Q. Please explain in an understandable way for nontechnical individuals what level of encryption is needed for e-mail to be considered secure as defined in the interim final breach notification rule.
HIPAA requires implementation of technical policies and procedures for electronic information systems that maintain electronic protected health information (ePHI) to allow access only to those persons or software programs that have been granted access rights [§164.312(a)] as specified in the administrative safeguards under access authorization, establishment, and modification [§164.308(a)(4)].
While I was on one of my first consulting engagements in the early 1980s-when the pundits were predicting that everyone would be fully on EMRs no later than 1990-I experienced a rude wake-up lesson: the automating dysfunction "reality check" factor.
From researching and implementing EHR systems to developing training and education plans for ICD-10 to overseeing your Recovery Audit Program review results, the daily tasks of an HIM director can quickly become overwhelming.
When it comes to the scanning function, how does your facility compare to those of your peers? To help you answer that question, MRB focused its latest quarterly benchmarking survey on scanning productivity. We hope you'll find the results helpful. More than 200 survey respondents completed the 2012 survey, including: