Protect the privacy of your patients and the reputation of your facility.
Training that’s smarter, more effective, and cost efficient.
Automate the COI disclosure and management process.
Government scrutiny of continuum care providers has not slowed down. Rather, its focus on this segment of the healthcare industry is keener than ever. There are ways that continuum care organizations can avoid being targeted for audits.
Compliance officers must work to prevent criminal healthcare fraud cases, especially given the expansion of DOJ focus areas for investigating possible fraudulent action.
In the world of healthcare compliance, the HHS Office of Inspector General OIG plays an important and determinative role. The OIG discussed new compliance directions at the HCCA conference.
Cybersecurity follows closely behind the False Claims Act as a focus for healthcare compliance.
The threat to the security of information is an evolving one, and the key to real vigilance incorporates both technology and training. Make sure that your organization helps employees to understand their vital role in the protection of this information.
Healthcare faces threats from many directions, including cyber-attacks, devastating natural disasters, and the opioid crisis. We have assembled the following resources for healthcare leaders researching ways to overcome their challenges.
A CIA requires significant attention, data collection, legal defense, negotiation, new systems, new policies, oversight, and enforcement, possibly for many years. Healthcare facilities of all types, including hospitals, pharmaceutical manufacturers, long-term care, physician groups, and more have all seen increases in CIAs. Yet, these organizations often struggle with what to do if a recipient of one.
One of the challenges that governmental and institutional authorities face in evaluating the efficacy and cost effectiveness of therapeutics is determining who to rely on for technical and scientific support. On one hand, who better to explain the relative advantages of a new product than the inventor of a device, or the researcher who has overseen the development of a new and promising drug? On the other hand, who could be more invested in a favorable determination on safety and effectiveness?
The healthcare industry has passed the “if” stage of cyber-attacks and is now asking “when.” And, it’s no surprise cyber criminals have adjusted their targets. With patient records fetching 50 times more money on the black market than financial data and only 33% of healthcare facilities reporting their current cyber security posture as “very effective,” hackers have all the incentives in the world to breach your cyber defenses and steal patient data.
In today’s NFL not much is private. On any given Sunday, viewers are inundated with information about players’ personal and professional lives. One of the few stones left unturned when it comes to privacy are players’ medical records. For all their fame and fortune, when it comes to HIPAA, they are covered just like the rest of us. So when a report recently surfaced that a laptop containing medical records of thousands of players had been stolen from a Washington Redskins staff member, two relatively unrelated industries, healthcare and sports, made headlines for all the wrong reasons.
Last month we looked at the growing problem of ransomware and the potentially devastating impact it can have on systems, patient information and the entire operations of your facility. Ransomware is just one of many security issues that every facility needs to be concerned with and take steps to prevent. The list of security concerns includes physical security, social engineering, phishing, social media, mobile devices, access to patient records, malicious software and more.
Imagine you come into work one morning and the entire computer network is shut down and all files are inaccessible! That’s what happened to a friend of mine who owns a business in New Jersey. On their network were two letters from hackers that had hacked into their computer system overnight – one that contained a link where they could get their ENCRYPTED files and network back and another that told them how to get the special software key needed to decrypt those files.
Time will tell whether increased transparency will change dubious behavior, as designers of the database hope. What has become clear in the short term, however, is that the database is providing an excellent source of information for data mining by government investigators and reporters seeking evidence of connections between payments from industry and questionable actions by providers. It is the publicizing of these connections that will help to raise awareness and increase public pressure for the aforementioned changes in behavior.