The Department of Health and Human Services is continuing to develop its HIPAA audit program. After conducting trial audits and
...Continue readingObservation Services: A Guide for What and When to Document
Observation services are one of the most challenging areas that hospitals face. Physicians must document carefully in order to justify
...Continue readingIdentify Common Documentation Errors Affecting Physician Services Reimbursement
Most physicians understand the importance of documenting services effectively and yet still miss crucial elements while documenting services. To ensure
...Continue readingGrievances and Complaints: What Hospitals Should Know About the CMS and Joint Commission, DNV Standards and OCR
The CMS grievance requirements are a frequent source of investigation, and CMS perennially identifies them as problem areas for hospitals.
...Continue readingHow Hospitals Can Keep Up With CMS Compliance Requirements for Standing Orders
Standing orders and Medicare conditions of participation that relate to them are some of the most confusing compliance requirements that
...Continue readingHow to Prevent Hospital Readmissions Through Comprehensive Discharge Planning
The federal government is reducing payments to hospitals that readmit too many patients, but improving your facility’s discharge process can
...Continue readingThe Quality Payment Program Decoded!
The Department of Health and Human Services (HHS) released the final rule of the Medicare Access and CHIP Reauthorization Act
...Continue readingRansomware: A Breach to HIPAA Compliance
Ransomware is a form of malicious software (usually known as a malware) that targets critical data and systems to extort
...Continue readingText Messaging and HIPAA Compliance
The latest changes to the Health Insurance Portability and Accountability Act 1996 have raised the issue of texting in HIPAA
...Continue readingCyber Security and HIPAA Privacy Rule
Under the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy Rule, appropriate safeguards are required to protect the privacy
...Continue reading