Search Results

= Members only

Current search

472 results.

1 2 3 4 5 6 7 8 [9] 10

Dilemma of Psychotherapy Notes and HIPAA

Author: Nicholson, Ruby E.

Source: Journal of AHIMA

Publication Date: February 2002


For HIM professionals in behavioral health settings, the HIPAA privacy regulations pose a downright dilemma. Here’s why.


The privacy rule defines psychotherapy notes as:


Notes recorded in any medium by a mental health professional documenting or analyzing....

De-identification and the Sharing of Big Data

Author: White, Susan E

Source: Journal of AHIMA

Publication Date: April 2013



One of the newest buzz words in data analytics is “Big Data,” and the data created through the healthcare industry is some of the “biggest” around. The widespread implementation of electronic health records (EHRs) and the need to share data to measure quality and ma....

Cryptography and HIPAA: Breaking the Code

Author: Ruano, Michael

Source: In Confidence (newsletter)

Publication Date: June 02, 2003


Part four in a 10-part series.
This article is the fourth of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. The information security domain of cryptography is probably the most complex and mathematical of all the domai....

Creating Privacy Rule Implementation Efficiency

Author: Hughes, Gwen

Source: Journal of AHIMA

Publication Date: October 2002


Many HIM professionals will be called upon to perform an extraordinary feat during the next six months. They will be asked to bring one or more organizations into compliance with the HIPAA privacy rule by April 14, 2003. While this task is challenging in organizations that began such efforts a....

Countdown to Compliance: Privacy

Author: Ingram-Muhammad, Sybil

Source: Journal of AHIMA

Publication Date: February 2002


How far along the road to compliance with the HIPAA privacy regulation is your organization? This article tells you the steps you should be taking to get in compliance by the April 2003 deadline.

It is February 2002—14 months before your organization has to be compliant with th....

Coping with Government Audits

Author: Butler, Mary

Source: Journal of AHIMA - website

Publication Date: August 2014





The HIM Problem: Medicare Auditor Scrutiny of Inpatient Claims


This spring, the Centers for Medicare and Medicaid Services (CMS) issued its “two midnight rule” which was intended to define and clarify what Medicare considers to be criteria justifying an inpatient st....

Conference Handouts

Author: AHIMA

Source: HIPAA Conference 2000

Publication Date: March 13, 2000






 

Conference Handouts


If you weren't able to attend the HIPAA Conference in March, you can review the text of handouts and presentations provided at the sessions.

....

Compliance Efforts Lead to Process Improvements

Author: Swope, Shana

Source: Journal of AHIMA

Publication Date: June 2000




After Medicare regulations and the accompanying paperwork threatened to overwhelm an outpatient rehabilitation center, staff took steps to simplify the recertification process. The result was improved efficiency plus increased commitment to the electronic medical record. He....

Compliance Efforts Get Some PEPP

Author: Bryant, Gloryanne H.

Source: Journal of AHIMA

Publication Date: September 1999


Earlier this year, the Office of the Inspector General (OIG) informed the Health Care Financing Administration (HCFA) that "the DRG system is vulnerable to abuse by providers who wish to increase reimbursement inappropriately through upcoding, particularly so within certain DRGs.&....

Coding Compliance: Practical Strategies for Success

Author: Prophet, Sue

Source: Journal of AHIMA

Publication Date: January 1998


"Fraud," "abuse," "upcoding," "unbundling," and "compliance" have all become buzzwords in the news media. Eliminating healthcare fraud and abuse has become a top priority for the federal government. Government investigations are on the rise and providers everywhere tremble at the thought of b....

CMS’s 2009 Security Assessment Process

Author: Dinh, Angela K.

Source: Journal of AHIMA

Publication Date: September 2009


In 2008 the Centers for Medicare and Medicaid Services (CMS) conducted 10 HIPAA security assessments in covered entities (CEs) nationwide. CMS’s stated purpose was not to identify flaws but to gain a true understanding of industry compliance with the HIPAA security rule.

CMS co....

CMS Bans Use of Physician Signature Stamps

Author: Bryant, Gloryanne H.

Source: Journal of AHIMA

Publication Date: November 2008


Question: What is the new Centers for Medicare and Medicaid Services ruling on use of signature stamps?

Answer: The Centers for Medicare and Medicaid Services (CMS) has made it clear that it will only accept signatures that are handwritten, electronic, or facsimiles of original wri....

Clearing the HIPAA Cobwebs: New ONC Chief Privacy Officer Lucia Savage Focuses on Balancing Privacy and Security with Expanding Interoperable EHR Exchange

Author: Dimick, Chris

Source: Journal of AHIMA

Publication Date: April 2015



The spiders of time have been hard at work on the US healthcare privacy and security rules, to the point that their place in health IT interoperability has become fogged and is inhibiting their proper role in the meaningful exchange of health information, according to Lucia Savage, JD, th....

Catching Up with PEPP

Author: Bryant, Gloryanne H.; Fletcher, Robin

Source: Journal of AHIMA

Publication Date: September 2000


A year ago, the Journal of AHIMA reported on the newly created Payment Error Prevention Program (PEPP), which went into effect in August 1999. What has happened since then?
Best Billing Practices

PEPP was created to reduce Medicare prospective payment system (PPS) ....

Catching Up with HIPAA: Managing Noncompliance

Author: Weintraub, Abner E.

Source: Journal of AHIMA

Publication Date: May 2003


With the April 14 HIPAA privacy deadline behind us, many covered entities are still struggling to become compliant. Limited budgets and staff, conflicting advice, and unforeseen delays have all conspired to keep many covered entities from meeting the deadline.


What do you tell....

Busy Year for the RACs

Author: Easterling, Sharon

Source: Journal of AHIMA

Publication Date: March 2012



Learning from last year's denials and preparing for what's ahead will help providers avoid being stung in 2012.


When the Recovery Audit Contractor (RAC) permanent program began in 2009, providers were hopeful that the process for identifying underpayments and overpayments w....

Brailer to HIM: Continue 'Larger, Louder, and Faster'

Author:

Source: Journal of AHIMA

Publication Date: January 2007


“Do what you are doing larger, louder, and faster,” David Brailer, PhD, MD, told attendees during his general session presentation. Brailer, who served as national coordinator for health information technology in the Department of Health and Human Services from 2004 to 2006, thanked the audienc....

Best Practices for Medical Necessity Validation

Author: Scichilone, Rita A

Source: Journal of AHIMA

Publication Date: February 2002


To protect the Medicare Trust Fund from being drained, government health plans must provide coverage restrictions for unnecessary health services in vulnerable patient populations. One restriction mechanism is the provision of edits that look for valid reason-for-visit codes for selected servi....

Benchmarks as the Signposts Along the Fraud Case Trail

Author: Kaldal, Karen

Source: Journal of AHIMA

Publication Date: November 1998


Traditionally, payers in the healthcare industry have relied on external tips or complaints for starting points for fraud investigations. But recently the number of leads on fraud activity has increased as the public becomes more aware of the issue. To combat this problem, payers have begun to....

1 2 3 4 5 6 7 8 [9] 10