News & Analysis

June 1, 2013
Briefings on HIPAA

Demonstrating that ePHI encryption meets the safe harbor requirements may be more difficult than it seems when planning for that inevitable breach. Full disk encryption may not be enough. Many healthcare users believe encryption software installed on mobile devices and desktops will avoid the potentially damaging breach notification. The question is: Can you prove ePHI was encrypted at the time the device was lost, accessed, or stolen? Absio Corporation may have the answer.

June 1, 2013
Case Management Monthly

June 1, 2013
Briefings on APCs

Our experts answer questions about hydration, excludes notes in ICD-10-CM, L codes for neurostimulator devices, physician supervision for hyperbaric oxygen therapy, E/M service with wound care, and pass-though drugs.

June 1, 2013
Strategies for Healthcare Compliance

Many healthcare organizations face the challenge of protecting patient records and reducing the stress that results from a data breach.

Pages