HITECH, meaningful use rules bring concerns for risk managers

Freeman, Greg
September 2010
Healthcare Risk Management;Sep2010, Vol. 32 Issue 9, p97
The article discusses the proposed final rule for Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009, released by the Department of Health & Human Services (HHS) to make the Health Insurance Portability and Accountability Act (HIPAA) more effective, and reports that these meaningful use rules pose the risk of larger penalties to business associates.


Related Articles

  • ID theft -- Should you spend more on security?  // Same-Day Surgery;Aug2011 Supplement, p18 

    The article reports on the results of a survey on identity theft in health care facilities which was conducted by the Healthcare Information and Management Systems Society.

  • ID theft -- Should you spend more on security?  // Same-Day Surgery;Jul2011, Vol. 35 Issue 7, p73 

    The article reports on an annual survey which is conducted by the Healthcare Information and Management Systems Society and investigates medical identity theft at health care facilities.

  • CYBERSECURITY: LOCKING THE VAULT. Plotkin, Jack // For the Record (Great Valley Publishing Company, Inc.);Dec2015, Vol. 27 Issue 12, p30 

    The article discusses the vulnerability of health information to cybersecurity threats, with shifts in technology and automation of processes such as movement of electronic medical records (EMRs) to the cloud, and the value of health data to potential thieves. Topics discussed include...

  • When Is It Time to Part Ways With Medical Records? Eramo, Lisa A. // For the Record (Great Valley Publishing Company, Inc.);6/18/2012, Vol. 24 Issue 12, p14 

    The article discusses the controversies regarding the retention and destruction of electronic and paper records of patients by the hospitals, as there is no clear guideline to set a time for retention. The hospitals should employ different retention policies based on the legal definitions and...

  • Late Entries to the EMR: Do They Help or Hurt Defense?  // ED Legal Letter;Aug2012, Vol. 23 Issue 8, p94 

    The article discusses the disadvantages that can be caused by a late entry in the electronic medical record (EMR), as it can often raise doubts over the good entries in the record as well. The different strategies that can help in reducing risks related late EMR entries include entering only...

  • Copy and Paste in ED: "Dangerous Practice".  // ED Legal Letter;Nov2012, Vol. 23 Issue 11, p129 

    The article discusses the consequences of cutting and pasting of an emergency department (ED) patient's history without verifying the data. Legal problems can arise from cutting and pasting of patient data. Some electronic medical records (EMRs) allow for past medical history from previous...

  • Data mining for health executive decision support: an imperative with a daunting future! Glover, Saundra; Rivers, Patrick A.; Asoh, Derek A.; Piper, Crystal N.; Murph, Keva // Health Services Management Research;Feb2010, Vol. 23 Issue 1, p42 

    Data mining is highly profiled. It has the potential to enhance executive information systems. Such enhancement would mean better decision-making by management, which in turn would mean better services for customers. While the future of data mining as technology should be exciting, some are...

  • Drafting a Blueprint for Information Governance. Czarkowski, Lynette; Clark, Jill S. // Journal of AHIMA;Nov/Dec2015, Vol. 86 Issue 11, p52 

    The article discusses developing a blueprint for information governance (IG) in healthcare information management to allow an organization's stakeholders to agree on a plan to ensure alignment, accountability, and program success. Topics include establishing a need for IG, constructing a...

  • Big data hacks prompt providers to up security spending. Conn, Joseph // Modern Healthcare;4/13/2015, Vol. 45 Issue 15, pS005 

    The article offers information on the Modern Healthcare's Survey of Executive Opinions on Key Health Information Technology Issues in 2015 on two recent breaches of health insurers' information technology systems in the U.S. in which personally identifiable records of around 83 million...


Read the Article

Courtesy of

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics