Since the Affordable Care Act (ACA) –popularly called Obamacare –came into existence, there has been an exponential increase in the number of physician practice acquisitions. Some of the reasons that can be ascribed for this phenomenon are these:
Physician practice acquisitions are an ... Views: 764
The Office of Inspector General (OIG) has oversight of protection of the integrity of Health and Human Services (HHS) programs and operations. The aim of this function is to ensure the wellbeing of American people who benefit from these programs. The OIG seeks to prevent fraud, abuse and waste, ... Views: 763
Carrying out audits is among the most important requirements for any organization that handles Protected Health Information (PHI). HIPAA hosting providers, who implement safeguards in the manner specified in the HIPAA Privacy Rule, must be included in these audits. The indispensability of audits ... Views: 747
The fact of about 120 million individuals being affected by HIPAA breaches in 2015 highlights two important points:
1. There is a mad demand for these records in the black market, which is why they are being targeted to this extent. Any wonder that PHI is in greater demand in the black market ... Views: 746
Those who plan to start a care transitions or care coordination program need to be aware of the challenges that go into doing this successfully. In developing a Care Transitions Program; they should know how to utilize the performance improvement processes and analytics, and also know how to put ... Views: 745
When people with autism spectrum disorder (ASD) –called just autism –enter college, they are up against challenges that are unique and peculiar to the group. They need to be understood for their special needs, because they enter college at a sensitive age. There is an onus on the part of the ... Views: 743
One errant email or text message can cost you tens of thousands of dollars in HIPAA fines and penalties and it doesn't matter who you're communicating with: patients, staff, providers or with insurance carriers.
A violation is a violation. And if you think it couldn't happen to you, think ... Views: 731
Malicious software that infects susceptible computers’ operating systems; ransomware works by blocking access to files. It is only after the ransom demanded by the attackers is paid that the legitimate user can regain access to files on a computer system. Ransomware also works by blocking user ... Views: 728
Information Technology (IT), which has traversed and influenced almost every area known to the human mind, has made a solid impact on healthcare. The healthcare industry in the US is the world’s largest, with some estimates putting its size at $ three trillion. Information Technology is an ... Views: 701
HIPAA compliance is not an optional, but mandatory requirement for healthcare IT systems. HIPAA requires compliance with its requirements from healthcare organizations that handle Protected Health Information (PHI)-called Covered Entities-and their Business Associates. The US healthcare system ... Views: 678
A Physician Extender is one who is not a physician, but is of a lesser qualification, who helps physicians by carrying out many activities usually carried out by physicians. As the name suggests, Physician Extenders work to supplement the functions of a physician and could take a considerable ... Views: 675
The Internet is jam-packed with dangerous, highly visible HIPAA violations by Covered Entities on websites, social media pages and patient review sites.
The violations are dangerous and unnecessary. HIPAA spells out simple safeguards to protect Covered Entities that are easy to apply. But ... Views: 619
Noting perhaps is as important for a Covered Entity and its Business Associate as HIPAA compliance. Compliance or lack of it with HIPAA will decide their very existence as a business. Does it need repetition that HIPAA compliance is absolutely critical for a Covered Entity and a Business ... Views: 562