Pay attention to content of phone messages

February 2011
Healthcare Risk Management;Feb2011 Supplement, p4
No abstract available.


Related Articles

  • Addendum. Swiped, Not Hacked: After a Year of Reporting, Theft Remains Main Cause of Breach.  // Journal of AHIMA;Feb2011, Vol. 82 Issue 2, p66 

    The article reports on the most common cause of data breach in healthcare in the U.S. which is theft. It notes that of the 217 large-scale breaches reported to the Department of Health and Human Services by mid-January 2011, 121 involved theft. A federal rule on breach notification is discussed....

  • Informational Privacy, Public Health, and State Laws. O'Connor, Jean; Matthews, Gene // American Journal of Public Health;Oct2011, Vol. 101 Issue 10, p1845 

    Developments in information technology that make it possible to rapidly transmit health information also raise questions about the possible inappropriate use and protection of identifiable (or potentially identifiable) personal health information. Despite efforts to improve state laws, adoption...

  • Key Provisions of the HIPAA Final Rule. Crandall, Deborah // PT in Motion;May2013, Vol. 5 Issue 4, p38 

    The article discusses main aspects of the Health Insurance Portability and Accountability and Accountability Act (HIPAA) final rule. It lists the key provisions of HIPAA final rule such as allowance of family members to the health information, right to receive electronic copies of health...

  • Navigating a Compliant Breach Management Process.  // Journal of AHIMA;Jun2014, Vol. 85 Issue 6, p56 

    The article looks at the Breach Management Toolkit offered by the American Health Information Management Association (AMIHA). The toolkit provides a collection of resources and best practices to aid healthcare organizations and health information management (HIM) professionals in navigating a...

  • Do you have a plan? Addressing Risks of Data Breaches in Your Practice. Crandall, Deborah // PT in Motion;Jun2014, Vol. 6 Issue 5, p8 

    The article discusses the risk of data breaches of individuals' private information (PHI) which are usually reported in retail settings in credit card companies. It states the initiative of the U.S. government's principal agency Department of Health and Human Services (HHS) on providing...

  • Into the Breach. Crandall, Deborah // PT in Motion;Nov2011, Vol. 3 Issue 10, p42 

    The article offers several things U.S. health care facilities and organizations may consider upon breaches of protected health information (PHI), a rule on which is expected to be finalized by late 2011. It says that a written notification is required if the breach could pose significant risks...

  • The Year Ahead for HIM. Butler, Mary // Journal of AHIMA;Jan2014, Vol. 85 Issue 1, p24 

    The article discusses the author's view on the implementation of the 10th revision of the International Statistical Classification of Diseases and Related Health Problems (ICD-10) in October 2014 in the U.S. She describes an important role health information management (HIM) professionals play...

  • USA PATRIOT Act Still Raising Questions. PIKE, GEORGE H. // Information Today;Jul/Aug2015, Vol. 32 Issue 6, p13 

    The article discusses the continued controversies surrounding the USA PATRIOT Act, a series of amendments to the Foreign Intelligence Surveillance Act (FISA). Topics cited include the investigative tools and resources that FISA is expected to provide, the latest dispute over the so-called...

  • The NSA and an Imperfect World. PIKE, GEORGE H. // Information Today;Oct2013, Vol. 30 Issue 9, p22 

    The author offers opinions on electronic surveillance and data mining of telecommunication by the U.S. National Security Agency (NSA). After acknowledging that the right of privacy in telecommunication and the Internet has been given less legal standing by courts and that the laws governing the...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics