2018 Audit Update: What Can We Expect . page 6 - SPRING 2018 OPGA Member Magazine
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
SPRING 2018 OPGA Member Magazine 2018 Audit Update: What Can We Expect? . . . page 6 Cybercrime: Small Business Owners Beware . . . page 16 Tips for Creating a Secure Culture . . . page 24 Managing HIPAA Compliance and Risk in 2018 . . . page 30 1
NEWS from the President A Battle Won, but the War Continues In early February, Congress passed and the president You have OPGA’s continued commitment to advance the O&P signed a continuing resolution bill that included recognition profession and advocate for these important measures. We ask of the prosthetist’s and orthotist’s clinical notes as part of the that YOU stay in the fight by remaining, or becoming, active with Medicare patient’s record for purposes of determining the your representatives at both the federal and state levels. If you medical necessity of O&P care. This is a battle that we have need help and/or resources to do this, please contact us, we are been fighting for several years now and is a HUGE win for the here to assist! O&P profession and the patients we serve. However, the war At your service, continues, and we all must remain diligent and dedicated not to “save” the profession, but to ADVANCE THE PROFESSION! Key sections of the Medicare O&P Improvement Act need continued advocacy efforts around them. Specifically, Section 7, which provides clarification regarding the definition of minimal self-adjustment as it relates to off-the-shelf orthotics and Section 8, which would direct CMS to finally implement BIPA 427, which Todd Eagen links billing Medicare for custom orthotics and prosthetics with President, OPGA practitioner credentials.
Table of Contents Letter from OPGA President Todd Eagen................................................................................... 2 O&P1.................................................................................................................................................. 2 PEL...................................................................................................................................................... 4 Balancing the Costs and Benefits of Prosthetics From PEL............................................................................................................................................. 5 2018 Audit Update: What Can We Expect? ........................................................................... 6-7 By Kelly Grahovac, The van Halem Group Upcoming OPGA Webinars........................................................................................................... 7 OPGA Attends Policy Forum in Washington .............................................................................. 8 Staples............................................................................................................................................... 9 OTS Announces New "You Have a Choice" Guide.................................................................... 10 GAITRite Basic System.................................................................................................................... 10 Off The Shelf Marketing................................................................................................................ 11 GAITRite............................................................................................................................................ 12 Guardian Rehabilitator™ LSO..................................................................................................... 13 BY John Kenney, BOCO Breg.................................................................................................................................................... 14-15 Cybercrime: Small Business Owners Beware.............................................................................. 16, 20 By Carol Albaugh, Secure Tech Solutions Secure Tech Solutions...................................................................................................................... 17 Nymbl Systems................................................................................................................................. 18 Martin Bionics.................................................................................................................................... 19 OPGA Woman of the Year........................................................................................................... 21 Össur®................................................................................................................................................ 22 FLO-TECH®........................................................................................................................................ 23 Tips for Creating a Secure Culture............................................................................................... 24 By Megan Kraft, VGM Education VGM Education................................................................................................................................ 25 DIA-FOOT® ...................................................................................................................................... 26 Drew Shoes....................................................................................................................................... 27 Trulife................................................................................................................................................. 28-29 Managing HIPAA Compliance and Risk in 2018....................................................................... 30, 32 By VGM Insurance Services and the van Halem Group VGM Insurance Services................................................................................................................. 31 Cintas................................................................................................................................................. 33 Comfort Products.............................................................................................................................. 34 Coyote Design.................................................................................................................................. 35 VGM Market Data.......................................................................................................................... 36 KNIT-Rite............................................................................................................................................ 37 1 3
Kelly Grahovac, Senior Consultant, The van Halem Group 2018 Audit Update: What Can We Expect? It is an interesting time in the DMEPOS industry. CMS While the RAC may be quietly treading water, the ZPICs and its contractors have indicated that they are taking a and soon to be UPICs are making a huge splash when it more “provider-friendly” approach to DMEPOS claims. comes to O&P audits. These contractors, responsible for “Provider-friendly” can most likely be equated to CMS identifying and preventing fraud, waste, and abuse, have making efforts to reduce the appeals backlog at the been increasingly active, identifying large extrapolated ALJ level, which as of June 2017 was 607,402 pending overpayments, implementing payment suspensions, and appeals and a current estimated wait time of three years enacting 100% prepayment reviews. In some instances, for an appeal to be processed by an Administrative Law these actions are taken against entities for issues that, in the Judge. DMEPOS claims account for 51% of all pending past, would have experienced a very different outcome. hearings, which means intervention is imperative. These contractors are turning up the heat on orthotics. In CMS’ new approach has included less burdensome particular, back, knee, ankle, shoulder, and wrist orthoses documentation requirements and, most recently, changes are under heavy scrutiny. It may be that the increase in legislation that positively impact the O&P world. in mail order orthotics and use of telemedicine visits In February 2018, legislation was passed that allows have resulted in this surge of orthotic audits. However, orthotist and prosthetist notes to be considered part of mail order suppliers are not the only ones impacted. the medical record to establish medical necessity. This In fact, many of these audits are triggered by HCPCS was a huge win, as practitioners have struggled with codes, which means if you provide these items to your physicians to appropriately document for these items. patients in person, you may be susceptible to an audit. Another indication that CMS and its contractors are adopting And if extrapolated overpayments, payment suspensions, the “provider-friendly” approach is in the slow-moving and prepayment audits are not enough, these contractors audit activity of the national DMEPOS, home health, and have also begun including language in their correspondence hospice recovery audit contractor, Performant Recovery. that gives them authority to revoke billing privileges Performant was awarded the national recovery audit if they determine that “the provider or supplier has contract in late 2016 but has audited less than 9,000 a pattern or practice of submitting claims that fail to claims as of September 2017. This is a drastically low meet Medicare requirements.” This pattern or practice volume of audits in comparison to the first round of RAC can be established in failed rounds of audits. This audits of years past. DME provided while the beneficiary includes claims denying for medical necessity, but also was in an inpatient stay still remains at the top of their for technical issues such as invalid proof of delivery audit list, but they did identify both spinal and ankle-foot/ or incomplete detailed written order. Crossing T’s and knee-ankle-foot orthoses as CMS approved issues to be dotting I’s is more important than ever before. audited for complex review. What’s missing on their audit list are lower limb prostheses, which had a huge negative The OIG has not left O&P completely off its list for 2018 impact on many practices during the first round, and many either. In fact, in January of this year, the OIG announced of those claims are still pending at ALJ. The RAC can go that it would examine factors associated with questionable back three years from the claims paid date, and while billing for the three orthotic devices (L0648, L0650, and they do have the authority, they are currently not including L1833) and describe the billing trends for these devices extrapolated overpayments as part of their audit program. from 2014-2016. Specifically, the plan is to evaluate the extent to which Medicare beneficiaries are being supplied While I cannot say for sure that the RAC has taken a these orthotic devices without an encounter with the referring slow approach to their audit plan to assist in keeping the physician within 12 months prior to their orthotic claim appeals backlog down, it certainly seems to be the case. and will analyze billing trends on a nationwide scale. This The real question is, how long will this respite last? CMS seems to validate my hypothesis that the increase in mail will eventually look to Performant to provide a return order orthotics and telemedicine visits is not popular with on their investment. And to provide that return, audit CMS and further emphasizes the need for good supporting activity will need to increase. Given they have already documentation and an even larger emphasis on the care been granted approval to review spinal and AFO/KAFO originating with the patient’s primary care physician. orthoses, you can expect that this is where they will start. 6
Audit activity is also increasing from Medicare HMOs, If you fall under audit scrutiny or want to be sure you are state Medicaid plans, and private payers. It is essential better prepared in the face of an audit, we can help! The that providers pay attention to payer policies and van Halem Group provides audit assistance, clinical reviews effective dates for these policies to ensure they are of your files, and education to ensure that your practice obtaining appropriate documentation for the orthotics is compliant with payer policies and billing requirements. and prosthetics provided. Many of these plans have prior Don’t wait until you are under the audit microscope to authorizations for most equipment; however, in situations get help. Our proactive services will help identify any that prior authorization does not apply, it is imperative issues and form corrective actions so that you can rest that providers implement documentation principles. easy knowing you are running efficiently and compliantly. For more information visit www.vanhalemgroup.com. The “provider-friendly” approach that CMS has adopted may have extended to the RAC and even the DME MACs, but the UPICs are on a very different mission. Combined with the new auditing efforts of non-FFS Medicare payers, having good documentation from both the patient’s physician as well as from you, the practitioner, help to ensure medical necessity is established and claims are paid. 7
OPGA Attends Policy Forum in Washington Orthotics and prosthetics practitioners gathered in the ability to choose the practitioner that best meets Washington, D.C., at the beginning of March for the their needs and receive timely care. This bill is especially 2018 Policy Forum to meet with their elected officials important as a proposal by the Department of Veteran’s on Capitol Hill. This is OPGA’s 11th consecutive year Affairs, which would give the department the authority attending the forum to represent and advocate for access to determine where the veteran would receive care. to quality patient care and choice as well as preserve veteran’s access to where they receive their care. OPGA and VGM’s Government Relations team will continue to advocate for independent practitioners to OPGA met with more than a dozen congressional ensure that they have the tools necessary to provide offices to discuss O&P legislative priorities to encourage the highest quality of care to the patients they serve. enforcement of quality standards in the Medicare O&P Improvement Act among other provisions, which must be enacted. Earlier this year, sections of the Medicare O&P Improvement Act were included into the Medicare Part B Improvement Act, which was included in a continuing resolution signed by President Trump in February. The group also discussed the Injured and Amputee Veteran’s Bill of Rights bill, which would ensure that veterans have (From left to right) VGM’s Collin Brecher, Tom Powers, and OPGA President Todd Eagen meet with Sen. Joni Ernst (R-Iowa). Josie Villanueva (third from left), legislative assistant to Sen. Tammy Duckworth (D-Ill.), meets with (from left) Collin Brecher from VGM, OPGA President Todd Eagen, two Alabama O&P students, Glenn Crumpton from the Alabama Artificial Limb & Orthopedic Service, and VGM’s Tom Powers. 8 8
Mary Avenanti, VGM Off-the-Shelf Marketing Have You Seen Our Newest Edition? I would like to take this opportunity referral sources on the value you bring to your patients to make you aware of the newest and caregivers on a daily basis. It is designed as an edition of our guide to orthotic and educational resource and a highly targeted marketing prosthetic solutions, “You Have a tool that can be used to strengthen your referral base. Choice.” Since its inception seven years ago, it has become one of By now you should have received a sample copy and special the most highly effective patient promotion in the mail. I encourage you to take some time to education resources available to look over our newest edition, and pay close attention to new our members. More than 120,000 and diverse product images and the comprehensive content. of the guides have been used by members to build In today’s competitive O&P marketplace, this is awareness with both consumers and referral sources one resource that can help you separate yourself about the innovative products and services available. significantly from the competition. We invite you to take “You Have a Choice” is a professional representation advantage of the EXCLUSIVE introductory savings on of what your practice offers your community–not from this remarkable edition and GROW YOUR BUSINESS! a product standpoint, but from a ‘‘Quality of Care” For more information, contact OTS Markting, 888-875-7707, perspective. This comprehensive educational tool is a great way to educate your local physicians and other mary.avenanti@vgm.com GAITRITE The GAITRite® Basic System The GAITRite® Basic system automates measuring temporal footfall as a function of time. The application software and spatial gait parameters via an electronic walkway controls the functionality of the walkway, processes the raw connected to the USB port of a Windows® laptop, while data into footfall patterns, and computes the temporal and collecting video of the walk from up to two cameras. The spatial parameters. The software’s relational database GAITRite Basic is a 12’ electronic walkway containing six stores tests individually under each patient and supports a sensor pads encapsulated in a rollup carpet to produce an variety of reports and analyses. Testing can be done for active area 24 inches (61cm) wide and 144 inches (366cm) patients with or without shoes, including those patients using long. In this arrangement, the active area is a grid, 48 assistive devices and ambulatory aids such as crutches, sensors by 288 sensors, placed on .5 inch (1.27 cm) centers, walkers, or canes. In addition, testing patients pre- and post- totaling 13,824 sensors. The walkway is portable, can be treatment is quickly and easily performed when utilizing this laid over any flat surface, requires minimal setup and test versatile and ingenious measurement tool. time, and requires no placement of any devices on the patient. Contact phone: (973) 209-0711 Contact email: sales@gaitrite.Com How does GAITRite Basic work? Website: http://www.Gaitrite.Com As the patient ambulates across the walkway, the system captures the geometry and relative arrangement of each 10
11 11
12 12
By John Kenney, BOCO By John Kenney, BOCO Guardian Rehabilitator™ Lumbar Sacral Orthosis (LSO) In a recent blinded, The researchers surmised that the added truck stiffness randomized, clinical provided by the inextensible LSO added to trunk stiffness trial for the evaluation and motion limitation, reducing trunk muscle activation. of lumbosacral The inextensible LSO is believed to reduce pain and orthoses (LSOs) in the improve function by reducing activity of the spinal muscles management of lower that are over active to produce intrinsic compensatory back pain, researchers stiffness in the spine (Morrisette, Logan, & McGowan, (Morrisette, D., Logan, S, 2014). The researchers concluded the LSO study by stating & McGowan, S., 2014) that the study demonstrated substantially better patient found a significant outcomes when an inextensible LSO was used in addition to statistical difference standard care alone for the treatment of low back pain. between patients who received standard Back brace manufacturers have made significant back care (physical progress over the past decade in improving inextensible therapy), standard LSO designs. Both comfort and brace effectiveness in The Guardian Rehabiliator™ LSO back care (SC), and providing intracavitary pressure to reduce the load on an inextensible LSO (iLSO), and standard back care the intervertebral discs has been greatly improved. LSO and an extensible LSO. Patients who received standard pulley strapping systems, either single pull or double back care and an inextensible LSO had 4.7 times higher pull, can effectively increase inter-abdominal cavity odds of achieving a 50% or greater improvement in pressure to assist in unloading the spine. The benefit of Oswestry Disability Index (ODI) scores compared to the pulley strapping system is the adjustable support those who received standard care. The iLSO group depending on activity and need provided to the patient. yielded greater improvement in clinical outcomes The Guardian Rehabilitator™ LSO is Ongoing Care compared to SC on the ODI, whereas the extensible LSO Solution’s newest product offering. The Rehabilitator group did not differ from the standard care group. LSO provides excellent sagittal plane support and is The ODI is a low back pain questionnaire used by clinicians indicated for the effective treatment of lower back and researchers to quantify the level of disability from pain. The Rehabilitator LSO is an inextensible LSO low back pain. Inextensible lumbar sacral orthoses are design with anterior and posterior panels. A dual pull lower back braces that reduce truck motion and increase compression system provides adjustable and consistent trunk stiffness utilizing rigid anterior and posterior panels lower back support. The LSO is lightweight, breathable, and a strapping system that increases intracavitary and extremely comfortable. The LSO is available in pressure to reduce the load on the intervertebral discs. small, medium, large, X large, and XX large sizes. Extensible LSOs do not generally use rigid anterior and posterior panels and do not incorporate a pulley strapping system to increase intercavitary pressure. By their design, extensible LSOs are not as effective as inextensible LSOs in increasing trunk stiffness. 13
14 14
15 15
Carol Albaugh, Secure Tech Solutions Cybercrime: Small Business Owners Beware There’s nothing “small” about the small-business sector. Strong Passwords and According to the U.S. Small Business Administration, the 28 million small businesses in America account for 54% Two-factor Authentication of all U.S. sales. Small businesses provide 55% of all There are three common password mistakes putting jobs and 66% of all net new jobs since the 1970’s 1. people at risk. People frequently use the same password for several accounts, making it easy for cybercriminals Although your data is critical to your success, many to hack victims on multiple accounts. Weak passwords small businesses let cybersecurity slip through the cracks. that are easy to crack and storing passwords insecurely There is no shortage of negative news about business puts users at great risk. To keep your business safe, you data breaches, and it isn’t just the large corporations. and your employees should consider the following: The data breach costs for small- and medium-sized businesses are high, too. According to a Kaspersky Lab 1. Use a unique password for each account. survey, just one cybersecurity incident can cost small- and 2. Change passwords often, and use a mix of medium-sized businesses an average of $86,500.2 letters, numbers, and symbols, or better yet use a password phrase. Small businesses often lack the budget, staff, and sophistication to assemble strong defenses, making 3. Avoid the use of personal information. them an easy target where the chances of thieves 4. Use a password manager to keep them secure getting caught is much lower. Making sure your and only have to remember one password. business is adequately protected can seem like an overwhelming undertaking. Here is a list of the top 5. Use two-factor authentication. things small businesses can do to help you get started. Safeguard Your Important Data Your Employees Are Your First Line Securing IT infrastructure is often an afterthought for small businesses, but it shouldn’t be. According to of Defense Security Magazine, only 31% of small businesses take active measures to guard themselves against security 1. Cyber threats to your business are usually breaches. Additionally, 41% of small businesses are blamed on outsiders, but sometimes the threat unaware of the risks they face. This unpreparedness actually originates from within. Small-business makes SMBs great targets for cybercriminals. 3 employees usually wear many hats and often perform multiple roles. Update and Patch Software. 2. Ensure your employees know the potential Most hacks are not done using the tactics that were impact a cyber incident may have on business discovered today; they use tactics that were several months operations, and have specific rules for email, if not a year old. Many of the nationally recognized hacks web browsing, mobile devices, and social such as Equifax and the city of Atlanta were likely a result networks. of outdated software that had a patch or update available, 3. Include cybersecurity training during onboarding and the IT staff did not take the time to do proper backups. activities for new employees. 4. Make training useful, relevant, and responsive to real-world examples during regular intervals throughout the year. Continued on page 20 16
17 17
18
19
CYBERCRIME Continued from page 16 Smart Firewall If they gain access to a device, not only is the data on that device wide open to a breach but so is all the data on that These are often referred to as next generation firewalls. network. Most insurance companies will require you have this Mobile security is no longer an optional item for small in place. One way to determine if you have a smart business cybersecurity. Small businesses need to take it just firewall is if it has a monthly fee associated with as seriously as security for their servers and endpoints. updating it. Smart firewalls are a great tool as they are updated several times per day and will protect you from attacks as hackers find new tactics to use. Use Encryption to Protect Your Patient Data Third Party Review It may seem like overkill at first, but as soon as you start One of the best defenses is to find out where your processing and storing payment or other confidential current exposure points are. If you hire a third party to information of your customers, encryption is vital. Encryption launch an attack on your network, they will find exactly is just as important for your business as it is for your what a hacker would find and allow you to reduce customers. If a computer or device containing protected your vulnerabilities before a hacker can find them. health information (PHI) or personally identifiable information (PII) is stolen, your company can be sued if the Access Control information is leaked or shared. When considering user access, organizations should take the 1Small Business Trends, SBA.gov, U.S. Small Business Administration following items into account. 2Kaspersky Lab Press Releases, Kaspersky Lab Survey • Determine the access control capability of all 3Security Magazine, The Costs and Risks of a Security Breach for information systems with EPHI. Small Businesses, July 2016 • Ensure that system activity can be traced to a specific user. • Establish a formal policy for access control that will guide the development of procedures. Protect Your Mobile Devices Not only are your employees on the move, but it is a safe bet they’re bringing lots of mobile devices with them. Whether they carry smartphones or tablets, it’s inevitable that your corporate data will end up on a device that can be easily lost or stolen. Complicating matters is the fact that many mobile devices have weak security, making them an attractive target for cybercriminals. FOLLOW OPGA ONLINE! ADVANCING THE PROFESSION! 20
21 21
22 22
23
By Megan Kraft, VGM Education Sales and Service Manager Tips for Creating a Secure Culture The biggest mistake companies make with cybersecurity Given that 91% of data breaches start with a phishing is thinking that good cyber defenses can be accomplished attack, if your employees are not prepared to identify through technology alone. Technology and software and avoid these attacks, your risk of a breach or malware should be a big part of the defense, but hackers are attack, such as ransomware, is greatly increased. In addition, no longer hacking technology; they hack people. So, many regulations and cyber insurance policies require organizations need to make a serious investment in their awareness training. It’s important to train employees before employees if they truly want to be secure, and that you have a data breach. Don’t wait to react after the fact. means creating a secure culture. Here are three tips on how you can help create a culture of cyber security: TIP # 3 Remember that Management TIP #1 are Employees, Too! A Security Culture Should be Very Much Companies can put in extensive effort and expend valuable like TSA Culture. resources in strengthening their security culture, but they will If you see something, say something. That is something fail if there is not a strong and consistent tone delivered that we see and hear over and over again when we are from the top. It is very important for a company’s senior traveling through an airport. There are security awareness leadership to be an enthusiastic advocate of security messages everywhere from the time you check in all the goals and objectives. Management also is often a target way through the terminal via posters and overhead speaker for hackers because they have access to more company announcements. Those messages have been ingrained in our information, which means that the hacker can do more head to the point that right when people get to an airport, damage and the financial payoff can be much larger. they have become security focused. So, if management doesn’t take cybersecurity seriously, there is a good chance the rest of the company will not That is the culture we must create when it comes to take it seriously, which opens the door for a breach. cybersecurity in the workplace. If you see something, say something. If you get a suspicious email, report it to your In conclusion, organizational cybersecurity culture depends IT department. Chances are you are not the only one who not solely on the work of one person but instead on has received it. Keep your employees in the loop on the the contributions of all employees. By communicating latest scams, phishing, and ransomware attacks that have security basics, having employees engage in interactive been happening. The more your employees know, the better security awareness training, and executives providing defense they will be. Educate, educate, and re-educate. a consistent pro-security tone, you can create a well- rounded cybersecurity culture in which everyone has TIP # 2 a stake. For more information on creating a secure culture and starting a security awareness program for Invest in Employee Awareness Training your company, contact VGM Education at 866-227- Most of the time, the threat actually originates from 8171 or email www.vgmeducation@vgm.com. within the organization, when employee’ ignorance and/ or negligence opens the door for cybercriminals. So, incorporating a cybersecurity awareness program for your employees is critical. It is the most effective way to combat poor password practices, successful phishing attempts, and other cyberthreats that put your business at risk. 24
25
26
27
28 28
29 29
By Bill Wilson and Kelly Grahovac Managing HIPAA Compliance and Risk in 2018 Brought to you by VGM Insurance Services in conjunction 2. Social Media with The van Halem Group. Social media is thoroughly ingrained in everyday life. Many of us take pictures and post regularly as part of There are a number of good reasons to get and keep our default setting, not considering the content making its your O&P business on track toward HIPAA compliance way onto the internet. But, when it comes to HIPAA, there in 2018. For one, throughout 2017, the Office of Civil are some precautions that must be taken. Never post a Rights (OCR) issued more than $19 million in fines related photo of a patient without written consent. Without proper to HIPAA violations. Compare that to fines in 2015 documented consent, you’re compromising that patient’s totaling approximately $6 million, and it becomes clear protection. One of the best and simplest ways to prevent that businesses responsible for handling patient health this is to ensure all employees are aware of the HIPAA information (PHI) need to be more diligent than ever. policies in place to prevent the sharing of PHI. 3. Employees Disclosing Information Common HIPAA Violations Violations aren’t limited to what gets posted on the Do a quick search of recent HIPAA violations, and you’ll find internet, however. Employees should be mindful of where headlines proclaiming multi-million dollar settlements for they’re discussing topics about patients and who they’re breaches resulting in the loss of hundreds, thousands, or even discussing it with, even around the watercooler at work. millions of patient records. Keep these conversations with friends and family to a minimum as well to avoid sharing PHI. Yes, it’s true that the health care industry is the number one This can be easier said than done in close-knit communities, target for cyberattacks, and you should use the technology but asking a medical professional about a friend can lead and resources available to you in order to secure your to a breach as well. If you find yourself in this situation, be patients’ data. However, there four other common violations sure to have a canned response ready that explains you that fail to make the headlines but are potentially as cannot disclose any information about a patient. devastating as experiencing a cyberattack. 4. Accessing Patient Information on 1. Mishandled Medical Records Home Computers With all the talk of cyberattacks, one might think that Information security officers dislike this as well, referring keeping all patient records as hard copy could limit to “Bring Your Own Device,” or BYOD. However, sometimes exposure. It’s important to remember how easy it is to you have to take your work home with you. Your computer misplace a document and how difficult it can be to pin should never be left alone or without password protection down who has accessed it. Don’t leave medical records out when it handles PHI. Exposing it to family members or in the open. Ensure that they are filed and locked away to having it shared to the wrong online channels can lead to prevent records from falling into the wrong hands. significant fines. At some point, you will have a need to dispose of some records, either because they are outdated or you’re transitioning to digital storage. Proper steps should be taken to ensure PHI is disposed of properly. Consider Continued on page 32 working with a secure document shredding company. To learn about proper disposal methods, you can visit the U.S. Department of Health and Human Services website at www.hhs.gov. 30
31 31
HIPAA Continued from page 30 Steps You Can Take in 2018 Stay the Course It’s never a bad time to plan and re-assess your compliance It may seem like a tall order, but don’t lose sight of your and risk. Below are five steps you can take to help get HIPAA compliance goals. When it comes to protecting your you started. patients’ data, the stakes are simply too high. If you do need a little help working through these steps, 1. Select or Hire a Compliance and though, The van Halem Group has more advice to offer on Security Officer their blog, as well as their HIPAAwise complete compliance Having someone on staff dedicated to ensuring compliance program. Visit them at www.vanhalemgroup.com to learn along with training and updating other employees can help more about what they can do to help get you on the path mitigate any non-compliance risks. If the budget allows, start toward compliance. looking to hire or educate a compliance officer. Remember, if you don’t have someone designated to be leading For more information about Cyber Liability insurance and compliance efforts, you’re not in compliance. managing your business’s risk, talk to the experts at VGM Insurance by calling 800-362-3363 or emailing 2. Develop a Risk Assessment info@vgminsurance.com. Also, be sure to check out their website www.vgminsurance.com for risk management tips and This is a way of identifying potential risks, vulnerabilities, downloadable resources. availability, and integrity of PHI. This includes the information your organization creates, maintains, receives, and transmits, and having a risk assessment in place is critical to being compliant. Because entities can now be fined for not identifying potential risks, this should be the next step after identifying your compliance officer. 3. Create HIPAA Privacy and Security Policies These lay the groundwork when developing the rest of your compliance strategy. The goal in this step is to develop a plan on how your organization will protect PHI. The work doesn’t stop with the creation of these policies, though. Review them with staff on a regular basis and update, at minimum, on an annual basis. 4. Educate your Employees This step may come last in this section, but it certainly is not least. When it comes to breaches, whether by a cyberattack or the common violations discussed earlier, employee education is one of the most important ways to minimize the risk to patient records. Employees should receive annual education on all the policies and procedures in place, and accurate documentation of that education should be kept in case of an audit. 5. Purchase Cyber Liability Insurance Finally, providers should consider purchasing a Cyber Liability insurance policy as an additional layer of protection for their business. Cyber policies can cover a business’s financial liability for a data breach. 32
33
34
35 35
36 36
37 37
1111 W. San Marnan Dr. PO Box 1467 Waterloo, IA 50704 800-214-6742 A Division of www.opga.com VGM Group, Inc. www.pointhca.com
You can also read