Select
Code Sets
Indexes
Code Sets and
Indexes
Tools
Publications
Advanced Search
Home
Newsletter
Health Information Compliance Alert
Health Information Compliance Alert
Health Information Compliance Alert - 2005; Volume 5, Number 12
COMPLIANCE STRATEGIES:
USE THESE 6 FIELD-TESTED TIPS TO SECURE YOUR EMPLOYEES' HIPAA COMPLIANCE
...
Read more
YOU BE THE SECURITY OFFICER:
WHEN SHOULD WE DISTRIBUTE THE NPP?
Question: The entire front-office staff collaborated on a fact sheet about the privacy and...
Read more
Security:
ARE YOU TAKING THE RIGHT STEPS TO PROTECT YOUR E-MAIL PHI?
Document patient consent for e-mail messages and keep this on file, experts advise.If your...
Read more
Security Tip:
CRAFT YOUR OWN E-MAIL DISCLAIMER--HERE'S HOW
Make sure your practice's contact info is on every e-mailMedical offices that use e-mail t...
Read more
Technology:
STAY UP TO SPEED ON AHRQ HIT PROJECTS
Multi-million dollar awards will help use IT systems to improve safety and quality of heal...
Read more
NEWS YOU CAN USE
HHS Extends Interim Final Rule's Expiration DateEven though a final rule on Heal...
Read more
READER QUESTIONS:
IS A SOCIAL SECURITY NUMBER APPROPRIATE AT SIGN IN?
Question: We ask patients to write down their date of birth or the last four digits of the...
Read more
READER QUESTIONS:
PHISHING AND PHARMING--LEARN THE DIFFERENCE
Question: Our medical office has had problems with "phishing" scams on our Web site. Today...
Read more
READER QUESTIONS:
SECURE YOUR PHI WITH THESE FAX, E-MAIL TIPS
Question: Our office continues to get more computer and fax-savvy, and this has undoubtedl...
Read more
Health Information Compliance Alert - 2005; Volume 5, Number 11
SECURITY:
3 PROVEN TACTICS PROTECT YOUR TRANSCRIBED PHI
Use a security questionaire to iron out your vendor's security rule wrinklesIf your medica...
Read more
SAMPLE DOCUMENT:
SET YOUR VENDORS' SECURITY STANDARDS WITH THIS FORM
Work with your tech team to develop and define your security needsYour best security rule ...
Read more
CONFERENCES:
CONFERENCE CALENDAR
Here are the informative conference opportunities planned for November: November 1--2...
Read more
SECURITY STRATEGIES:
ARM YOURSELF AGAINST SECURITY BREACHES WITH THIS STRATEGY
Use your firewall to ward off malicious attacksYou already have the foundation to build a ...
Read more
SECURITY SOLUTION:
HERE'S HOW TO PUMP UP YOUR COMPLIANCE PURCHASING SAVVY
Avoid security program rip offs with this guideYour security compliance hinges on the poli...
Read more
SECURITY TIP:
PREPARE FOR A NEW CROP OF PORTABLE DEVICES
Use this list to catch all the new devices in your facilityA slew of new portable devices ...
Read more
HEALTH INFORMATION NEWS
OHIO REPORTERS TAKE HIPAA TO COURTHealth departments and other public health agencies take...
Read more
READER QUESTIONS:
SEND YOUR NPP TO PARTICIPANTS ONLY
Question: We work with an employer-sponsored health plan, but we are confused as to who sh...
Read more
READER QUESTIONS:
YOU CAN USE WEB CAMERAS
Question: Our tech team wants to use voice over Internet protocol (VoIP) and Web cameras i...
Read more
READER QUESTIONS:
CHOOSE ONE FEE FOR PATIENT COPIES
Question: We recently realized that our remote sites charge different amounts for patients...
Read more
Health Information Compliance Alert - 2005; Volume 5, Number 10
SECURITY:
KNOW WHAT CONTRACT BEST PROTECTS YOUR PHI
When do TPAs fit better than BAAs? The answer may surprise youA business associate agreeme...
Read more
SECURITY COMPLIANCE:
You Can Safely Send Instant Messages--Here's How
Think sending instant messages will shut down your systems? Think againAllowing your emplo...
Read more
CONFERENCES
CONFERENCE CALENDAR CORNERUsher in the season's cooler weather with these informative priv...
Read more
SECURITY TIP:
PREPARE TO ACCEPT THESE IM SECURITY RISKS
Your firewall won't catch viruses sent via an instant messageInstant messaging can streaml...
Read more
SECURITY STRATEGIES:
DON'T LET AN EMERGENCY WIPE OUT YOUR SECURITY RULE COMPLIANCE
Create a contingency plan that will prepare your staff members to handle any disasterDon't...
Read more
CLIP 'N' SAVE:
USE THIS TOOL TO ENSURE CORRECT DOCUMENTATION
Hold on to this information or kiss your security compliance goodbyeIf you can't rattle of...
Read more
HEALTH INFORMATION NEWS:
KATRINA EVACUEES' EMRs GO ONLINE
With more than 800,000 evacuees from the storm-ravaged Gulf Coast seeking treatment in des...
Read more
READER QUESTIONS:
PROTECT PHI WITH AUTOMATIC, LOCKED SCREENSAVERS
Question: Our IT department wants to require that each workstation's password-protected sc...
Read more
READER QUESTIONS:
DON'T WITHHOLD PATIENTS' MEDICAL RECORDS
Question: A few of our patients have asked for a full, unedited copy of their medical reco...
Read more
Health Information Compliance Alert - 2005; Volume 5, Number 9
COMPLIANCE STRATEGIES:
Top 3 Reasons To Keep Your Patients' PHI On U.S. Soil
Is offshoring an option for you? Here's how to find outYour first question when contemplat...
Read more
PUT ANTI-OFFSHORING MEASURES IN PERSPECTIVE
Not every offshore data processor is a potential identity thief, but that doesn't mean you...
Read more
SECURITY:
GUARD AGAINST INTERNET SCAMS WITH THESE EXPERT STRATIGIES
Keep your staffers on their toes with regular procedure updates and e-mail remindersIf you...
Read more
Conferences:
Conference Calendar Corner
Say goodbye to summer with these exciting privacy and security events headed your way in S...
Read more
Internet Safety Tip:
Be On the Lookout For This New Scam
You have every reason to worry that your patients could be tricked into divulging their in...
Read more
Clip 'N' Save:
Use These Guidelines To Safeguard Against Internet Attacks
Send e-mail scams to the recycling bin with these tipsThink your employees know how to sto...
Read more
SECURITY STRATEGIES:
PROTECT PHI ON YOUR MEDICAL DEVICES WITH THESE TIPS
5 techniques to ensure your patients' PHI stays out of unauthorized users' reachProblem: Y...
Read more
HEALTH INFORMATION NEWS
AVOID PAYMENT DELAYS WITH ELECTRONIC CLAIMSStarting on Oct. 1, 2005, Medicare will no long...
Read more
Reader Questions:
Mass E-mails Aren't No-Nos
Question: We would like to send a quarterly e-mail newsletter to our patients who have pro...
Read more
Reader Questions:
You Can Ask For Patients' Input
Question: We are interested in expanding our community presence by building another treatm...
Read more
Health Information Compliance Alert - 2005; Volume 5, Number 8
SECURITY:
DEPEND ON DUMMY DATA TO PROTECT PHI DURING SYSTEM TESTS
Use this advice to ensure your patients' information is used only when necessaryIf you're ...
Read more
TECHNOLOGY:
GET THE GROUND-LEVEL VIEW OF VISTA-OFFICE EHR SYSTEM
Two compliance officers share their initial thoughts on CMS' new solutionUnless you've bee...
Read more
Conference Calendar Corner
Summer is almost over, but you still have plenty of informative opportunities. Here are a ...
Read more
TECH TIP:
VISTA-OFFICE EHR FAST FACTS
Here's what you need to know about VistA-Office EHR: Market = Private physici...
Read more
COMPLIANCE STRATEGIES:
6 PROVEN METHODS TO PLUG PORTABLE DEVICES' SECURITY GAPS
You can keep your organization's data safe from unauthorized users-here's howIt can happen...
Read more
HEALTH INFORMATION NEWS:
PHI & YOUR LEGAL BATTLES DON'T MIX
PHI & YOUR LEGAL BATTLES DON'T MIXIf you think your attorneys can display ex-employees...
Read more
READER QUESTIONS:
DON'T WRITE OFF YOUR RETENTION DUTIES
Question: We have been storing our patients' written acknowledgement that they received ou...
Read more
READER QUESTIONS:
LET PATIENTS REQUEST STAFF FOLLOW UPS
Question: Many of our critical care staff become attached to the patients they treat and w...
Read more
READER QUESTIONS:
AVOID VOICEMAIL WORRIES WITH THIS ADVICE
Question: Our tech support team is at a crossroads about whether voicemail is considered e...
Read more
Health Information Compliance Alert - 2005; Volume 5, Number 7
SECURITY:
HERE'S HOW TO GIVE 'ACCESS CREEP' THE OLE HEAVE-HO
Expert guidance to help you streamline your access proceduresDo you have a method to evalu...
Read more
SAMPLE FORM:
PUT AN END TO 'CREEP' WITH THESE ACCESS CONTROL FORMS
Use these tools to manage access control and create a documentation trailAs your employees...
Read more
CONFERENCES:
Conference Calendar Corner
Summer conferences and events offer you some relief from the hot sun. Here's what's slated...
Read more
PRIVACY:
DON'T RELY ON ALIASES TO PROTECT YOUR PATIENTS' PHI
You can protect your patients' information without changing their names - here's howPictur...
Read more
COMPLIANCE STRATEGIES:
6 TIPS TO STREAMLINE YOUR ACCOUNTING OF DISCLOSURES
Here's what you need to list in your accounting of disclosuresIf you can't recognize an in...
Read more
HEALTH INFORMATION NEWS:
KAISER PAYS THE PRICE FOR EXPOSING PATIENTS' PHI
Posting patients' PHI on an unencrypted Web site will not only ruin your reputation with c...
Read more
READER QUESTIONS:
BE WARY OF TEEN PREGNANCIES
Question: A 16-year-old patient presented with flu-like symptoms. After running tests, we ...
Read more
Health Information Compliance Alert - 2005; Volume 5, Number 6
Security Compliance:
Audit Your Employees' Activities in 3 Easy Steps
Follow these guidelines to evaluate your staffers' suspicious behaviorIf you think your gr...
Read more
Audit Tool:
Use This Tool to Evaluate Your Employees' Activities
Don't rely on one record of system activity to tell you what's happening in your organizat...
Read more
Conferences:
Conference Calendar Corner
Check out these exciting and information conferences coming in June. June 3 in Chicago: "S...
Read more
Compliance:
5 Quick Tips to Quash Staffers' Common Compliance Mistakes
You can prevent your personnel's PHI transmission slip-ups-here's howDo fax and e-mail blu...
Read more
Policy:
Prepare Your Policies For a New Generation of Health Info Regulations
Your state's health information policies may have changed alreadyThe last thing you need i...
Read more
Health Information News
PROTECT PHI FROM YOUR STAFFYour best intentions can be easily thwarted by employees intent...
Read more
Reader Question:
Don't Sweep Your Compliance Concerns Under the Rug
Question: A provider in our area has established policies and procedures that allow PHI to...
Read more
Health Information Compliance Alert - 2005; Volume 5, Number 5
SECURITY:
3 PROVEN METHODS TO PUT THE BRAKES ON SECURITY BREACHES
Train staff members to deal with violations before PHI winds up in the wrong handsA securi...
Read more
COMPLIANCE STRATEGIES:
RELY ON YOUR SANCTIONS POLICY TO MITIGATE PHI LEAKS
The sanctions you impose could determine your patients' reactions to inappropriate disclos...
Read more
SANCTIONS TOOL:
PUT YOUR SANCTIONS SAVVY TO THE TEST
Don't wait for a violation to test your ability to effectively use your sanctions policy t...
Read more
CONFERENCE CALENDAR CORNER
May brings more than spring flowers - check out these informative events! May 2 - 5 in Dal...
Read more
PRIVACY:
EXPERT TIPS TO HELP YOU COVER YOUR BILL-COLLECTION BASES
Use our checklist to ensure your collector's complianceThe last thing you need to worry ab...
Read more
ENFORCEMENT:
LAX SECURITY RULE POLICIES COULD COST YOU BIG
Here's the scoop on the new proposed enforcement ruleIf you're basing your security rule c...
Read more
Privacy Rule Compliance Update
Now that the security rule has taken effect, are you wondering how privacy rule compliance...
Read more
HEALTH INFORMATION NEWS
WARN YOUR BAs TO BEEF UP SECURITYYour business associates' security measures must be top n...
Read more
READER QUESTIONS:
SIGN UP TO PROTECT PATIENT PRIVACY
Question: We would like patients to write down their date of birth or the last four digits...
Read more
READER QUESTIONS:
TURN YOUR STORAGE VENDORS INTO BUSINESS ASSOCIATES
Question: We want to house our paper records with an offsite storage vendor. We would subm...
Read more
Health Information Compliance Alert - 2005; Volume 5, Number 4
SECURITY:
PROVEN STRATEGIES TO ELIMINATE EMPLOYEES' PHI MISHAPS
Use this professional guidance to protect your patients' PHI from employees' mistakesAn em...
Read more
COMPLIANCE TIPS:
CUT THE CORD ON YOUR WIRELESS PATIENT ACCESS CONCERNS
You can allow patients to use a wireless connection without ruining your compliance progra...
Read more
CONFERENCES:
Conference Calendar Corner
Worried about your security rule compliance? Here's a list of the security-related audioco...
Read more
CASE STUDY:
TIPS FOR TAMING THE WIRELESS ACCESS BEAST
Wireless networking isn't the technology bear it's made out to be.That's the attitude Fern...
Read more
SECURITY STRATEGIES:
9 STEPS FOR COMPLETING YOUR SECURITY RULE COMPLIANCE PROGRAM
Be sure you've sorted through each standard - before it's too lateThe April 20 security ru...
Read more
HEALTH INFORMATION NEWS
2ND PRIVACY THREAT ROCKS FLORIDA HIV/AIDS PATIENTSIf you think a simple e-mail gaffe won't...
Read more
READER QUESTIONS:
AVOID SEVERE AUTOMATIC LOGOFF POLICIES
Question: Our information systems department has asked that all workstations be set to aut...
Read more
READER QUESTIONS:
DON'T DISCLOSE PATIENTS' PHI TO FUNERAL HOMES
Question: We often share pertinent information with funeral home directors so they can com...
Read more
READER QUESTIONS:
MAKE CHANGES BEFORE YOU ASK PATIENTS TO RE-SIGN YOUR PRIVACY NOTICE
Question: A visiting physician who recently joined our staff claims that patients must sig...
Read more
Health Information Compliance Alert - 2005; Volume 5, Number 3
Security:
5 Building Blocks to Construct a Secure Password Policy
Use these elements to keep your passwords - and your patients' PHI - out of sightThere is ...
Read more
Compliance Strategies:
How to Help Your Business Associates Protect PHI
Remember: You don't have to police your associatesYou don't have to bend over backwards to...
Read more
Conferences:
Conference Calendar Corner
Start the spring thaw with these education opportunities coming in March and April.March 2...
Read more
Compliance Tips:
Take These Steps To Steer Visitors Away From PHI
You can open your organization to visitors - here's howWhether you allow anyone to look ar...
Read more
Sample Document:
Get Your Vendors on the Bandwagon With This Form
Not all your organization's guests are visiting for personal reasons. Some are trying to s...
Read more
Health Information News
CHICAGO HOSPITAL HUSTLES TO PROTECT PATIENTS' IDs Officials of the University of Chic...
Read more
Reader Questions:
Don't Deny Access to Your Deceased Patients' PHI
Question: The family of a recently deceased patient wants access to the patient's entire m...
Read more
Reader Questions:
Put Your Grand Opening In the Public Eye
Question: Our doctors are opening a new location on the other side of our city. Can we sen...
Read more
Reader Questions:
One Key to Facility Security: Keys
Question: We want to use the same locks on all our facility's interior doors. The keys to ...
Read more
Health Information Compliance Alert - 2005; Volume 5, Number 2
COMPLIANCE:
4 STRATEGIES TO HELP YOU GRANT ROLE-BASED ACCESS
You can stamp your patients' PHI 'for authorized eyes only' - here's howRole-based access ...
Read more
CASE STUDY:
LEVEL YOUR ROLE-BASED ACCESS PLAYING FIELD IN 3 EASY STEPS
Professional advice to help you avoid access landminesThere is no perfect way to grant rol...
Read more
TECHNOLOGY:
GET INVOLVED IN THE MOVE TOWARD INDUSTRY-WIDE EMR ADOPTION
Here's how you can help make interoperable records a realityThink you have to sit back and...
Read more
SECURITY STRATEGIES:
HOW TO KEEP YOUR OUTDATED HARDWARE FROM LEAKING PHI
Use these best practices when removing health information from your officeYou know your co...
Read more
SAMPLE POLICY:
AVOID DETOURS ON THE WAY TO ROLE-BASED ACCESS
Your access policy shouldn't serve as a barricade keeping employees from taking on other r...
Read more
TECH TIP:
5 COMMON METHODS TO GIVE STORED PHI THE BOOT
The security rule doesn't stop you from throwing your hardware into the scrap heap, but if...
Read more
HEALTH INFORMATION NEWS:
KEEP PHI OFF THE INFORMATION HIGHWAY
If your protected health information is kept in an online database, your identity could be...
Read more
CONFERENCES:
Conference Calendar Corner
Shake February's chilly-weather blues with these interesting HIPAA-related events: Februar...
Read more
READER QUESTIONS:
FTP WON'T TKO YOUR SECURITY RULE COMPLIANCE
Question: Our staffers want to use file transfer protocol (FTP) to send patients' confiden...
Read more
Health Information Compliance Alert - 2005; Volume 5, Number 1
Security:
5 STEPS TO GUARANTEE YOUR SECURITY MEASURES MAKE THE GRADE
Professional guidance will ensure your security rule compliance - before it's too lateThe ...
Read more
Security Compliance:
CORK PHI LEAKS IN STAFF E-MAIL WITH THESE KEY TACTICS
Use these strategies to keep your compliance plan strong without breaking the bankWhen you...
Read more
Conference Calendar Corner
Don't stress over your security rule compliance. Check out a security-related event in you...
Read more
Clip 'n' Save:
USE THIS TOOL TO STRIP YOUR E-MAILS OF PATIENTS' PHI
Information that does not identify an individual is considered deidentified. That means th...
Read more
Security Strategies:
DON'T ASSUME PHI IS Safe IN STAFFERS' HOMES
You can protect your patients' PHI in an unsecure environmentIt seems harmless: some at-ho...
Read more
Sample Policy:
Take Your Patients' PHI Out of the Scrap Heap
Don't depend on your staff to make sound on-the-spot decisions about patient e-mails. Use ...
Read more
Health Information News
EPA Chief to Lead HHSIn a move not anticipated by industry watchdogs, President Bush ...
Read more
Reader Questions:
Keep Crimes From Killing Your Compliance Efforts
Question: Law enforcement officers recently contacted us about a patient that was treated ...
Read more
Available Years:
2005
2004
2003
2002