Medical identity theft is on the rise and healthcare organizations need to ensure they are authenticating a patient's identity before providing medical services and products.
Are you still struggling to comply with the new requirements of the HIPAA omnibus final rule? A new toolkit offers sample policies, forms, and checklists that can help.
Knowing when a breach occurred is one of the keys to reducing the risks associated with a breach of unsecure protected health information (PHI). Another is speedy mitigation.
Using a credentialed coder with computer-assisted coding (CAC) can increase coder productivity and lead to more accurate inpatient coding than using CAC alone, according to a study conducted by the AHIMA Foundation in collaboration with Cleveland Clinic and 3M Health Information Systems.