News & Analysis

March 1, 2015
Briefings on HIPAA

Secure text messaging presents challenges when it comes to ease of use and communicating with anyone who hasn't installed a like secure texting app. Until recently, secure texting was possible, but only if the sender and recipient both used the same mobile app. TigerText unveiled Fast Deploy® in 2014, and it's a game changer.

March 1, 2015
Briefings on HIPAA

Q: How should an organization handle patient requests to withhold PHI from the patient's insurance company?

March 1, 2015
Briefings on HIPAA

A business case for resourcing a compliance assurance program for privacy and security should be possible solely on the basis of the need to respond to complaints made directly to a covered entity (CE) (or business associate (BA) acting as an agent of a CE). However, despite stepped-up enforcement and periodic audits required by HITECH, industry experts still anticipate that a more proactive process for compliance may not be taken until an untoward event occurs. Consequently, other avenues for substantiating the importance of privacy and security measures are necessary and readily available. Information privacy and security officials may find it necessary to go beyond information about HIPAA Privacy and Security Rule enforcement in making the business case. Monitoring the general security industry and relating those risks to healthcare privacy and security are important when doing so. Consider the following:

March 1, 2015
Briefings on APCs

The January quarterly I/OCE update includes new modifiers, changes related to expanded packaging, and continued refinement of CMS' skin substitutes categories, but the biggest change for outpatient hospitals is the implementation of comprehensive APCs (C-APC).

March 1, 2015
Strategies for Healthcare Compliance

While organizations should focus on performing regular risk assessments and analyses, there are also other ways in which they must review their systems for compliance. Often, these other evaluations are overlooked despite their value, says Kevin Beaver, CISSP, an information security consultant in Atlanta. In particular, organizations should be careful not to forget about performing vulnerability assessments and penetration tests, which are components of an overall risk assessment or analysis, says Beaver, who is an editorial advisory board member for SHCC's sister publication Briefings on HIPAA.

March 1, 2015
Strategies for Healthcare Compliance

Q: My facility no longer registers patients under aliases, but will allow them to opt out of the patient directory. However, opting out of the registry will not exclude our patients from the operating room (OR) list. At one time, the facility's CEO received the daily OR list with full patient names so he could visit board members, donors, or others whom he knows at our facility. HIM changed this practice so that patients' names would not be on the OR schedule provided to the CEO. The CEO took this matter to the hospital attorney, who said the names could be included because the use of PHI by the CEO to determine whether and when a patient visit is appropriate is permitted by HIPAA as it is part of healthcare operations. Is it a violation of HIPAA for the CEO to use PHI to track patients in this manner?

Pages