Search Results

= Members only

Current search

472 results.

[1] 2 3 4 5 6 7

2003 Red Book Reveals Cost-saving Recommendations

Author: Prophet-Bowman, Sue

Source: Journal of AHIMA

Publication Date: September 2003


Although the Department of Health and Human Services (HHS) Office of Inspector General (OIG) has already saved tax payers more than $12 million this year, it offers still more cost-saving recommendations for the Centers for Medicare & Medicaid Services (CMS) in its annual Red Book that hav....

2004 HIPAA Privacy & Security Compliance Survey

Author: AHIMA

Source: AHIMA

Publication Date: April 12, 2004

The results of a survey conducted by AHIMA to assess the current state of HIPAA privacy within the healthcare industry. These results are being released in conjunction with the first annual National Health Information Privacy and Security Week.

ABCs of Health Plan Audits

Author: Crump, Dawn; Hennum, Jeannie

Source: Journal of AHIMA - website

Publication Date: March 2015



The Affordable Care Act (ACA) has a dramatic ripple effect on the healthcare industry—and will continue to create seismic shifts for many years to come. One important change for health information management (HIM) professionals to understand is the impact of ACA on health plan audits. Alre....

Access Controls: Striking the Right Balance

Author: Amatayakul, Margret

Source: Journal of AHIMA

Publication Date: January 2005


As healthcare organizations put the finishing touches on their HIPAA security compliance plans, many are finding that updating access controls is not easy. Clinicians often scoff at the word “control” in general and at “access control” in particular. Not all products ar....

Adapting BA Practices to Meet the Omnibus Rule

Author: McSteen, Thomas

Source: Journal of AHIMA

Publication Date: September 2013



The 2013 HIPAA Omnibus Rule marks a key milestone for implementation of the 2009 Health Information Technology for Economic and Clinical Health Act (HITECH). One of the most far-reaching impacts of HITECH and the Omnibus Rule is that business associates (BA) and their subcontractors now mu....

Addressing HIPAA Across the Continuum

Author:

Source: Journal of AHIMA

Publication Date: February 2002


HIPAA is an issue in hospitals across the nation, but what about other kinds of facilities—such as long-term care, behavioral health, or home care organizations? They, too, need to address HIPAA. We asked three HIM professionals who work in these settings to briefly address how HIPAA is ch....

Are You Ready for a HIPAA Audit?

Author: Wiedemann, Lou Ann

Source: Journal of AHIMA

Publication Date: April 2017



Editor’s Note: The following is an excerpt from the new “External HIPAA Audit Readiness Toolkit” developed by AHIMA. The full toolkit is free for AHIMA members.


THE HITECH OMNIBUS Rule mandated that the US Department of Health and Human Services (HHS) condu....

Automation for Privacy and Security Compliance

Author: McLendon, Kelly

Source: Journal of AHIMA

Publication Date: March 2012


There has been a lack of enforcement of the privacy and security rules ever since HIPAA's inception. As such the adoption of comprehensive HIPAA compliance programs has lagged behind EHR development and implementation.

This in turn has caused little funding to be budgeted by provide....

Benchmarks as the Signposts Along the Fraud Case Trail

Author: Kaldal, Karen

Source: Journal of AHIMA

Publication Date: November 1998


Traditionally, payers in the healthcare industry have relied on external tips or complaints for starting points for fraud investigations. But recently the number of leads on fraud activity has increased as the public becomes more aware of the issue. To combat this problem, payers have begun to....

Best Practices for Medical Necessity Validation

Author: Scichilone, Rita A

Source: Journal of AHIMA

Publication Date: February 2002


To protect the Medicare Trust Fund from being drained, government health plans must provide coverage restrictions for unnecessary health services in vulnerable patient populations. One restriction mechanism is the provision of edits that look for valid reason-for-visit codes for selected servi....

Brailer to HIM: Continue 'Larger, Louder, and Faster'

Author:

Source: Journal of AHIMA

Publication Date: January 2007


“Do what you are doing larger, louder, and faster,” David Brailer, PhD, MD, told attendees during his general session presentation. Brailer, who served as national coordinator for health information technology in the Department of Health and Human Services from 2004 to 2006, thanked the audienc....

Busy Year for the RACs

Author: Easterling, Sharon

Source: Journal of AHIMA

Publication Date: March 2012



Learning from last year's denials and preparing for what's ahead will help providers avoid being stung in 2012.


When the Recovery Audit Contractor (RAC) permanent program began in 2009, providers were hopeful that the process for identifying underpayments and overpayments w....

Catching Up with HIPAA: Managing Noncompliance

Author: Weintraub, Abner E.

Source: Journal of AHIMA

Publication Date: May 2003


With the April 14 HIPAA privacy deadline behind us, many covered entities are still struggling to become compliant. Limited budgets and staff, conflicting advice, and unforeseen delays have all conspired to keep many covered entities from meeting the deadline.


What do you tell....

Catching Up with PEPP

Author: Bryant, Gloryanne H.; Fletcher, Robin

Source: Journal of AHIMA

Publication Date: September 2000


A year ago, the Journal of AHIMA reported on the newly created Payment Error Prevention Program (PEPP), which went into effect in August 1999. What has happened since then?
Best Billing Practices

PEPP was created to reduce Medicare prospective payment system (PPS) ....

Clearing the HIPAA Cobwebs: New ONC Chief Privacy Officer Lucia Savage Focuses on Balancing Privacy and Security with Expanding Interoperable EHR Exchange

Author: Dimick, Chris

Source: Journal of AHIMA

Publication Date: April 2015



The spiders of time have been hard at work on the US healthcare privacy and security rules, to the point that their place in health IT interoperability has become fogged and is inhibiting their proper role in the meaningful exchange of health information, according to Lucia Savage, JD, th....

CMS Bans Use of Physician Signature Stamps

Author: Bryant, Gloryanne H.

Source: Journal of AHIMA

Publication Date: November 2008


Question: What is the new Centers for Medicare and Medicaid Services ruling on use of signature stamps?

Answer: The Centers for Medicare and Medicaid Services (CMS) has made it clear that it will only accept signatures that are handwritten, electronic, or facsimiles of original wri....

CMS’s 2009 Security Assessment Process

Author: Dinh, Angela K.

Source: Journal of AHIMA

Publication Date: September 2009


In 2008 the Centers for Medicare and Medicaid Services (CMS) conducted 10 HIPAA security assessments in covered entities (CEs) nationwide. CMS’s stated purpose was not to identify flaws but to gain a true understanding of industry compliance with the HIPAA security rule.

CMS co....

Coding Compliance: Practical Strategies for Success

Author: Prophet, Sue

Source: Journal of AHIMA

Publication Date: January 1998


"Fraud," "abuse," "upcoding," "unbundling," and "compliance" have all become buzzwords in the news media. Eliminating healthcare fraud and abuse has become a top priority for the federal government. Government investigations are on the rise and providers everywhere tremble at the thought of b....

Compliance Efforts Get Some PEPP

Author: Bryant, Gloryanne H.

Source: Journal of AHIMA

Publication Date: September 1999


Earlier this year, the Office of the Inspector General (OIG) informed the Health Care Financing Administration (HCFA) that "the DRG system is vulnerable to abuse by providers who wish to increase reimbursement inappropriately through upcoding, particularly so within certain DRGs.&....

Compliance Efforts Lead to Process Improvements

Author: Swope, Shana

Source: Journal of AHIMA

Publication Date: June 2000




After Medicare regulations and the accompanying paperwork threatened to overwhelm an outpatient rehabilitation center, staff took steps to simplify the recertification process. The result was improved efficiency plus increased commitment to the electronic medical record. He....

Conference Handouts

Author: AHIMA

Source: HIPAA Conference 2000

Publication Date: March 13, 2000






 

Conference Handouts


If you weren't able to attend the HIPAA Conference in March, you can review the text of handouts and presentations provided at the sessions.

....

Coping with Government Audits

Author: Butler, Mary

Source: Journal of AHIMA - website

Publication Date: August 2014





The HIM Problem: Medicare Auditor Scrutiny of Inpatient Claims


This spring, the Centers for Medicare and Medicaid Services (CMS) issued its “two midnight rule” which was intended to define and clarify what Medicare considers to be criteria justifying an inpatient st....

Countdown to Compliance: Privacy

Author: Ingram-Muhammad, Sybil

Source: Journal of AHIMA

Publication Date: February 2002


How far along the road to compliance with the HIPAA privacy regulation is your organization? This article tells you the steps you should be taking to get in compliance by the April 2003 deadline.

It is February 2002—14 months before your organization has to be compliant with th....

Creating Privacy Rule Implementation Efficiency

Author: Hughes, Gwen

Source: Journal of AHIMA

Publication Date: October 2002


Many HIM professionals will be called upon to perform an extraordinary feat during the next six months. They will be asked to bring one or more organizations into compliance with the HIPAA privacy rule by April 14, 2003. While this task is challenging in organizations that began such efforts a....

Cryptography and HIPAA: Breaking the Code

Author: Ruano, Michael

Source: In Confidence (newsletter)

Publication Date: June 02, 2003


Part four in a 10-part series.
This article is the fourth of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. The information security domain of cryptography is probably the most complex and mathematical of all the domai....

De-identification and the Sharing of Big Data

Author: White, Susan E

Source: Journal of AHIMA

Publication Date: April 2013



One of the newest buzz words in data analytics is “Big Data,” and the data created through the healthcare industry is some of the “biggest” around. The widespread implementation of electronic health records (EHRs) and the need to share data to measure quality and ma....

Dilemma of Psychotherapy Notes and HIPAA

Author: Nicholson, Ruby E.

Source: Journal of AHIMA

Publication Date: February 2002


For HIM professionals in behavioral health settings, the HIPAA privacy regulations pose a downright dilemma. Here’s why.


The privacy rule defines psychotherapy notes as:


Notes recorded in any medium by a mental health professional documenting or analyzing....

Dual Accreditation Presents Challenges, Opportunities

Author: Zender, Anne

Source: Journal of AHIMA

Publication Date: February 2000


While most HIM professionals are acquainted with participating in a facility's Joint Commission accreditation processes, a small but significant number work in facilities that are also accredited by the American Osteopathic Association (AOA). Though the organizations have....

[1] 2 3 4 5 6 7