All
All

HITECH Terminology Quick Reference

130.6 KB | 3 files |  DOC, PDF

Understanding what the HITECH Act means for you and your business is crucial. ManageMyPractice.com founder Mary Pat Whaley's terminology list helps you make sense of the alphabet soup of acronyms and extensive list of key agency players.

The Health Information Technology for Economic and Clinical Health Act (also known as the HITECH Act) is Title XIII of the American Recovery and Reinvestment Act of 2009 (often referred to as ARRA). According to IT Business Edge's Lora Bentley, HITECH "commits $22 billion to 'advance the use of health information technology' and broadens Health Insurance Portability and Accountability Act (HIPAA) privacy and security requirements."

If only it were as simple as that broad definition. Understanding what this legislation means for you and your business is crucial. ManageMyPractice.com founder Mary Pat Whaley's HITECH and ARRA terminology list helps you make sense of the alphabet soup of acronyms (EHR, MU, CCHIT) and extensive list of key agency players.

The attached Zip file includes:

  • Intro Page.doc
  • Cover Sheet and Terms.pdf
  • HITECH Terminology Quick Reference.doc
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.

This Download is provided by:

Partner logo

Mary Pat Whaley is the Practice Administrator for Halifax Regional Medical Center, a hospital in Roanoke Rapids, North Carolina. She manages primary care and occupational medicine clinics, as well as a hospitalist group and the physician billing office. She is the founder and editor of the Manage My Practice blog, which she started in July 2008 to provide medical practice managers a place to find resources and information.

All IT Downloads from Manage My Practice» | Visit Manage My Practice »
Related IT Downloads

Checkbox1 National Checklist Program for IT Products – Guidelines for Checklist Users and Developers

This document makes recommendations for how users and developers should select checklists from the NIST National Checklist Repository, evaluate and test checklists, and apply them to IT products. ...  More >>

Security73 Guide to Application Whitelisting

This publication is intended to assist organizations in understanding the basics of application whitelisting. It also explains planning and implementation for whitelisting technologies throughout the security deployment lifecycle. ...  More >>

Security29 Security of Interactive and Automated Access Management Using Secure Shell (SSH)

This publication assists organizations in understanding the basics of SSH interactive and automated access management in an enterprise, focusing on the management of SSH user keys. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.