Providers often struggle with modifiers‑even those they've had available to report for many years‑due to the unique scenarios they face at their facilities, staffing changes, and/or unclear or lacking authoritative guidance.
With major security breaches making headlines, HIPAA Phase 2 audits set to begin, and the OIG pressuring OCR to crack down on HIPAA violations, there's never been a better time to get serious about compliance.
When President Barack Obama issued Executive Order 13636 February 12, 2013, Dena Boggan, CPC, CMC, CHPC, took notice. Boggan is the HIPAA privacy and security officer for St. Dominic Hospital, a 535-bed, 27-clinic facility headquartered in Jackson, Mississippi.
Engaging the board
An August 2014 American Hospital Association (AHA) article, "Cybersecurity and Hospitals: What Hospital Trustees Need to Know About Managing Cybersecurity Risk and Response" (www.aha.org/content/14/14cybersecuritytrustees.pdf), reported that hospitals and healthcare are part of the United States' "critical infrastructure," meaning "their systems and assets are considered so vital to the country that their impairment as a result of a cyber attack would pose a threat to the nation's public health and safety."
That's why Boggan and St. Dominic found it critical to ensure they have a robust cybersecurity program. A major part of that program was to get the hospital's board of directors and board of trustees in the know about cybersecurity. Boggan notes that at some of the organizations that suffered major breaches of PHI, investigators found that board members were generally unaware that cybersecurity programs even existed.
"They had that deer caught in the headlights look when asked about their program," she recalls of her research.
The AHA recommended, Boggan says, that organizations get their board of directors in the know. She started by developing a cybersecurity overview for her board. She reports up to St. Dominic's compliance committee, which includes some board members.
"We gave them a good definition of what cybersecurity is and identified that board of directors and trustees need to be responsible for understanding, at a high level, their organization's cybersecurity risks and vulnerabilities," Boggan says. "They need to understand the security response plan that is in place, who in management is responsible for delivering that plan, and when it's appropriate for board insight over that plan."
CMS finalized its proposals regarding the 2-midnight rule, including moving responsibility for rule enforcement and education from Recovery Auditors to Quality Improvement Organizations (QIO). This latter change occurred October 1, 2015.
The 2016 OPPS final rule includes the first negative payment update for the system, but CMS also listened to commenters' suggestions to make a variety of proposals less onerous either operationally or financially.