Coding for sepsis is often easier said than done. Obstacles range from difficulty distinguishing between documentation for sepsis and related conditions to trouble with physician queries.
Using a credentialed coder with computer-assisted coding (CAC) can increase coder productivity and lead to more accurate inpatient coding than using CAC alone, according to a study conducted by the AHIMA Foundation in collaboration with Cleveland Clinic and 3M Health Information Systems.
Q . Is it permissible to take pictures of patients (including behavioral health) for identification purposes as a part of the registration process? Do the patients need to sign a consent form before their picture can be taken?
By now you've probably gotten a good look at the 2014 IPPS Final Rule changes to the inpatient admission guidelines, which CMS released in August. It's time to put these changes into practice.
Q. My email remains encrypted until it is opened. I have received two requests-via email and certified letter-from the patient's parent requesting records be sent by email or mail. I know legally a person may request this, but we must provide this service when we can ensure that the person requesting is who he or she says he or she is. Does a certified letter with recognizable signature or email from a known email address of a parent qualify as verification of the parent's identity?
Knowing when a breach occurred is one of the keys to reducing the risks associated with a breach of unsecure protected health information (PHI). Another is speedy mitigation.