Are you still struggling to comply with the new requirements of the HIPAA omnibus final rule? A new toolkit offers sample policies, forms, and checklists that can help.
Knowing when a breach occurred is one of the keys to reducing the risks associated with a breach of unsecure protected health information (PHI). Another is speedy mitigation.
Q. My email remains encrypted until it is opened. I have received two requests-via email and certified letter-from the patient's parent requesting records be sent by email or mail. I know legally a person may request this, but we must provide this service when we can ensure that the person requesting is who he or she says he or she is. Does a certified letter with recognizable signature or email from a known email address of a parent qualify as verification of the parent's identity?
Using a credentialed coder with computer-assisted coding (CAC) can increase coder productivity and lead to more accurate inpatient coding than using CAC alone, according to a study conducted by the AHIMA Foundation in collaboration with Cleveland Clinic and 3M Health Information Systems.
Coding for sepsis is often easier said than done. Obstacles range from difficulty distinguishing between documentation for sepsis and related conditions to trouble with physician queries.