News & Analysis

January 1, 2015
Briefings on HIPAA

At this point, there are no federally recognized HIPAA certification standards for covered entities (CE) and business associates (BA). However, that doesn't mean there are no good assessment tools out there to gauge information security and regulatory compliance. The Health Information Trust Alliance (HITRUST) published its first common security framework (CSF) in March 2009 with the goal of focusing on information security as a core pillar of the broad adoption of health information systems and exchanges.

January 1, 2015
Case Management Monthly

Case managers rejoice. CMS recently sounded what is being called the death knell of the 2-midnight rule certification in a final rule published in the November 10, 2014, Federal Register.

 

January 1, 2015
Case Management Monthly

Do observation patients belong in their own unit? The answer is debated at many organizations. Some say establishing a separate unit brings numerous advantages, from improved ED throughput to shorter lengths of stay. Others say some facilities may not need one.

January 1, 2015
Strategies for Healthcare Compliance

Q: If someone calls a facility to schedule an appointment for a patient, is it a violation of HIPAA to admit the patient receives care at the practice? For example, the practice where I work often helps victims of domestic abuse. We received a call from a patient's estranged spouse who asked to schedule an appointment for the patient when, in reality, he was trying to determine the whereabouts of his spouse so he could harm her. I realize this is a safety issue but wonder whether it is also a HIPAA issue.

January 1, 2015
Strategies for Healthcare Compliance

The new ICD-10 implementation date is less than a year away, and CMS is gearing up its end-to-end testing process in preparation.

January 1, 2015
Strategies for Healthcare Compliance

Mobile devices have changed the way people share and access information in their personal and professional lives. Smartphones and tablets may make it easier and faster for people to communicate, store, and access information, but they present risks if lost, stolen, or hacked. This can be especially challenging in the healthcare industry as it has become common for providers to use various mobile tools, including smartphones, laptops, notebooks, tablets, phablets, personal digital assistants, USB devices, digital cameras, and radiofrequency identification devices, to communicate with colleagues and access applications.

Pages