472 results.
<< 7 8 9 10 11 12 13 14 [15] 16 17 18 19 20 21 22 >>
Exploring Medical Identity Theft
Author: Mancilla, Desla; Moczygemba, Jackie
Source: Perspectives in Health Information Management
Publication Date: September 2009
CMS’s 2009 Security Assessment Process
Author: Dinh, Angela K.
Source: Journal of AHIMA
Publication Date: September 2009
In 2008 the Centers for Medicare and Medicaid Services (CMS) conducted 10 HIPAA security assessments in covered entities (CEs) nationwide. CMS’s stated purpose was not to identify flaws but to gain a true understanding of industry compliance with the HIPAA security rule.
CMS co....
RAC Coordinator’s Role
: RAC Audits Require a Coordinator to Ensure Compliance
Author: Safian, Shelly C
Source: Journal of AHIMA
Publication Date: August 2009
The national rollout of the Recovery Audit Contractor (RAC) program this year will require much of healthcare entities. In order to prepare for the program, entities should designate one person as the main point of contact for all RAC activity. The RAC coordinator helps ensure compliance with....
Stop Medicare Fraud [external web site]
Author: U.S. Department of Health and Human Services; U.S. Department of Justice
Source: Government (U.S.)
Publication Date: July 15, 2009
Medicare fraud results in higher health care costs for everyone. Eliminating fraud cuts costs for families, businesses, and the federal government. It also increases the quality of services for those who need care.
Protect your patients, protect your practice: What you need to know about the Red Flags Rule
Author:
Source: External web site
Publication Date: July 02, 2009
HIPAA: 43,691 Privacy Complaints and Counting
Author: AHIMA
Source: Journal of AHIMA
Publication Date: June 2009
For those wondering what progress the Office for Civil Rights makes as it works through HIPAA privacy rule complaints, the numbers are easy to find. Each month OCR reports top-line results of the HIPAA cases it has received and resolved.
OCR has logged approximately 43,700 complaints....
Fraud Enforcement and Recovery Act of 2009
Author: U.S. Congress
Source: Government (U.S.)
Publication Date: May 20, 2009
Sanction Guidelines for Privacy and Security Breaches (2009)
Author: AHIMA
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: May 2009
This practice brief has been updated. See the latest version here. This version is made available for historical purposes only.
Five RAC Coding Targets: Demonstration Program Identified Key Areas of Improper Payment
Author: Wilson, Donna D
Source: Journal of AHIMA - Coding Notes
Publication Date: May 2009
The Centers for Medicare and Medicaid Services (CMS) expects to have four Recovery Audit Contractors (RACs) operating by 2010. Each RAC will be responsible for identifying overpayments and underpayments in a region of the country. Based on the results of the demonstration program, the permanen....
Framework For Combating Fraud, Waste, And Abuse In Federal Health Care Programs
Author: Morris, Lewis
Source: Government (U.S.)
Publication Date: April 22, 2009
<< 7 8 9 10 11 12 13 14 [15] 16 17 18 19 20 21 22 >>