All
All

HITECH Terminology Quick Reference

130.6 KB | 3 files | null DOC,null PDF

Understanding what the HITECH Act means for you and your business is crucial. ManageMyPractice.com founder Mary Pat Whaley's terminology list helps you make sense of the alphabet soup of acronyms and extensive list of key agency players.

The Health Information Technology for Economic and Clinical Health Act (also known as the HITECH Act) is Title XIII of the American Recovery and Reinvestment Act of 2009 (often referred to as ARRA). According to IT Business Edge's Lora Bentley, HITECH "commits $22 billion to 'advance the use of health information technology' and broadens Health Insurance Portability and Accountability Act (HIPAA) privacy and security requirements."

If only it were as simple as that broad definition. Understanding what this legislation means for you and your business is crucial. ManageMyPractice.com founder Mary Pat Whaley's HITECH and ARRA terminology list helps you make sense of the alphabet soup of acronyms (EHR, MU, CCHIT) and extensive list of key agency players.

The attached Zip file includes:

  • Intro Page.doc
  • Cover Sheet and Terms.pdf
  • HITECH Terminology Quick Reference.doc
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.

This Download is provided by:

Partner logo

Mary Pat Whaley is the Practice Administrator for Halifax Regional Medical Center, a hospital in Roanoke Rapids, North Carolina. She manages primary care and occupational medicine clinics, as well as a hospitalist group and the physician billing office. She is the founder and editor of the Manage My Practice blog, which she started in July 2008 to provide medical practice managers a place to find resources and information.

All IT Downloads from Manage My Practice» | Visit Manage My Practice »
Related IT Downloads

Compliance2 Building a GRC Program: Assessing Stakeholder Needs and Readiness

This table outlines the top needs of each stakeholder group that can help guide your conversations on priorities and needs for the GRC program. ...  More >>

Security95 Guide to Cyber Threat Information Sharing

This publication provides guidelines for establishing and participating in cyber threat information sharing relationships. ...  More >>

email9 Trustworthy Email

This document provides recommendations and guidelines for enhancing trust in email, including transmission and content security recommendations. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.