logo
PSQIA, PSWP, and HIPAA Compliance

Compliance

PSQIA, PSWP, and HIPAA Compliance
This article addresses patient confidentiality and security related to patient safety evaluation systems, investigations, root cause analyses, and compliance to rules and regulations.  It is a basic introduction to help understand the importance of appropriately managing this type of privileged information.

The goal of achieving quality and patient safety is to improve patient safety outcomes by creating an environment where providers can report and examine patient safety events without fear of increased liability risk.  Greater reporting and analysis of patient safety events will help gain a better understanding of patient safety events and result in improvements from lessons learned.

Healthcare is like "alphabet soup" – filled with acronyms, abbreviations, and terms unique to our profession.  Let's define the three acronyms used in the title of this article and how these three rules interact from a compliance perspective.

PSQIA: The Patient Safety and Quality Improvement Act

PSQIA established a voluntary reporting system with the government's intent to enhance the data available to assess and resolve patient safety and healthcare quality issues.

On July 29, 2005, the president signed the Patient Safety and Quality Improvement Act of 2005 (Patient Safety Act, 42 U.S.C. sections 299b-21 to 299b-26) into law. The Patient Safety Act amended Title IX of the Public Health Service Act to provide for the improvement of patient safety and to reduce the incidence of events that adversely affect patient safety by authorizing the creation of patient safety organizations (PSOs).

The Agency for Healthcare Research and Quality (AHRQ) lists patient safety organizations which work with providers to improve quality and safety through the collection and analysis of aggregated, confidential data on patient safety events.

PSQIA authorizes our government's Health & Human Services (HHS) to impose civil money penalties (CMPs) for violations of patient safety confidentiality.  The Office for Civil Rights (OCR) has been delegated the responsibility for interpretation and implementation of the confidentiality protections and enforcement provisions.  When OCR is unable to achieve an informal resolution of an indicated violation through such voluntary compliance, the Secretary may impose a CMP of up to $11,000 for each knowing and reckless disclosure of PSWP that is in violation of the confidentiality provisions.

To encourage the reporting and analysis of medical errors, PSQIA provides federal privilege and confidentiality protections for patient safety information, called patient safety work product (PSWP).

PSWP: The Patient Safety Work Product

PSWP includes patient, provider, and reporter identifying information that is collected, created, or used for patient safety activities.

The PSWP is both privileged and confidential under the PSQIA.  PSWP is confidential and may only be disclosed in certain, very limited situations, where civil money penalties (CMPs) for impermissible disclosures of this information can be imposed.

What It Includes

PSWP is considered any data, reports, records, memoranda, analyses (such as root cause analyses), gap analysis, 8D approach, and written or oral statements that are: assembled for reporting to a Patient Safety Organization (PSO), reported to a PSO, or developed by a PSO for the conduct of patient safety activities that could result in improved patient safety, healthcare quality, or healthcare outcomes.  It also applies to data used in a patient safety evaluation system (PSES).

PSWP may also include patient information that is protected health information as defined by the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule (see 45 CFR 160.103).

What PSWP Is Not

PSWP differs from HIPAA as PSWP does not include a patient's medical record, billing and discharge information, or any other original patient or provider record. It does not include information that is collected, maintained, or developed separately, or exists separately, from a patient safety evaluation system.

HIPAA: The Health Insurance Portability and Accountability Act

According to the final PSQIA rule, the HIPAA Privacy Rule does not require covered providers to obtain patient authorizations to disclose patient safety work product containing protected health information to PSOs. This is because patient safety activities are considered healthcare operations, typically addressed in the Covered Entity's Notice of Privacy Practices (NOPP).  PSOs are business associates and should be operating under a Business Associate Agreement or BAA to be compliant under HIPAA rules.

As a Covered Entity (CE) or Business Associate (BA) under HIPAA, regulated entities are required to implement a security management process to prevent, detect, contain, and correct security violations.  This process includes conducting a risk analysis to assess potential risks and vulnerabilities to the confidentiality, integrity, and availability of ePHI and implementing security measures sufficient to reduce risks and vulnerabilities to a reasonable and appropriate level.

A regulated entity that has weak cybersecurity practices makes itself an attractive soft target.  Hackers can penetrate a regulated entity's network and gain access to ePHI by exploiting known vulnerabilities.  Malicious cyber-attacks targeting the healthcare sector continue to increase. 

Conclusion

PSQIA, PSWP, and HIPAA are government regulations working together to link healthcare quality and patient safety with privacy and security of privileged information.

All healthcare providers are expected to investigate any patient safety issues and stay HIPAA compliant while doing so. Sharing information to improve quality and safety in our healthcare environment is needed to mitigate risk and promote improved reimbursement. 


By AIHC 
American Institute of Healthcare Compliance




Cybersecurity: Big Guns Allocate Big Funds to Make a Difference!

Compliance

Cybersecurity: Big Guns Allocate Big Funds to Make a Difference!:Cyberthreats are a risk to your practice, but that's not even the worst of it. When we look at the spectrum of possibilities and consider our cost-benefit analysis for making cybersecurity a priority, most of us recognize that "if" your practice gets hacked, then your patient data could be breached. 
Your Patient Data Privacy Policy: Why It Matters (+ What to Include)

Compliance

Your Patient Data Privacy Policy: Why It Matters (+ What to Include):The healthcare industry experienced the second-highest increase in cost-per-breach in 2020 - only second to the energy industry. Whether due to an internal attack, a cybersecurity hacker, accidentally publishing information, or something else, patient data privacy and security are of the utmost importance to ensure.
HIPAA Considerations When Business Associates and Data Are International

Compliance

HIPAA Considerations When Business Associates and Data Are International:Although it is said that "business is global," there are some nuances to this blanket statement to consider when creating, receiving, maintaining, or transmitting electronic protected health information or electronic health information (PHI) internationally. Before delving into items to consider when business associates (including subcontractors) and PHI are international, it's important to appreciate that both the U.S. Department of Health and Human Services Office for Civil Rights (HHS-OCR) and the U.S. Department of Justice (DOJ) have the ability to enforce violations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA), as well as the related Privacy Rule, Security Rule, and Breach Notification Rule.
HHS 405(D) Provides Significant Free Resources and Guidance Designed to Help You Protect Your Business and Your Patients

Compliance

HHS 405(D) Provides Significant Free Resources and Guidance Designed to Help You Protect Your Business and Your Patients:The first barrier we see is that clinicians, and even office managers, think this is an IT issue and out of their wheelhouse. "Not my job. Somebody else is handling it, right?” I have good news and bad news. The bad news first. Your practice staff, and physicians, are all links in the cyber-risk chain. If you want to keep your practice profitable, it is your job. All of you!
Consensus Cloud Solutions Unveils Conductor Integration Platform

Compliance

Consensus Cloud Solutions Unveils Conductor Integration Platform:Consensus Cloud Solutions, Inc. (NASDAQ: CCSI), the world's largest provider of digital cloud fax solutions, recently announced the availability of Consensus Conductor, which provides seamless integration technology that supports the latest standards for connectivity while addressing a wide range of interoperability challenges from the simple to the extremely complex.
Administrative Simplification Transactions Basics

Compliance

Administrative Simplification Transactions Basics:The Centers for Medicare & Medicaid Services (CMS) has created a series of fact sheets to help explain how HIPAA (Health Insurance Portability and Accountability Act) electronic adopted transactions streamline health care billing through the use of standards and operating rules.
No Excuses: We Have FREE Cybersecurity Resources!

Compliance

No Excuses: We Have FREE Cybersecurity Resources!:Solo provider and small group physician practices are critical to our nation's health. For this reason, these practices also present a significant risk to the overall healthcare infrastructure.
4 Ways to Ensure Healthcare Data Security at Your Practice

Compliance

4 Ways to Ensure Healthcare Data Security at Your Practice:In recent years, healthcare practices across the country have accelerated their digital transformation efforts to modernize their operations, bake more efficiency into their workflows and processes, and deliver stronger patient experiences.
Two Hot Ransomware Items to Watch

Compliance

Two Hot Ransomware Items to Watch:The healthcare sector continues to be a target of cybercriminals. An area that continues to emerge is ransomware as a service (RaaS)-basically the adoption of a Software as a Service model, which is subscription-based and "enables affiliates to use already-developed ransomware tools to execute ransomware attacks." 
Ransom Disclosure Act - Proposed Bill Will Require Victims to Disclose Ransom Payments within 48 Hours

Compliance

Ransom Disclosure Act - Proposed Bill Will Require Victims to Disclose Ransom Payments within 48 Hours:Ransomware attacks increased by 62% worldwide and 158% in North America between 2019 and 2020. The FBI received approximately 2,500 ransomware complaints last year, up 20% from 2019, which identified losses of over $29 million.
HIPAA, COVID-19 Vaccination, and the Workplace

Compliance

HIPAA, COVID-19 Vaccination, and the Workplace:The Privacy Rule2 does not prohibit any person (e.g., an individual or an entity such as a business), including HIPAA covered entities and business associates, from asking whether an individual has received a particular vaccine, including COVID-19 vaccines.
5 Cybersecurity Threats to Healthcare During the COVID-19 Pandemic

Compliance

5 Cybersecurity Threats to Healthcare During the COVID-19 Pandemic:Digital processes and experiences persist in healthcare as the COVID-19 pandemic continues. For patients, this means paying more bills online and using virtual care options when medical attention is needed but not life-threatening. 
Medical Office Safety Planning: Become Aware and Commit to Prepare

Compliance

Medical Office Safety Planning: Become Aware and Commit to Prepare:Nearly two million American workers report having been victims of workplace violence each year, and the number has only grown since the start of the pandemic. While workplace violence can strike anywhere and at any time, the risk of assault can be prevented or minimized if employers take appropriate precautions.
How Data Governance and Technology Can Help Pandemic Responses

Compliance

How Data Governance and Technology Can Help Pandemic Responses:For those of us working in healthcare data and analytics, if the COVID-19 pandemic showed us one thing, it was that we need to be able to react more quickly to pressing needs.
Take Your Data Back: Empowering Healthcare Practices, Systems, and Providers

Compliance

Take Your Data Back: Empowering Healthcare Practices, Systems, and Providers:It's safe to say: today's data in healthcare is big. Physicians, practices, and systems generate massive amounts of data that capture not only detailed patient care, but also corresponding billed claims to insurance carriers, radiology images, electrocardiogram readings, clinical trial data, and so much more. 
Evaluating the Promise of Telehealth: Pandemic Physician Practice Lifesaver Gives Way to Billing, Regulatory Scrutiny

Compliance

Evaluating the Promise of Telehealth: Pandemic Physician Practice Lifesaver Gives Way to Billing, Regulatory Scrutiny:During the worst of the global pandemic, telehealth likely saved many physician practices from financial ruin. Telehealth also kept patients from risking their lives trying to access routine medical, occupational, and mental healthcare. 
Best Practices for Managing the Insider Threat in Healthcare

Compliance

Best Practices for Managing the Insider Threat in Healthcare:The effects of the COVID-19 pandemic have forced changes in many aspects of society. Two areas that have seen significant change involve how people work and obtain healthcare. Remote work and healthcare solutions were adopted wherever possible to slow the spread of the virus by limiting face-to-face contact.
5 Ways To Minimize HIPAA Liabilities

Compliance

5 Ways To Minimize HIPAA Liabilities:Last year was historic for HIPAA enforcement. The HHS Office of Civil Rights collected a record $23.5 million in settlements and judgments against providers guilty of HIPAA violations. To avoid becoming part of that unwanted statistic, it's important to pay extra close attention to five key areas of HIPAA vulnerability.
Information Blocking and Patient Access to Data

Compliance

Information Blocking and Patient Access to Data:April 5th 2021 was a major day in the history of patient data access. On that day, providers, vendors, and health information networks were required, under federal regulation, to make patient data available electronically to patients.
The Oft-Overlooked Federal Trade Commission's Health Breach Notification Rule Gets a Nudge

Compliance

The Oft-Overlooked Federal Trade Commission's Health Breach Notification Rule Gets a Nudge:For many, when an individual's Protected Health Information (PHI) is unlawfully accessed, the first law that comes to mind is the Health Insurance Portability and Accountability Act of 1996 (HIPAA). 
Relaxing of the PHI Protections Introduced for Public Comment

Compliance

Relaxing of the PHI Protections Introduced for Public Comment:In early January, the Department of Health and Human Services (HHS) submitted a 357-page proposal for publication to the Federal Register detailing proposed changes to the Privacy Rule under the HIPAA & HITECH Act standards. 
5 Ways To Minimize HIPAA Liabilities

Compliance

5 Ways To Minimize HIPAA Liabilities:Last year was historic for HIPAA enforcement. The HHS Office of Civil Rights collected a record $23.5 million in settlements and judgments against providers guilty of HIPAA violations.
Relaxing of the PHI Protections Introduced for Public Comment

Compliance

Relaxing of the PHI Protections Introduced for Public Comment:The Department of Health and Human Services (HHS) this week submitted a 357-page proposal for publication to the Federal Register detailing proposed changes to the Privacy Rule under the HIPAA and HITECH Act standards.
Part II - OSHA and HIPAA

Compliance

Part II - OSHA and HIPAA :There has never been a better time than the present to look closely at our practice operations to see where we need to focus our efforts for system process improvements.
5 Ways the Patient Portal Benefits Providers During a Pandemic

Compliance

5 Ways the Patient Portal Benefits Providers During a Pandemic:The use of digital and virtual medical services has skyrocketed during the coronavirus pandemic.
Secure Payment Processing to Protect Patient Privacy

Compliance

Secure Payment Processing to Protect Patient Privacy:Secure-Payment-Processing-to-Protect-Patient-PrivacyHIPAA's Privacy and Security Rules specify 18 data elements that an individual could use as a means to determine a patient's identity. 
5 Ways To Minimize HIPAA Liabilities

Compliance

5 Ways To Minimize HIPAA Liabilities:Last year was historic for HIPAA enforcement. The HHS Office of Civil Rights collected a record $23.5 million in settlements and judgments against providers guilty of HIPAA violations. To avoid becoming part of that unwanted statistic, it's important to pay extra close attention to five key areas of HIPAA vulnerability.
AHIMA's Perspective on Information Blocking Rule

Compliance

AHIMA's Perspective on Information Blocking Rule:Earlier this month, the Office of the National Coordinator (ONC) finalized the long-awaited information blocking rule in the 21st Century Cures Act.
Sharing of PHI with Large Tech Companies, Confidential Agreements, and HIPAA's Prohibition on the Marketing and Sale of PHI

Compliance

Sharing of PHI with Large Tech Companies, Confidential Agreements, and HIPAA's Prohibition on the Marketing and Sale of PHI:
As stated on Forbes, "The chief worry isn't about thieves getting their hands on lost or stolen devices, but the ease with which companies can gain access to the personal information."

FBI Warns of Teleconferencing and Online Classroom Hijacking During COVID-19 Pandemic

Compliance

FBI Warns of Teleconferencing and Online Classroom Hijacking During COVID-19 Pandemic:As large numbers of people turn to video-teleconferencing (VTC) platforms to stay connected in the wake of the COVID-19 crisis, reports of VTC hijacking (also called "Zoom-bombing") are emerging nationwide.
HIPAA and COVID-19 Exposure - A Critical Read!

Compliance

HIPAA and COVID-19 Exposure - A Critical Read!:
I have just been notified by one of my clients and I am furious! A patient who was thoroughly screened on the phone and by essential staff prior to their face-to-face with the physician and answered "No" to all of the questions but during the visit slipped up during a casual conversation and told the provider they were on day-2 of a mandatory quarantine due to working in a nursing home and being exposed to patients confirmed with COVID-19.
Third Party Risk Management and the FTC's

Compliance

Third Party Risk Management and the FTC's "New & Improved" Data Security Orders:
Cybersecurity and the related technical, administrative, and physical safeguards, which are required under a plethora of law ranging from the Health Insurance Portability and Accountability Act (HIPAA)  to the California Consumer Protection Act (CCPA)  to the Federal Trade Commission's Data Security Orders (FTC's Data Orders),  is receiving heightened attention from regulators.

6 Steps to Start Writing and Managing Your HIPAA Policies and Procedures

Compliance

6 Steps to Start Writing and Managing Your HIPAA Policies and Procedures:
Policies and procedures are the backbone of your HIPAA compliance program. They direct your entire team on how to carry out the standards of the HIPAA privacy, security, and breach notification rules.

2019 HIPAA Settlements and Take-Aways

Compliance

2019 HIPAA Settlements and Take-Aways:
The Health Insurance Portability and Accountability Act of 1996 ("HIPAA")  and the Health Information Technology for Economic and Clinical Health Act ("HITECH Act")  are two of the pillars that form the foundation of a patient's privacy rights in relation to his/her protected health information ("PHI"), as well as the obligations of covered entities, business associates, and subcontractors to ensure the confidentiality, integrity, and availability of the data.
This is also a good time to remind providers that a deceased individual's PHI is subject to HIPAA for 50 years. 
HIPAA and Health Apps and APIs   Oh My

Compliance

HIPAA and Health Apps and APIs Oh My :All this to say that technology is complex
Are Smart Speakers HIPAA Compliant

Compliance

Are Smart Speakers HIPAA Compliant:Smart speakers are now woven into the technological fabric
Making Verifications and Authorizations Seamless in 2018

Compliance

Making Verifications and Authorizations Seamless in 2018:Obtaining insurance verifications is the most critical step in the medical billing process
HIPAA Handling Patient Requests for Medical Record Restriction

Compliance

HIPAA Handling Patient Requests for Medical Record Restriction:Healthcare compliance professionals frequently face confusing situations
GDPR  One Privacy Law Not to Overlook

Compliance

GDPR One Privacy Law Not to Overlook:Nuances of GDPR
Offshoring Medical Records - Why You Should Care?

Compliance

Offshoring Medical Records - Why You Should Care?:Your Medical Information Could Be in India, Pakistan, and/or the Philippines!
Five Most Common IT Compliance Errors Found in Small Offices

Compliance

Five Most Common IT Compliance Errors Found in Small Offices:The following list discusses five of the most common IT compliance errors
The End of Windows 7 Approaches

Compliance

The End of Windows 7 Approaches:Many company owners and managers cried foul as they saw themselves as being forced to upgrade
Twelve Thousand This article is based on actual events. Names have been changed.

Compliance

Twelve Thousand This article is based on actual events. Names have been changed. :We are currently at the stage where the owner of the company thinks that by making grand proclamations or maybe even a few threats that Randy and I will suddenly see the light
Patient-Driven Health IT

Compliance

Patient-Driven Health IT:I regularly read Dr. John Halamka's Geekdoctor blog to keep up with the latest health IT (HIT) news. Dr. Halamka, Beth Israel Deaconess CIO
Facts about 5 HIPAA Compliance Myths

Compliance

Facts about 5 HIPAA Compliance Myths:All covered entities must abide by HIPAA Privacy and Security Rules.
Learning from Vanderbilt: Dealing with HIPAA Breaches

Compliance

Learning from Vanderbilt: Dealing with HIPAA Breaches:What did Vanderbilt announce?
The Internet of Things and Medical Records Archiving

Compliance

The Internet of Things and Medical Records Archiving:When the question is asked "Should we archive our medical data records?"
Creating a BYOD Policy for Your Practice

Compliance

Creating a BYOD Policy for Your Practice:After realizing they were fighting a losing battle, the majority of employers gave up years ago on trying to ban personal devices from the workplace.
Ransomware

Compliance

Ransomware:Ransomware is a type of malicious software, known as malware
A Costly Lesson in Untimely Reporting of a HIPAA Breach

Compliance

A Costly Lesson in Untimely Reporting of a HIPAA Breach:Presence St. Joseph Medical Center, a hospital of Presence Health Network
Dashboard Reporting: One Size Does Not Fit All

Compliance

Dashboard Reporting: One Size Does Not Fit All:Dashboard reports are intended to provide pertinent information to leaders throughout the healthcare organization.
HIPAA, Legal Holds, and PHI: Rachel Rose, J.D., M.B.A. With Sean McKenna, J.D., B.A.

Compliance

HIPAA, Legal Holds, and PHI: Rachel Rose, J.D., M.B.A. With Sean McKenna, J.D., B.A.:I spent almost 16 years with the federal government handling healthcare fraud matters
9 Surefire Steps to Lockdown Your Cyber Security

Compliance

9 Surefire Steps to Lockdown Your Cyber Security :The next few sentences are a little trickier; there is really no good way for someone to hear that their data has been stolen.
Are Your HIPAA Practices in Compliance?

Compliance

Are Your HIPAA Practices in Compliance?:If you've been involved in healthcare for more than a month, you've heard the term ‘HIPAA compliance'
CMS Emergency Preparedness Rule Released - Do You Have a Plan?

Compliance

CMS Emergency Preparedness Rule Released - Do You Have a Plan?:a breach or a ransomware attack, which potentially impacts the confidentiality, integrity, or availability of the protected health information
HIPAA Settlements Cost Hospitals Big Time

Compliance

HIPAA Settlements Cost Hospitals Big Time :HIPAA SettlementsCybersecurity has become a major topic of discussion in healthcare over the last few years, particularly
How to Handle a HIPAA Data Breach

Compliance

How to Handle a HIPAA Data Breach :Repeated incidents of hacking and theft of personal health information (PHI) rocked
Working From Home - Make a Security Checklist

Compliance

Working From Home - Make a Security Checklist:Regardless of the industry, the number of individuals who telecommute, at least once a week, is increasing.
How Healthcare Providers Can Benefit From Integrating Systems

Compliance

How Healthcare Providers Can Benefit From Integrating Systems :Recent legislation has motivated many healthcare organizations to rethink their approach to medicine.
Healthcare Fighting Back Against Ransomware

Compliance

Healthcare Fighting Back Against Ransomware:The concept of thievery isn't all that complicated. In fact, it's an old and obnoxious tradition that companies and individuals have been battling for centuries.
Maintaining Information Privacy in a Big Data Environment

Compliance

Maintaining Information Privacy in a Big Data Environment:It's becoming increasingly important for healthcare organizations to share, analyze, interpret and respond to patient health information.
HIPAA Security Breaches: Taking a Proactive Approach

Compliance

HIPAA Security Breaches: Taking a Proactive Approach:Gone are the days when paper charts could be kept in a file cabinet under lock and key. Today, health care facilities are becoming more frequent targets of massive data breaches.
The Future of Archiving Data

Compliance

The Future of Archiving Data:In a previous article (Ten Reasons to Archive Patient Medical Records
HIPAA From the Eyes of a Physician and Business Associate: Bottom Line... It Pays to Be HIPAA Compliant!

Compliance

HIPAA From the Eyes of a Physician and Business Associate: Bottom Line... It Pays to Be HIPAA Compliant!:Surgeons are taught from the beginning of our training to listen carefully to our patients, diagnose the problem at hand, create a comprehensive plan to address the concern and when necessary, perform a surgical procedure to physically alter and thereby improve the patient's health and wellbeing.
Ten Reasons To Archive Data from Patient Medical Records

Compliance

Ten Reasons To Archive Data from Patient Medical Records:Electronic record keeping made significant improvements over paper records for storage and access to health records. Ease of access and low storage costs are among the most obvious and paved the way for those records to be maintained in a DATA ARCHIVE.
Protecting the Patient's Right to Privacy When Responding to Subpoenas for Medical Records

Compliance

Protecting the Patient's Right to Privacy When Responding to Subpoenas for Medical Records:Once a provider obtains the necessary written assurances, it must release the medical records on the date specified in the subpoena.
Learning from the HIPAA Violations of Others

Compliance

Learning from the HIPAA Violations of Others:The past can be useful in guiding our future actions, and it's generally considered wise to learn from our past mistakes.
Revenue Cycle 101: HIPAA: Notice of Privacy Practices (NPP)

Compliance

Revenue Cycle 101: HIPAA: Notice of Privacy Practices (NPP):I know; HIPAA is old news. And all of your offices are presenting your patients with a HIPAA NPP already.
Let's Stop Calling It HIPAA

Compliance

Let's Stop Calling It HIPAA:Oftentimes in medicine, or even life in general, we might be required to revisit the origin of a popular belief, phrase, or
Privacy Compliance In Your Practice

Compliance

Privacy Compliance In Your Practice:HIPAA has been in our offices and Privacy policies and procedures in place for over 10 years now, but have you also instituted a formal, ongoing practice training program?
Solving the Healthcare EFT Standard Enrollment Challenge for Providers

Compliance

Solving the Healthcare EFT Standard Enrollment Challenge for Providers:The HIPAA healthcare electronic funds transfer (EFT) standard for claims reimbursement is EFT via ACH (NACHA CCD+Addenda), which works similarly to Direct Deposit. Money is sent electronically from a health plan directly to the provider's bank account and is required to carry the TRN Reassociation Trace Number that allows for automated reconciliation of the EFT via ACH payment with the Electronic Remittance Advice (ERA). 
The Rising Tide of Medical Identity Theft

Compliance

The Rising Tide of Medical Identity Theft:In March 2014, Nightly Business Report (NBR) released a feature story titled, Medical ID Theft.
Are Practices Ready for Cyber Attacks?

Compliance

Are Practices Ready for Cyber Attacks?:No. Practices are not ready for cyber attacks. In fact, healthcare entities account for the highest percent of all US data breaches.
How to Comply With HIPAA-and Not Lose Your Job

Compliance

How to Comply With HIPAA-and Not Lose Your Job:I know HIPAA is required, and I know it's important, I just don't know what exactly HIPAA requires me to do.
Lessons Learned About HIPAA Risk Management Plans

Compliance

Lessons Learned About HIPAA Risk Management Plans:Many healthcare entities haven't yet separated the difference between the HIPAA Security Rule and HIPAA Privacy Rule. Because of this confusion, they leave many security regulations unfulfilled. Most practices I've communicated with are trained, strict adherers to the Privacy Rule, but don't understand that the Security Rule is a completely different ballgame.
Storing Your Patient Clinical Data In a Stand-alone, Retrievable Archive Makes Good Business Sense

Compliance

Storing Your Patient Clinical Data In a Stand-alone, Retrievable Archive Makes Good Business Sense:The call for access to patient PHI is increasing. The demand for its accuracy and timely availability keeps growing. The cost to meet the demand is going up as are the number of errors made in complying with those requests.
Credit Card Info on File? Bad idea.

Compliance

Credit Card Info on File? Bad idea.:Your office probably has patient credit and debit cards on file for easy payments, refunds, and chargebacks. You likely keep those cards in easy-to-access spreadsheets, word processing programs, online accounts, printed binders, or e-wallets for future reference.
The HIPAA Practice Everyone Neglects: Physical Security

Compliance

The HIPAA Practice Everyone Neglects: Physical Security:According to 2012's Department of Health and Human Service (HHS) Office of Civil Rights (OCR) pilot audits, a glaring majority of the healthcare industry is not prepared for an inspection of their Health Insurance Portability and Accountability Act (HIPAA) requirement compliance, especially small physicians.
Better to Be Safe than Sorry with ePHI Compromise

Compliance

Better to Be Safe than Sorry with ePHI Compromise:Let's be straightforward. Doctors, administrators, and office managers are trained to be experts at health care, not Healthcare Insurance Portability and Accountability Act (HIPAA) privacy and security compliance. Even after patient information privacy and security precautions are taken and HIPAA best practices are followed, what happens if certain variables are overlooked and create a vulnerability? What would happen, financially, if your records systems were breached today?
Is Your Practice Prepared for the New Omnibus Rule?

Compliance

Is Your Practice Prepared for the New Omnibus Rule?:Enforcement of the HIPAA Final Omnibus Rule began September 23, 2013 greatly improving patients' privacy rights, changing requirements, and increasing penalties for all covered entities, including physician practices.
Mobile Devices Best Apps in HealthCare

Compliance

Mobile Devices Best Apps in HealthCare:We've all heard the catchphrase, "There's an app for that!" And there is...even in healthcare! In this article I have compiled a hot list of the 10 best healthcare apps.
HOW TO SURVIVE HIPAA's NEW OMNIBUS RULE

Compliance

HOW TO SURVIVE HIPAA's NEW OMNIBUS RULE:First, know the facts. Read the information below, which covers the basics of the new rule. Second, learn how the new rule will affect your medical practice by attending one of our upcoming FREE webinars. Click here or scroll down to register.
The HIPAA Security Rule: Yes, It's Your Problem

Compliance

The HIPAA Security Rule: Yes, It's Your Problem:In the frenzy of recent HIPAA Omnibus and security news, I thought it would be appropriate to address a looming problem I see occurring in the healthcare industry. Too often do small covered entities (healthcare providers, clearinghouses, and health plans) brush HIPAA security compliance off with the thought, "My affiliates take care of HIPAA," or "I don't have the time or budget for this," or "I'm already doing HIPAA."
Leveraging Technology to Enhance Revenue Cycle Performance

Compliance

Leveraging Technology to Enhance Revenue Cycle Performance:As profit margins tighten, physician practices must focus on ways to reduce costs and grow revenue. Technology can support this effort by refining business processes and streamlining workflow. For example, an automated claims clearinghouse can assist a practice in getting patient claims out the door faster and more accurately. Such a system also provides information to help a practice better understand which claims are being denied and what the practice might do to reduce those denials long term.
How Sandy/Isaac Will Impact Health Information

Compliance

How Sandy/Isaac Will Impact Health Information:Hurricane Isaac was just one example of chaos and devastation caused by a natural disaster. In 2011 alone, the Federal Emergency Management Agency reported 99 major disaster declarations, and the National Oceanic and Atmospheric Administration reported 1,096 fatalities from weather events. Disasters arrive in various forms and often occur without warning. But while we can't predict when they will arrive, we can prepare. Healthcare consumers must actively plan to protect themselves, family members, and loved ones. HIM professionals must plan for anticipated threats and unexpected loss of protected health information (PHI) in their communities.
Security at Your Fingertips - Part 5 of 5

Compliance

Security at Your Fingertips - Part 5 of 5:Today's feature isn't going to focus on tools, but rather where you can get security information. Keeping up-to-date is a must in today's world and it's very easy to get lost in the sea of knowledge. Where do you go to find out about the latest threats? How do you mitigate the latest threats? Those are some of the questions we will answer here.
Data-Driven Websites: Feature on a Newcomer

Compliance

Data-Driven Websites: Feature on a Newcomer:Healthcare data transparency is becoming a thriving medium of information exchange between patients and caregivers. It is likely an industry that will grow even larger as time goes on, due in part to the current administration but also attributed to the great number of educated and computer-savvy, baby-boomers.
Security at Your Fingertips Part 4 of 5

Compliance

Security at Your Fingertips Part 4 of 5:Today, we're going to talk about how you can retrieve a history of events, particularly security events, which have happened to your computer. Introducing today's article:
They Say They Are HIPAA Compliant, But...

Compliance

They Say They Are HIPAA Compliant, But...:We are going to take a quick break from our five part series, Security At Your Fingertips, so I can get something off my chest. I've been dealing with this problem for a long time now and, quite frankly, I'm getting tired of it. This problem is in most of the Billing and EMR softwares I've seen on the market (along with a lot of other software out there) and it doesn't seem to be getting that much better after all this time. Before I continue, we need a disclaimer:
Security at Your Fingertips Part 2 of 5

Compliance

Security at Your Fingertips Part 2 of 5:Our focus was on preventing the installation of those nefarious thumb drives that everyone seems to have these days. However, the technique works for other hardware as well. Keep in mind that you must have Windows Vista to use that feature - it is not available on Windows XP or below. Also, keep in mind that when I speak of Windows XP, I specifically mean Windows XP Professional. With Vista, I specifically mean Windows Vista Business or Windows Vista Ultimate. I cannot guarantee that any of these features are available in the home editions of Windows as I do not support those editions.
Identify Theft

Compliance

Identify Theft:Last month, I gave a seminar on Patient Registration. In the seminar, I pointed out the importance of making sure that practice staff verified the information they were given and made sure that all information was entered carefully and without error into practice management systems. There is a term if this is not done correctly called GIGO. Garbage In, Garbage Out!
Security at Your Fingertips - Part 1 of 5

Compliance

Security at Your Fingertips - Part 1 of 5:That's right, everyone. Here we are in yet another multipart series - as if the 10 Laws of computer security weren't enough. One of the biggest issues many people face when implementing security is cost. For some odd reason, so many people think that in order to have a secure environment they have to go out and purchase expensive third-party tools to do all kinds of whacky things. This isn't to say there aren't some nice third-party security tools out there, some of them really are nice, but before we break out the company credit card I think we need to take a look at what's already on our computer to see if it will do the job we need. Many of you will be very surprised at what Windows can do all on its own. Let's get started with today's article:
Immutable Security Law 10

Compliance

Immutable Security Law 10:At long last, here we are. Welcome, everyone, to number ten in our ten part series "The 10 Immutable Laws of Computer Security." It's been a very long ride, however, based on the feedback I have received it appears many of us have gotten something from all of the articles I've written about computer security and that was the whole idea from the start. Is some of this stuff a pain in the butt? Yes, it is. Is this stuff impossible to do or too expensive? No, it's not as long as you do some planning and use some good ol' fashioned common sense (and maybe kick your IT person around a little bit).
Computer Security: The 9th Law

Compliance

Computer Security: The 9th Law:Welcome to article number 9 in our 10 part security series. It's been a long ride, but I hope you've had some fun in our journey in trying to understand and get more comfortable with all this security stuff. I'm hoping by now many of us are realizing it isn't so bad after all.
Computer Security - The 8th Law

Compliance

Computer Security - The 8th Law:Welcome to article number 8 in our 10 part security series. It seems like yesterday we were at article number 2, doesn't it?

Search BCA Magazine

Search here

List Articles

Select below

RELATED CEU's / Webinars

Search BCA Magazine

Search here

List Articles

Select below