelines?
Having a login and password is just a start to becoming HIPAA/HITECH ready. But a login and password only go so far. There are many ways to get past a simple login and password these days, and if anyone ever does hack …
HITECH Breach: Computer theft affects 39,000 individuals
Desktop Computer Thefts Affect 39,000By: Howard AndersonManaging EditorHealthcareInfoSecurity.comMontefiore Medical Center in New York is notifying 39,000 patients about two recent incidents involving the theft of unencrypted desktop computers containing personal information.During the weekend of May 22, two computers were stolen from the …
HIPAA Violation Leads to Prison Term
Howard Anderson, Managing Editor, HealthcareInfoSecurity.comA former UCLA Healthcare System surgeon has been sentenced to four months in prison after admitting he illegally read private electronic medical records of celebrities and others.Huping Zhou of Los Angeles is the first defendant in the nation …
HITECH: A Big Burden for Small BAs
By Cheryl McEvoy is an assistant editor with ADVANCE.They know what you’re thinking: HITECH? That’s for the big guys, not me.And that’s just how they’ll get you.New HIPAA security requirements for business associates (BAs) under the Health Information Technology for Economic and …