News & Analysis

September 28, 2016
Medicare Insider

This week’s Medicare updates include a story about the OIG levying its largest penalty under a corporate integrity agreement against nation's biggest provider of post-acute care; a fact sheet and press release about moving Medicare Advantage and Part D forward; and more!

September 23, 2016
News & Insights

What is the current status of the Beneficiary and Family Centered Care Quality Improvement Organizations (BFCC-QIO) short-stay reviews?

August 1, 2016
Case Management Monthly

There's good news and bad news on the 2-midnight rule front. The good news: CMS has put short-stay inpatient audits related to the 2-midnight rule on hold as of May 4. The bad news: This isn't a free pass, and it isn't going to last.

July 26, 2016
Medicare Insider

This week’s updates include the quarterly update to the CCI edits; denial codes for missing or insufficient documentation; and more!

July 13, 2016
Medicare Insider

This week’s note is about laws impacting Medicare fraud and overpayments.

July 1, 2016
Briefings on HIPAA

HIPAA audits

Phase 2 audit protocol

As Phase 2 of the HIPAA audit program begins, covered entities (CE) and business associates (BA) will be watching their email for an audit letter from OCR. Of those chosen for audit, most will be selected for a desk audit. They'll have 10 days after receipt of the email to gather requested documents for OCR's auditors.

But how will CEs and BAs know they are collecting the right information? A careful reading of the updated Phase 2 audit protocol (www.hhs.gov/hipaa/for-professionals/compliance-enforcement/audit/protocol/index.html) will help guide CEs and BAs. But if the protocol isn't read carefully, and in full, important documents could easily be left out, leading to inaccurate audit reports and even a visit from OCR's investigators.

The Phase 2 audit protocol expands the Phase 1 compliance areas to reflect changes made by the 2013 HIPAA omnibus final rule. The updated audit protocol also includes information for BAs, which were not audited during Phase 1 but will be in the current round of audits. The protocol contains a description of the audit areas, general instructions and definitions, and a keyword-searchable table.

Phase 2 audits will be conducted in three rounds. The first two rounds will consist of desk audits of specific audit targets, while the third round will be comprehensive audits. Round one audits will target CEs and round two audits will target BAs.

Round one CE audit targets will target:

  • Security: risk analysis and risk management
  • Breach: content and timeliness of notifications
  • Privacy: notice and access

 

The round two BA audits will target:

  • Security: risk analysis and risk management
  • Breach: breach reporting to covered entities

 

Pages