Theft of thousands of schedules raises alarm for surgery managers

September 2011
Same-Day Surgery;Sep2011, Vol. 35 Issue 9, p89
Academic Journal
The article reports on paper surgery schedules for about 4,500 patients, which included their names, dates of birth, and Social Security numbers, and which were stolen in 2011 at an Alabama hospital when a woman was visiting a patient.


Related Articles

  • Informational Privacy, Public Health, and State Laws. O'Connor, Jean; Matthews, Gene // American Journal of Public Health;Oct2011, Vol. 101 Issue 10, p1845 

    Developments in information technology that make it possible to rapidly transmit health information also raise questions about the possible inappropriate use and protection of identifiable (or potentially identifiable) personal health information. Despite efforts to improve state laws, adoption...

  • HIPAA MIGHTY and FLAWED. Solove, Daniel J. // Journal of AHIMA;Apr2013, Vol. 84 Issue 4, p30 

    The article briefly discusses the Health Insurance Portability and Accountability Act (HIPAA). Evaluation has revealed that among various industries federal privacy laws, HIPAA is comprehensive and detailed. It mentions advantages of HIPAA which include specific measures to protect data...

  • The Year Ahead for HIM. Butler, Mary // Journal of AHIMA;Jan2014, Vol. 85 Issue 1, p24 

    The article discusses the author's view on the implementation of the 10th revision of the International Statistical Classification of Diseases and Related Health Problems (ICD-10) in October 2014 in the U.S. She describes an important role health information management (HIM) professionals play...

  • Word from Washington. Charting HIPAA's Course. Rode, Dan // Journal of AHIMA;Feb2012, Vol. 83 Issue 2, p18 

    The article examines the regulations of the U.S. Health Insurance Portability & Accountability Act (HIPAA) which are changing due to the American Recovery and Reinvestment Act of 2009, and the Affordable Care Act of 2010. The author states that the process for updates and revision of HIPAA did...

  • A Workflow for Breach Notification. Walsh, Tom // Journal of AHIMA;Apr2010, Vol. 81 Issue 4, p32 

    The article discusses the steps for breach notification of health information in the U.S. To address such notification, the information necessary to file a report of breaches to the Department of Health and Human Services (HHS) should be captured. The incident should be determined if it involves...

  • Commercial Speech Bruises Health Privacy in the Supreme Court. Allen, Anita L. // Hastings Center Report;Nov2011, Vol. 41 Issue 6, p8 

    The article discusses the issue of the confidentiality of personal health information citing the case, Sorrell v. IMS Health Inc. An overview of the case, which focuses on the constitutionality of Vermont's Prescription Confidentiality Law, is provided. In his opinion, Justice Anthony Kennedy...

  • The ABCs for working with BAs: A 2013 update. Bowen, Rita; McDavid, Jan // Health Management Technology;May2013, Vol. 34 Issue 5, p5 

    The article discusses the effects of the Health Insurance Portability and Accountability Act (HIPAA) on the relationship between covered entities (CE) and business associates (BA) in the U.S. It mentions that the update in the HIPAA rule implies that security rule safeguards are also applicable...

  • Mandates Encourage E-Discovery.  // Journal of AHIMA;May2012, Vol. 83 Issue 5, p68 

    An addendum is presented of the federal initiatives which overlapped with the Federal Rules of Civil Procedure (FRCP) to encourage the rise of electronic discovery requests for the U.S. healthcare delivery system.

  • Reviewing the New HIPAA Rules. Dimick, Chris // Journal of AHIMA;Mar2013, Vol. 84 Issue 3, p40 

    The article discusses rules of the U.S. Health Insurance Portability & Accountability Act (HIPPA) of 1996 and informs about modifications in Health Information Technology for Economic and Clinical Health (HITECH)-HIPPA security and final rule that affects several sectors of health care industry...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics