Billing Compliance Assurance Architecture for Healthcare Industry (BCAHI)

Size: px
Start display at page:

Download "Billing Compliance Assurance Architecture for Healthcare Industry (BCAHI)"

Transcription

1 Billing Compliance Assurance Architecture for Healthcare Industry (BCAHI) Syeda Uzma Gardazi 1,*, Arshad Ali Shahid 2 1 Student of FAST NUCES, Islamabad. 2 Prof & Head, Dept of CS, FAST NUCES, Islamabad. [email protected], [email protected] Abstract: Software companies must ensure that their products comply with standards and government laws. This paper aims at developing software-intensive systems architecture for the Healthcare Industry to meet Health Insurance Portability and Accountability Act (HIPAA), HITECH and Office of Inspector General (OIG) third party medical billing guidelines by proposing an architecture Billing Compliance Assurance Architecture for Healthcare Industry (BCAHI) using software engineering techniques. BCAHI can help the healthcare industry to ensure compliance with OIG 3rd party medical billing guidelines by including compliance components and explain their relationship using connectors at software architecture level. BCAHI will help companies to track compliance in the healthcare industry by leveraging BCAHI architecture. The architecture was evaluated through a case study from the healthcare industry. Keywords: Medical Billing, Compliance Assurance Architecture, Office of the Inspector General (OIG), Quality Attributes (QA) and Compliance Attributes (CA). Received: Sept 2010, Published: April 2011 *Corresponding Author: Syeda Uzma Gardazi, [email protected] 1. Introduction It is essential that Medical Billing and audit work together in an organization to be sure that they have controls in place to mitigate internal and external risks associated with medical billing. Billing professionals can readily understand that the Billing compliance audit is the process of collecting and evaluating evidence to determine whether a billing process is compliant with OIG billing guidelines. Senior management and business managers should have concerns about medical billing compliance with applicable OIG and insurance guideline. Currently medical billing companies working in third world countries as backup office(s) e.g. Pakistan are facing problems to track compliance with international regulations and standards. This paper aims at proposing & validating BCAHI architecture and its various aspects that will ensure compliance with 16

2 Syeda et al: Billing Compliance Assurance Architecture for Healthcare Industry OIG guideline. HIPAA is a US law that ensures and support confidentiality, integrity and availability (CIA) of protected health information (PHI). HITECH law further explains the role of business associates to transform unsecure PHI to secure PHI and notification actions required in case of breach. OIG third party medical billing guidelines address all the relevant areas for billing compliance including, without limitation: education and training requirements; identification of risk areas for fraud, abuse and waste; integrity of the Company s data information system; resolution of ambiguities contained in the claim information provided to the Company by its clients; elimination of duplicate billing errors; appropriate response to overpayment; required documentation for specified billing; unbundling; maintenance of confidentiality of PHI; use of proper modifiers; encouragement of compliant activities; requirements of federal and state law; quality assurance of claim information; hiring and evaluation of employees; and record retention.the context of the validation will be limited to a case study at a medical billing and transcription company. This work will explain CA description and usage in software architecture to track compliance. This improvement can be attributed to the increased ability of the software industry to better understand international regulations and standard requirements for the security and privacy of health information. The first step will be to address the issues related to how the BCAHI will treat CA. The major research area is software architecture and sub-area is architecture for medical billing compliance. Process Model: The first study will be carried out on existing models. A process model will be proposed exclusively for BCAHI. Then the flow of the remaining research will be as follows: Notations: Notations play an important role in visual representation and designing of any software product. Valid notations will be designed for BCAHI and they will be a part of software engineering. Language: On the basis of notations proper modeling language will be defined having a formal semantics. BCAHI Architecture: Lastly a proper BCAHI architecture will be devised which will help to ensure medical billing compliance in accordance with OIG 3rd party medical guidelines, HIPAA security and privacy law and HITECH applicable to the medical industry. 2. Related work Health Insurance Portability and Accountability Act (HIPAA) ensures confidentiality, integrity and availability of protected health information (PHI). The covered entities under HIPAA should adopt recommended mechanisms to protect PHI being transmitted over the network [1]. A framework was proposed to ensure the system compliance with the HITECH regulation. HITECH regulatory requirements were reviewed and prioritized. Based upon these requirements CA are identified. Reference model is being formulated based upon these CA. Next the architecture style is being selected. Based on reference model and selected architecture styles the reference architecture for Handler and Spam Filter (EHSF) has been formulated. Then EHSF architecture is devised. At last best encryption algorithm was suggested for system in accordance with HITECH regulation [2]. Software architecture can be defined differently. Software 17

3 architecture is a structure represented using components and connectors to represent the relationship between components [3]. The authors identify software architecture usage and description in Pakistani Software Industry [4]. Compliance is being ensured with applicable regulatory requirements while the software is being engineered. Regulatory requirements are represented using different rules. A methodology was discussed to derive compliance [5]..Compliance with regulatory requirements must be ensured in the software being engineered. The regulations are described as rules to support and ensure software compliance with applicable regulatory requirements and obligations [6]. The authors identify the motivational factors that can motivate software architects to adopt regulatory compliant architecture. A generalized survey was done on Software Architects and Software Project Managers to identify the motivational factors that can affect them [7]. User Requirements Notation models of the HIC and privacy legislation was presented by authors to define compliance tracking using the proposed framework [8]. Pruning of log data represented as trees was suggested for automated audits. The authors demonstrated that the resultant method was more efficient than usual audit approaches [9].The authors suggested proposing a Software Architecture for Information Assurance (SARCHIA) that will help companies working as back office in developing countries to track compliance in the healthcare industry by leveraging SARCHIA framework and architecture [10]. This paper will attempt to provide an architecture named BCAHI that will facilitate the software industry dealing with medical billing information. In this paper we will transform the compliance requirements of the US medical billing system into software architecture. We will not focus in a particular software architectural style or notation, but we will focus on regulatory compliance part of the medical billing. This will be done using an ad-hoc language named Comp to represent components and connectors in software architecture BCHAI. BCAHI can be adopted by the healthcare industry in developing countries like Pakistan. 3. Formulation process for billing compliance architecture The main goal of this paper is to develop an architecture that intends to help medical billing companies working in third world countries as backup office(s) e.g. Pakistan to track compliance with international regulations and standards by adopting BCAHI. BCAHI will be a guideline for Pakistan s medical billing industry that may deal with US health care industry while working in Pakistan to develop and provide more effective and efficient notations that will analyze, visualize and construct applications used in the medical industry. The following contributions, related to the handling of compliance to OIG 3rd party medical billing guideline, HIPAA security and privacy law and HITECH regulations, are expected: Definition and identification of Compliance Attributes (CA). Exploration of notations e.g. ADLs to build a modeling language for BCAHI. Devising the BCAHI architecture. 18

4 Syeda et al: Billing Compliance Assurance Architecture for Healthcare Industry Methodology for evaluating BCAHI architecture. Evaluating BCAHI impact to make recommendations based on evaluation results Figure 1 explains the process to formulate BCAHI. Figure 1: Billing Compliance Architecture Formulation Process 4. A third party medical billing company as a case study A Healthcare IT Company (UHIC) is committed to complying with all controlling legal requirements. Such compliance is a foundational element of healthy and sustainable growth and essential to protecting company s interests and fulfilling its corporate mission. The Office of the Inspector General of the Department of Health and Human Services recommends that third-party medical billing companies adopt and implement billing compliance programs. Pakistani companies are not governed by U.S. laws but the companies who want to outsource a service, such as billing, require those third-parties to comply with the HIPAA. This is a unique and increasingly important issue in this domain. While the adoption of such plans is strictly voluntary, UHIC who outsource medical billing and transcription services, require its backup offices in Pakistan to comply with the HIPAA, HITECH, OIG guideline and AAMT guideline. UHIC office in Pakistan is so committed to excellence in medical billing, that it has devoted the time and resources necessary to crafting this Compliance Program. Below 19

5 mentioned diagram explains the UHIC s business process: A Healthcare IT Company Figure 2: UHIC s Business Process Provider may refer to healthcare provider/practice that may be referred as 'client' according to the company's service agreement. Providers often communicate special instructions to UHIC s employees by following methods: i) Instructions received telephonically or via Instant Messenger ii) iii) Instructions received via Secure Support Center or via Instructions received via instruction s module available at UHIC s website under the member area Following diagram shows the statistical analysis of special instructions (x-axis=type of instruction and y-axis=# of instructions) received from providers by UHIC: No Show Charges Statistical Analysis of Special Instructions Received from Providers Provider Fee 4 Participating and Capitation 7 31 Workers Coding Balance out Codes to Adust in Other Instructions /Contact # of Instructions Reported Figure 3: Statistical Analysis of Special Instructions Received from Providers In order to streamline the process of implementing these special instructions and ensure 20

6 Syeda et al: Billing Compliance Assurance Architecture for Healthcare Industry clarity in their adherence, all departments/employees receiving the instructions from clients shall follow the procedure shown below: Figure 4: Receive Special Instructions from Provider Flow Chart 4.1 Extending requirements categorization for compliance with healthcare regulations Initially requirements were categorized as functional and non-functional requirements. In this section we will focus on a cross-section of all requirements (functional and nonfunctional) named as legal requirements. Legal requirements will explain the applicable regulatory and standards requirements needs. These requirements will help to identify the appropriate Compliance Attributes (CA) and its effect on software architecture for its compliance. Key compliance attribute (short, CA): any attribute of software which serves as a mean to describe applicable regulatory requirement and possibly to evaluate it. To handle these error systematically/manually architecture for Providers Special Instructions Generation, Verification and Implementation Module for Web and Management Information System (MIS) is discussed. 21

7 4.2 OIG Key Compliance Attributes Innocent billing errors and unintentional misconduct associated with billing activities can threatens any company s reputation and ability to do business. Therefore, all suspected errors and violations of the law are taken seriously and will be appropriately investigated to determine whether, in fact, there have been any errors or misconduct. R1: Bill the Medicare/Medicaid beneficiaries or commercial contracted payer patients for the difference between the total charges and the amount allowed by the payer. CA1: Balance Billing. R2: Bill the patient for which bankruptcy notification have been received. CA2: Bankruptcy. R3: Bill the patient xyz instead of patient abc. CA3: Billed to wrong patient. R4: Charge the patient def for the services not provided as claimed. CA4: Billing for items or services not rendered or not provided as claimed. R5: Bill CPT code service as if covered. CA5: billing for noncovered services as if covered R6: Adjust the negative balance for patient xyz. Failing to communicate to Billing Company s clients that refund requests have been received or that overpayments exist. CA6: Overpayment Adjustment. R7: Up-coding the level of service provided. CA7: Up-coding. R8: Double billing resulting in duplicate payment. CA8: duplicate or previously paid. R9: Bill the HMO beneficiaries or commercial contracted payer patients for the difference between the total charges and the amount allowed by the payer. CA9: Wrong billing of HMO patients. R10: Send PHI without encryption over the unsecured PHI, QA1: Security and CA9: Encryption. R11: Conveying information to payers or patients that in any manner differs from the information provided to UHIC, in writing, by the physician (e.g., changing place of service, date of service or procedure code), unless earlier instructions are superseded by subsequent written instructions. CA11: lack of integrity. R12: Billing for each component of the service instead of billing using an all-inclusive code CA12: Unbundling 4.3 Characteristics of Key Compliance attributes CA belongs to a specific domain and it is affected by applicable regulatory requirements. For different domains usual programming notations and data types are used. For CA different methods may be used including but not limited to: Real and integer value (CA can be quantitatively measured, as # of billing compliance issue), 22

8 Syeda et al: Billing Compliance Assurance Architecture for Healthcare Industry Boolean values (CA can result in true and false, as billing compliance issue recovery). Following are two types of CA: Basic (means that their values cannot be computed from others) and Drive (means that their values can be computed from others). A derived compliance attribute X will contain Y list of other compliance attributes that will determine values of X. 5. Examples In this section we will transform the compliance requirements into software components and connector using COMP language for UHIC case study. We will discuss following two compliance requirements for UHIC: Provider s special instruction compliance with OIG 3rd party medical billing guidelines and Minimization of overpayments to handle the provider s special instructions effectively. 5.1 Compliance It refers to maximizing the providers instructions compliance with OIG 3rd party medical guideline, HIPAA and HITECH requirements. This is CA concerning the compliance of provider instruction with applicable standard. This condition requirement is shown below: Maximize (compliance) For this a statistical analysis of issues reported to this medical billing company were analyzed. These issues were reported internally by employees or externally by providers, patients and others. Initially the issues were categorized in to eleven categories. Average complaint ratio details are mentioned below: Website-12% EMR-13% Networks-13% Billing-62% The average response time to resolve these complaints were 10 minutes. Then the issues were divided into following three categories: A billing compliance issue Not a billing compliance issue Issue not categorized Figure 5 shows the issue categorization based on cases reported to a medical billing company. Total issues were reported from year 2007 till now out of

9 reported issues were categorized as billing compliance Issues issues out of were reported against Not a billing compliance issue category. Issues Categories Total Number of Issues Total Billing Compliance Issues Reported Not A Billing Compliance Issue Reported Issues Not Categorized Figure 5: Issue categorization based on cases reported to a medical billing company a) Defining the Compliance Requirement Compliance is disjoint union of the number of special instructions and their compliance with the standard. union compliance =(special_ instructions_received, requirements_compliance) If we want to increase the compliance then we have to increase the compliance with applicable regulatory requirements and standards. max(compliance) =(special_instructions_received) AND max(requirements_compliance) First factor is statistically measurable, so we define its data type as integer. For second variable we will define its type as enumeration data type and its value will be either yes or no. No_of_special_instructions_received, requirements_compliance=(yes_no, ascii) This expression does not help to measure the requirements compliance in an efficient manner. We will attempt to provide concreate values to this variable at next. First we will focus on special_instructions_received. It will include three kinds of interactions: providers will login at website using login information, add special instructions through website and UHIC s employee will receive/handle the special instructions through MIS software. As the exact number of special instructions depends 24

10 Syeda et al: Billing Compliance Assurance Architecture for Healthcare Industry on both the number of providers and the number of special instructions received through Website/IM/ /Call, following five measurement units will be used to represent them: measurement unit no_providers, no_instructions_ s, no_instructions_call, no_instructions_im, no_instructions_website Then, we obtain: Number of providers/clients Number of instructions received via: , IM, Call or Website. Verify and Implement special instruction through MIS So, the optimal amount of compliance equals to Non-compliance issues resolved/ Total non-compliance issues + (1-(no_of_providers reported issues/total Providers)). requirements no_special_instructions < Non-compliance issues resolved within time/ Total non-compliance issues + (1-(no_of_providers reported issues/total Providers)) For requirements_compliance, we will represent it in a form of ascii or yes/no and can be expressed as: requirements requirements_compliance <=ascii b) CA behavior in a particular software architecture. Compliance is disjoint union of the number of special instructions and their compliance with the standard. Software architecture for special instructions system assigns a component for every provider and UHIC employee. In these components, we identify some ports that are bound with a connector. component Provider ports out init_special_instruction, notify_uhic_employee in instruction_question, instruction_answer end Provider component UHIC_Employee ports in receive_special_instruction, receive_meeting out special_instruction_progress, notify_provider end UHIC_Employee connector Instruction_Progress connects Provider with UHIC_Employee binds init_special_instruction with receive_special_instruction notify_ UHIC_Employee with notify_employee end Instruction_Progress 25

11 Below mentioned figure presents the whole first layer of the special instructions system architecture: Figure 6: Components and connectors of the first layer for the provider s special instructions system architecture. 5.2 Overpayment It means to minimize the overpayments to comply with Medicare and Medicaid OIG guideline. Following figure shows that 3% overpayment issues were reported by UHIC s employees and 2% of total issues i.e were reported by providers: Figure 7: Total overpayment issues reported internally by UHIC s employees and externally by providers 26

12 Syeda et al: Billing Compliance Assurance Architecture for Healthcare Industry This is CA concerning the compliance of provider instruction with applicable standard. This condition requirement is shown below: minimize(overpayment ) This requirements needs to be handled carefully with other conflicting requirements e.g. efficiency. For example, consider the Provider component. This is developed with provider names details and control module. The control module imports the provider s information from web and a connector exists between them. To minimize non-compliance of Provider s compliant Special Instructions, verify the frequency of special instructions compliance. At next level, the overpayment noncompliance issue can be fixed by repaying/adjusting the overpaid amount. Minimize (Overpayments) = max (repay_overpaid_amount) OR max(overpayments_adjustments) 6. Conclusion We come across two types of requirements, one being user requirements and the other being legal requirements. The problem occurs when there is a conflict between the two. Hence, we have proposed an architecture using a case study from healthcare industry which reviews and analyses the compatibility of the user requirements with the key compliance attributes derived from regulatory requirements. 7. Acknowledgement The authors, Ms. Syeda Uzma Gardazi and Mr. Arshad Ali Shahid would like to acknowledge the Higher Education Commission (HEC), Govt. of Pakistan and FAST- NUCES for providing funding and required resources to complete this work. It would have been impossible to complete this effort without their continuous support. References S. U. Gardazi, and A. A. Shahid, System Architecture for HITECH Compliance, SEDM L. Bass, P. Clements and R. Kazman, Software Architecture in Practice. Reading, MA: Addison Wesley, S. U. Gardazi and A. A. Shahid, Survey of Software Architecture Description and Usage in Software Industry of Pakistan, IEEE ICET

13 5. S. Ghanavati, D. Amyot, and L. Peyton (2007), A Requirements Management Framework for Privacy Compliance. Proc. of the 10th Workshop on Requirements Engineering (WER'07), Toronto, Canada, May, T. D. Breaux, A. I. Anton, Analyzing Regulatory Rules for Privacy and Security Requirements, IEEE Transactions on Software Engineering, 34(1), pp. 5-20, January S. U. Gardazi, S. F. Gardazi, H. Khan and A. A. Shahid, Motivation in Software Architecture and Software Project Management, IEEE ICET S. Ghanavati (2007). A compliance framework for business processes based on URN. M.Sc. thesis, University of Ottawa, Canada, May bin/view/ucm/virlibghanavatimscthesis. 9. R. Accorsi and T. Stocker, Automated Privacy Audits Based on Pruning of Log Data, In Proceedings of the IEEE Conference on Enterprise Distributed Object Computing, pages , S. U. Gardazi, A. A. Shahid, Software Architecture for Information Assurance (SARCHIA), PROFES

The Impact of HIPAA and HITECH

The Impact of HIPAA and HITECH The Health Insurance Portability & Accountability Act (HIPAA), enacted 8/21/96, was created to protect the use, storage and transmission of patients healthcare information. This protects all forms of patients

More information

SECTION 18 1 FRAUD, WASTE AND ABUSE

SECTION 18 1 FRAUD, WASTE AND ABUSE SECTION 18 1 FRAUD, WASTE AND ABUSE Annual FW&A Training Required for Providers and Office Staff 1 Examples of Fraud, Waste and Abuse 2 Fraud, Waste and Abuse Program Policy 3 Suspected Non-Compliance

More information

Compliance Training for Medicare Programs Version 1.0 2/22/2013

Compliance Training for Medicare Programs Version 1.0 2/22/2013 Compliance Training for Medicare Programs Version 1.0 2/22/2013 Independence Blue Cross is an independent licensee of the Blue Cross and Blue Shield Association. 1 The Compliance Program Setting standards

More information

New HIPAA Breach Notification Rule: Know Your Responsibilities. Loudoun Medical Group Spring 2010

New HIPAA Breach Notification Rule: Know Your Responsibilities. Loudoun Medical Group Spring 2010 New HIPAA Breach Notification Rule: Know Your Responsibilities Loudoun Medical Group Spring 2010 Health Information Technology for Economic and Clinical Health Act (HITECH) As part of the Recovery Act,

More information

CODE OF CONDUCT. Our commitment to ethical conduct and compliance depends on all UHS personnel.

CODE OF CONDUCT. Our commitment to ethical conduct and compliance depends on all UHS personnel. CODE OF CONDUCT Our commitment to ethical conduct and compliance depends on all UHS personnel. If you find yourself in an ethical dilemma or suspect inappropriate or illegal conduct, discuss it with your

More information

Mental Health Resources, Inc. Mental Health Resources, Inc. Corporate Compliance Plan Corporate Compliance Plan

Mental Health Resources, Inc. Mental Health Resources, Inc. Corporate Compliance Plan Corporate Compliance Plan Mental Health Resources, Inc. Mental Health Resources, Inc. Corporate Compliance Plan Corporate Compliance Plan Adopted: January 2, 2007 Revised by Board of Directors on September 4, 2007 Revised and Amended

More information

INTRODUCTION. Billing & Audit Process

INTRODUCTION. Billing & Audit Process CLAIMS BILLING AUDITS INTRODUCTION ValueOptions pays for mental health services for millions of members and makes payments to tens of thousands of mental health providers. As such, this provides ample

More information

Fraud, Waste and Abuse: Compliance Program. Section 4: National Provider Network Handbook

Fraud, Waste and Abuse: Compliance Program. Section 4: National Provider Network Handbook Fraud, Waste and Abuse: Compliance Program Section 4: National Provider Network Handbook December 2015 2 Our Philosophy Magellan takes provider fraud, waste and abuse We engage in considerable efforts

More information

Description of a First Tier, Downstream, and Related Entity

Description of a First Tier, Downstream, and Related Entity We at Health Partners Plans (HPP) would like to thank you for your partnership with HPP and helping us to provide exceptional service to our Medicare beneficiaries. The Centers for Medicare and Medicaid

More information

The Basics of HIPAA Privacy and Security and HITECH

The Basics of HIPAA Privacy and Security and HITECH The Basics of HIPAA Privacy and Security and HITECH Protecting Patient Privacy Disclaimer The content of this webinar is to introduce the principles associated with HIPAA and HITECH regulations and is

More information

HIPAA/HITECH Compliance Using VMware vcloud Air

HIPAA/HITECH Compliance Using VMware vcloud Air Last Updated: September 23, 2014 White paper Introduction This paper is intended for security, privacy, and compliance officers whose organizations must comply with the Privacy and Security Rules of the

More information

Data Loss Prevention and HIPAA. Kit Robinson Director [email protected]

Data Loss Prevention and HIPAA. Kit Robinson Director kit.robinson@vontu.com Data Loss Prevention and HIPAA Kit Robinson Director [email protected] ID Theft Tops FTC's List of Complaints For the 5 th straight year, identity theft ranked 1 st of all fraud complaints. 10 million

More information

Using Computer Assisted Audit Techniques For More Effective Compliance Auditing and Monitoring In Healthcare Organizations

Using Computer Assisted Audit Techniques For More Effective Compliance Auditing and Monitoring In Healthcare Organizations Using Computer Assisted Audit Techniques For More Effective Compliance Auditing and Monitoring In Healthcare Organizations Author: Glen C. Mueller, Chief Audit & Compliance Officer, Scripps Health, San

More information

VCU HEALTH SYSTEM Compliance Program. Updated August 2015

VCU HEALTH SYSTEM Compliance Program. Updated August 2015 VCU HEALTH SYSTEM Compliance Program Updated August 2015 Table of Contents Section I. Purpose of the Compliance Program... 3 Section II. Elements of an Effective Compliance Program... 3 A. Written Policies

More information

REGULATORY CHANGES DEMAND AN ENTERPRISE-WIDE APPROACH TO DISCLOSURE MANAGEMENT OF PHI

REGULATORY CHANGES DEMAND AN ENTERPRISE-WIDE APPROACH TO DISCLOSURE MANAGEMENT OF PHI REGULATORY CHANGES DEMAND AN ENTERPRISE-WIDE APPROACH TO DISCLOSURE MANAGEMENT OF PHI Healthcare Organizations Can Adopt Enterprise-Wide Disclosure Management Systems To Standardize Disclosure Processes,

More information

AppleCare. 2013 General Compliance Training

AppleCare. 2013 General Compliance Training AppleCare 2013 General Compliance Training Goals After completing this course, you will understand: The Principles of Ethics and Integrity and the Compliance Plan How to report a suspected or detected

More information

Compliance and Program Integrity Melanie Bicigo, CHC, CEBS [email protected] 906-225-7749

Compliance and Program Integrity Melanie Bicigo, CHC, CEBS mlbicigo@uphp.com 906-225-7749 Compliance and Program Integrity Melanie Bicigo, CHC, CEBS [email protected] 906-225-7749 Define compliance and compliance program requirements Communicate Upper Peninsula Health Plan (UPHP) compliance

More information

CORPORATE COMPLIANCE: BILLING & CODING COMPLIANCE

CORPORATE COMPLIANCE: BILLING & CODING COMPLIANCE SUBJECT: CORPORATE COMPLIANCE: BILLING & CODING COMPLIANCE MISSION: Quality, honesty and integrity, in everything we do, are important values to all of us who are associated with ENTITY NAME ( ENTITY NAME

More information

Compliance Program Code of Conduct

Compliance Program Code of Conduct Compliance Program Code of Conduct INTRODUCTION All personnel must not only act in compliance with all applicable legal rules and regulations, but also strive to avoid even the appearance of impropriety.

More information

Medical Privacy Version 2015.12.10 - Standard. Business Associate Agreement. 1. Definitions

Medical Privacy Version 2015.12.10 - Standard. Business Associate Agreement. 1. Definitions Medical Privacy Version 2015.12.10 - Standard Business Associate Agreement This Business Associate Agreement (the Agreement ) shall apply to the extent that the Lux Scientiae HIPAA Customer signee is a

More information

SUBJECT: FRAUD AND ABUSE POLICY: CP 6018

SUBJECT: FRAUD AND ABUSE POLICY: CP 6018 SUBJECT: FRAUD AND ABUSE POLICY: Department of Origin: Compliance & Audit Responsible Position: Vice President of Compliance and Audit Date(s) of Review and Revision: 07/10; 04/11; 11/11; 02/12; 6/12;

More information

Final. National Health Care Billing Audit Guidelines. as amended by. The American Association of Medical Audit Specialists (AAMAS)

Final. National Health Care Billing Audit Guidelines. as amended by. The American Association of Medical Audit Specialists (AAMAS) Final National Health Care Billing Audit Guidelines as amended by The American Association of Medical Audit Specialists (AAMAS) May 1, 2009 Preface Billing audits serve as a check and balance to help ensure

More information

My Docs Online HIPAA Compliance

My Docs Online HIPAA Compliance My Docs Online HIPAA Compliance Updated 10/02/2013 Using My Docs Online in a HIPAA compliant fashion depends on following proper usage guidelines, which can vary based on a particular use, but have several

More information

HIPAA and HITECH Compliance for Cloud Applications

HIPAA and HITECH Compliance for Cloud Applications What Is HIPAA? The healthcare industry is rapidly moving towards increasing use of electronic information systems - including public and private cloud services - to provide electronic protected health

More information

2012-2013 MEDICARE COMPLIANCE TRAINING EMPLOYEES & FDR S. 2012 Revised

2012-2013 MEDICARE COMPLIANCE TRAINING EMPLOYEES & FDR S. 2012 Revised 2012-2013 MEDICARE COMPLIANCE TRAINING EMPLOYEES & FDR S 2012 Revised 1 Introduction CMS Requirements As of January 1, 2011, Federal Regulations require that Medicare Advantage Organizations (MAOs) and

More information

Purpose Components Examples of Non-Compliance Applicable Laws & Regulations Responsibilities & Management

Purpose Components Examples of Non-Compliance Applicable Laws & Regulations Responsibilities & Management Purpose Components Examples of Non-Compliance Applicable Laws & Regulations Responsibilities & Management The purpose of a Compliance Program is To reduce the risk or error or fraud Designed to ensure

More information

BUSINESS ASSOCIATE AGREEMENT. Business Associate. Business Associate shall mean.

BUSINESS ASSOCIATE AGREEMENT. Business Associate. Business Associate shall mean. BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement is made as of the day of, 2010, by and between Methodist Lebonheur Healthcare, on behalf of itself and all of its affiliates ( Covered Entity

More information

Name of Other Party: Address of Other Party: Effective Date: Reference Number as applicable:

Name of Other Party: Address of Other Party: Effective Date: Reference Number as applicable: PLEASE NOTE: THIS DOCUMENT IS SUBMITTED AS A SAMPLE, FOR INFORMATIONAL PURPOSES ONLY TO ABC ORGANIZATION. HIPAA SOLUTIONS LC IS NOT ENGAGED IN THE PRACTICE OF LAW IN ANY STATE, JURISDICTION, OR VENUE OF

More information

HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) BUSINESS ASSOCIATE AGREEMENT

HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) BUSINESS ASSOCIATE AGREEMENT HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) BUSINESS ASSOCIATE AGREEMENT This HIPAA Business Associate Agreement ( BAA ) is by and between the National Association of Boards of Pharmacy

More information

Health Management Annual Compliance Training

Health Management Annual Compliance Training Health Management Annual Compliance Training 2011 1 Introduction Welcome to 2011 Annual Compliance Training! The purpose of Annual Compliance Training is to: 1. Remind all associates of the elements of

More information

* SAMPLE * COMPLIANCE PROGRAM GROUP PRACTICE

* SAMPLE * COMPLIANCE PROGRAM GROUP PRACTICE [NOTE: This is a sample compliance plan based on OIG Compliance Program Guidance. Groups should modify it as appropriate to fit their circumstances] * SAMPLE * COMPLIANCE PROGRAM GROUP PRACTICE (Revised

More information

HIPAA COMPLIANCE AND DATA PROTECTION. [email protected] +39 030 201.08.25 Page 1

HIPAA COMPLIANCE AND DATA PROTECTION. sales@eaglenetworks.it +39 030 201.08.25 Page 1 HIPAA COMPLIANCE AND DATA PROTECTION [email protected] +39 030 201.08.25 Page 1 CONTENTS Introduction..... 3 The HIPAA Security Rule... 4 The HIPAA Omnibus Rule... 6 HIPAA Compliance and EagleHeaps

More information

SaaS. Business Associate Agreement

SaaS. Business Associate Agreement SaaS Business Associate Agreement This Business Associate Agreement ( BA Agreement ) becomes effective pursuant to the terms of Section 5 of the End User Service Agreement ( EUSA ) between Customer ( Covered

More information

Health Information Privacy Refresher Training. March 2013

Health Information Privacy Refresher Training. March 2013 Health Information Privacy Refresher Training March 2013 1 Disclosure There are no significant or relevant financial relationships to disclose. 2 Topics for Today State health information privacy law Federal

More information

BAPTIST HEALTH CORPORATE COMPLIANCE PLAN

BAPTIST HEALTH CORPORATE COMPLIANCE PLAN BAPTIST HEALTH CORPORATE COMPLIANCE PLAN BAPTIST HEALTH and its subsidiaries have a long-standing reputation for conducting both business and patient care activities with the highest level of ethical behavior

More information

SUSPICIOUS ACTIVITY DETECTION AND BILLING INVESTIGATIONS

SUSPICIOUS ACTIVITY DETECTION AND BILLING INVESTIGATIONS SUSPICIOUS ACTIVITY DETECTION AND BILLING INVESTIGATIONS New Mexico Medicaid False Claims Act OptumHealth has four core modules related to Recovery and Resiliency. These programs provide an overview of

More information

HIPAA Audit Risk Assessment - Risk Factors

HIPAA Audit Risk Assessment - Risk Factors I II Compliance Compliance I Compliance II SECTION ONE COVERED ENTITY RESPONSIBILITIES AREA ONE Notice of Privacy Practices 1 Is your full notice of privacy practices given to every new patient in your

More information

Sample Healthcare Compliance Program

Sample Healthcare Compliance Program P.O. Box 153 Shell, WY 82441 307-765-2241 (direct) 888-286-2095 (e-fax) [email protected] www.hcma-consulting.com Sample Healthcare Compliance Program 1. Introduction COMPANY is committed to establishing

More information

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011 Nationwide Review of CMS s HIPAA Oversight Brian C. Johnson, CPA, CISA Wednesday, January 19, 2011 1 WHAT I DO Manage Region IV IT Audit and Advance Audit Technique Staff (AATS) IT Audit consists of 8

More information

PINE VALLEY HEALTHCARE & REHABILITATION CENTER. Corporate Compliance Plan. 10843655v5

PINE VALLEY HEALTHCARE & REHABILITATION CENTER. Corporate Compliance Plan. 10843655v5 PINE VALLEY HEALTHCARE & REHABILITATION CENTER Corporate Compliance Plan CORPORATE COMPLIANCE PLAN TABLE OF CONTENTS Page I. DEFINITIONS...1 II. INTRODUCTION...2 III. COMPLIANCE RESPONSIBILITIES AND OVERSIGHT...3

More information

Updated HIPAA Regulations What Optometrists Need to Know Now. HIPAA Overview

Updated HIPAA Regulations What Optometrists Need to Know Now. HIPAA Overview Updated HIPAA Regulations What Optometrists Need to Know Now The U.S. Department of Health & Human Services Office for Civil Rights recently released updated regulations regarding the Health Insurance

More information

Medicare (Pioneer) Accountable Care Organization. Annual Compliance Training

Medicare (Pioneer) Accountable Care Organization. Annual Compliance Training Medicare (Pioneer) Accountable Care Organization Annual Compliance Training Overview While health care professionals have long been concerned about patient safety, increased public awareness and transparency

More information

HIPAA and Mental Health Privacy:

HIPAA and Mental Health Privacy: HIPAA and Mental Health Privacy: What Social Workers Need to Know Presenter: Sherri Morgan, JD, MSW Associate Counsel, NASW Legal Defense Fund and Office of Ethics & Professional Review 2010 National Association

More information

Compliance Program and HIPAA Training For First Tier, Downstream and Related Entities

Compliance Program and HIPAA Training For First Tier, Downstream and Related Entities Compliance Program and HIPAA Training For First Tier, Downstream and Related Entities 09/2011 Training Goals In this training you will gain an understanding of: Our Compliance Program elements Pertinent

More information

PRIVACY PRACTICES OUR PRIVACY OBLIGATIONS

PRIVACY PRACTICES OUR PRIVACY OBLIGATIONS PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY. General Information To comply

More information

This form may not be modified without prior approval from the Department of Justice.

This form may not be modified without prior approval from the Department of Justice. This form may not be modified without prior approval from the Department of Justice. Delete this header in execution (signature) version of agreement. HIPAA BUSINESS ASSOCIATE AGREEMENT This Business Associate

More information

COMPLIANCE ALERT 10-12

COMPLIANCE ALERT 10-12 HAWAII HEALTH SYSTEMS C O R P O R A T I O N "Touching Lives Every Day COMPLIANCE ALERT 10-12 HIPAA Expansion under the American Recovery and Reinvestment Act of 2009 The American Recovery and Reinvestment

More information

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

REGULATIONS FOR THE SECURITY OF INTERNET BANKING REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY

More information

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist HIPAA Omnibus Rule Overview Presented by: Crystal Stanton MicroMD Marketing Communication Specialist 1 HIPAA Omnibus Rule - Agenda History of the Omnibus Rule What is the HIPAA Omnibus Rule and its various

More information

HIPAA Omnibus Compliance How A Data Loss Prevention Solution Can Help

HIPAA Omnibus Compliance How A Data Loss Prevention Solution Can Help HIPAA Omnibus Compliance How A Data Loss Prevention Solution Can Help The Health Information Portability and Accountability Act (HIPAA) Omnibus Rule which will begin to be enforced September 23, 2013,

More information

Informational Notice

Informational Notice Pat Quinn, Governor Julie Hamos, Director 201 South Grand Avenue East Telephone: 1-877-782-5565 Springfield, Illinois 62763-0002 TTY: (800) 526-5812 Informational Notice Date: March 7, 2013 To: Re: Participating

More information

White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES

White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES CONTENTS Introduction 3 Brief Overview of HIPPA Final Omnibus Rule 3 Changes to the Definition of Business Associate

More information

Compliance Requirements for Healthcare Carriers

Compliance Requirements for Healthcare Carriers INFORMATION DRIVES SOUND ANALYSIS, INSIGHT REGULATORY COMPLIANCE ADVISORY Compliance Requirements for Healthcare Carriers Introduction With the introduction of the new healthcare exchanges in January 2014

More information

HIPAA and HITECH Compliance Simplification. Sol Cates CSO @solcates [email protected]

HIPAA and HITECH Compliance Simplification. Sol Cates CSO @solcates scates@vormetric.com HIPAA and HITECH Compliance Simplification Sol Cates CSO @solcates [email protected] Quick Agenda Why comply? What does Compliance look like? New Cares vs Rental Cars vs Custom Cars Vormetric Q&A Slide

More information

Healthcare Compliance Solutions

Healthcare Compliance Solutions Privacy Compliance Healthcare Compliance Solutions Trust and privacy are essential for building meaningful human relationships. Let Protected Trust be your Safe Harbor The U.S. Department of Health and

More information

The Institute of Professional Practice, Inc. Business Associate Agreement

The Institute of Professional Practice, Inc. Business Associate Agreement The Institute of Professional Practice, Inc. Business Associate Agreement This Business Associate Agreement ( Agreement ) effective on (the Effective Date ) is entered into by and between The Institute

More information

CHIS, Inc. Privacy General Guidelines

CHIS, Inc. Privacy General Guidelines CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified

More information

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy Amended as of February 12, 2010 on the authority of the HIPAA Privacy Officer for Creative Solutions in Healthcare, Inc. TABLE OF CONTENTS ARTICLE

More information

By Ross C. D Emanuele, John T. Soshnik, and Kari Bomash, Dorsey & Whitney LLP Minneapolis, MN

By Ross C. D Emanuele, John T. Soshnik, and Kari Bomash, Dorsey & Whitney LLP Minneapolis, MN Major Changes to HIPAA Security and Privacy Rules Enacted in Economic Stimulus Package By Ross C. D Emanuele, John T. Soshnik, and Kari Bomash, Dorsey & Whitney LLP Minneapolis, MN The HITECH Act is the

More information

COUNTY OF ORANGE DEPARTMENT OF HEALTH. Corporate Compliance Plan

COUNTY OF ORANGE DEPARTMENT OF HEALTH. Corporate Compliance Plan COUNTY OF ORANGE DEPARTMENT OF HEALTH Corporate Compliance Plan COUNTY OF ORANGE DEPARTMENT OF HEALTH CORPORATE COMPLIANCE PLAN I. Corporate Compliance Plan It is the policy of the Orange County Department

More information

Compliance, Code of Conduct & Ethics Program Cantex Continuing Care Network. Contents

Compliance, Code of Conduct & Ethics Program Cantex Continuing Care Network. Contents Compliance, Code of Conduct & Ethics Program Cantex Continuing Care Network Contents Compliance, Code of Conduct & Ethics Program 1 What is the CCCN Code of Conduct? 2 Operating Philosophies 2 Employee

More information

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification Type of Policy and Procedure Comments Completed Privacy Policy to Maintain and Update Notice of Privacy Practices

More information

Leveraging Dedicated Servers and Dedicated Private Cloud for HIPAA Security and Compliance

Leveraging Dedicated Servers and Dedicated Private Cloud for HIPAA Security and Compliance ADVANCED INTERNET TECHNOLOGIES, INC. https://www.ait.com Leveraging Dedicated Servers and Dedicated Private Cloud for HIPAA Security and Compliance Table of Contents Introduction... 2 Encryption and Protection

More information

Medicare Advantage and Part D Fraud, Waste, and Abuse Training. October 2010

Medicare Advantage and Part D Fraud, Waste, and Abuse Training. October 2010 Medicare Advantage and Part D Fraud, Waste, and Abuse Training October 2010 Introduction 2008: United States spent $2.3 trillion on health care. Federal fiscal year 2010: Medicare expected to cover an

More information

BUSINESS ASSOCIATE AGREEMENT. Recitals

BUSINESS ASSOCIATE AGREEMENT. Recitals BUSINESS ASSOCIATE AGREEMENT This Agreement is executed this 8 th day of February, 2013, by BETA Healthcare Group. Recitals BETA Healthcare Group consists of BETA Risk Management Authority (BETARMA) and

More information

Memo. Professional Accounts, LLC. Corporate Compliance Program

Memo. Professional Accounts, LLC. Corporate Compliance Program Professional Accounts, LLC Memo To: All Employees and Vendors From: Lee Frans, Executive Director Date: April 2, 2012 Re: Corporate Compliance Program Our mission as an organization has been to deliver

More information

How to select a practice management system

How to select a practice management system How to select a practice management system New challenges and opportunities are impacting your practice today The physician practice environment is changing dramatically. The transition to ICD-10-CM and

More information

Compliance Plan Required for ACO Participation

Compliance Plan Required for ACO Participation Compliance Plan Required for ACO Participation Presented by: Angela Miller Medical Auditing Solutions LLC 2012 (c)2012 Medical Auditing Solutions LLC 1 Experience Angela Miller over 18 years experience

More information

The Seven Elements of a Vendor Oversight Program

The Seven Elements of a Vendor Oversight Program The Seven Elements of a Oversight Program DST Health Solutions September 2014 The Seven Elements of a Oversight Program The Seven Elements of a Oversight Program Medicare Advantage plans must gain efficiencies

More information

STATE OF NEVADA DEPARTMENT OF HEALTH AND HUMAN SERVICES BUSINESS ASSOCIATE ADDENDUM

STATE OF NEVADA DEPARTMENT OF HEALTH AND HUMAN SERVICES BUSINESS ASSOCIATE ADDENDUM STATE OF NEVADA DEPARTMENT OF HEALTH AND HUMAN SERVICES BUSINESS ASSOCIATE ADDENDUM BETWEEN The Division of Health Care Financing and Policy Herein after referred to as the Covered Entity and (Enter Business

More information

TITLE: Scripps Compliance Program

TITLE: Scripps Compliance Program PAGE 1 of 7 TITLE: Scripps Compliance Program IDENTIFIER: S-FW-LD-1003 APPROVED: Executive Cabinet 08/14/12 ORIGINAL FORMULATION: 11/00 REVISED: 02/06, 11/06, 10/09, 08/12 REVIEWED: EFFECTIVE: Acute Care:

More information

Health Sciences Compliance Plan

Health Sciences Compliance Plan INDIANA UNIVERSITY Health Sciences Compliance Plan 12.18.2014 approved by University Clinical Affairs Council Table of Contents Health Sciences Compliance Plan I. INTRODUCTION... 2 II. SCOPE... 2 III.

More information

How To Write An Hm Compliance Program

How To Write An Hm Compliance Program Health Information Management Compliance A Model Program for Healthcare Organizations 2002 Edition Sue Prophet, RHIA, CCS Contents About the Author....................................................vii

More information

Business Associate Agreement

Business Associate Agreement Business Associate Agreement This Business Associate Agreement (this Agreement ) is entered into as of _September 23_, 2013, (the Effective Date ) by and between Denise T. Nguyen, DDS, PC ( Dental Practice

More information

How To Get A Medical Bill Of Health From A Member Of A Health Care Provider

How To Get A Medical Bill Of Health From A Member Of A Health Care Provider Neighborhood requires compliance with all laws applicable to the organization s business, including insistence on compliance with all applicable federal and state laws dealing with false claims and false

More information

HIPAA Compliance Evaluation Report

HIPAA Compliance Evaluation Report Jun29,2016 HIPAA Compliance Evaluation Report Custom HIPAA Risk Evaluation provided for: OF Date of Report 10/13/2014 Findings Each section of the pie chart represents the HIPAA compliance risk determinations

More information

Puerto Rican Family Institute, Inc.

Puerto Rican Family Institute, Inc. Puerto Rican Family Institute, Inc. Stronghold for Families, a Pathfinder for Children Corporate Compliance Program Plan - 2014 Updated by: Approved by: Yolanda Alicea Winn, LCSWR Vice President/Corporate

More information

Emptoris Contract Management Solution for Healthcare Providers

Emptoris Contract Management Solution for Healthcare Providers Emptoris Contract Management Solution for Healthcare Providers An Emptoris White Paper Emptoris, an IBM Company www.emptoris.com CMS-HP-4/12 Emptoris Contract Management Solution for Healthcare Providers

More information

Medicare Fraud, Waste, and Abuse Training for Healthcare Professionals 2010-2011

Medicare Fraud, Waste, and Abuse Training for Healthcare Professionals 2010-2011 Medicare Fraud, Waste, and Abuse Training for Healthcare Professionals 2010-2011 Y0067_H2816_H6169_WEB_UAMC IA 11/22/2010 Last Updated: 11/22/2010 Medicare Requirements The Centers for Medicare and Medicaid

More information

HIPAA BUSINESS ASSOCIATE AGREEMENT

HIPAA BUSINESS ASSOCIATE AGREEMENT HIPAA BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement ( BA Agreement ) is entered into by Medtep Inc., a Delaware corporation ( Business Associate ) and the covered entity ( Covered Entity

More information

HIPAA Compliance Guide

HIPAA Compliance Guide HIPAA Compliance Guide Important Terms Covered Entities (CAs) The HIPAA Privacy Rule refers to three specific groups as covered entities, including health plans, healthcare clearinghouses, and health care

More information

Best Practices for DLP Implementation in Healthcare Organizations

Best Practices for DLP Implementation in Healthcare Organizations Best Practices for DLP Implementation in Healthcare Organizations Healthcare organizations should follow 4 key stages when deploying data loss prevention solutions: 1) Understand Regulations and Technology

More information

Section 10. Compliance

Section 10. Compliance Section 10. Compliance Fraud, Waste, and Abuse Introduction Molina Healthcare of [state] maintains a comprehensive Fraud, Waste, and Abuse program. The program is held accountable for the special investigative

More information