1 / 24

Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing

Insurance Handbook for the Medical Office 13 th edition. Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing. Protected Health Information and the Privacy Rule. Define compliance.

zavad
Télécharger la présentation

Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Insurance Handbook for the Medical Office 13th edition Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing

  2. Protected Health Information and the Privacy Rule Define compliance. Name the two provisions of the Health Insurance Portability and Accountability Act (HIPAA) that relate most to health care. Explain the difference between Title I Insurance Reform and Title II Administrative Simplification. Describe the Privacy Rule under HIPAA. Lesson 2.1

  3. Protected Health Information and the Privacy Rule (cont’d) Define protected health information (PHI). Identify the difference between disclosure and use of PHI. Illustrate the difference between privileged health information and nonprivileged information. Lesson 2.1

  4. Compliance Defined All regulations, recommendations, and expectations of regulating agencies must be met to be in compliance. The professional elements of the principles and practice include: Regulations and recommendations to protect individuals Supporting system-wide stability Streamline processes A compliance strategy provides a standardized process to enable consistent and effective compliance management.

  5. Health Insurance Portability and Accountability Act • Two provisions of HIPAA • Title I: Health Insurance Reform • Provides continuous insurance coverage for workers and their insured dependents • Title II: Administrative Simplification • Development and implementation of standardized electronic transactions • Implementation of privacy and security procedures • Clearinghouse

  6. Health Insurance Portability and Accountability Act • Key terms • Covered entity • Electronic media • Healthcare provider • Security officer • Transaction • HIPAA in the Practice Setting • Privacy Officer (PO) • Business Associate • Policies and Procedures (P&P) • State Preemption

  7. The Privacy Rule: Confidentiality and Protected Health Information • Key terms • Protected health information (PHI) • Privacy • Confidentiality • Disclosure • Consent form • Authorization form • Individually identifiable health information (IIHI) • Use

  8. The Privacy Rule: Confidentiality and Protected Health Information Authorization for Release of Information Form

  9. The Privacy Rule: Confidentiality and Protected Health Information Consent Form for Use and Disclosure of Information

  10. The Privacy Rule: Confidentiality and Protected Health Information • Confidential Information • Billing specialist is responsible for maintaining the confidentiality of patients’ protected health information (PHI) • Certain information or communications are excepted from the HIPAA rule • Breach of confidential communication • Considered a HIPAA violation

  11. Confidential Information

  12. The Privacy Rule: Confidentiality and Protected Health Information • Privileged Information • Relates to the patient’s treatment and progress • Patient must sign an authorization to release this information • Nonprivileged Information • Ordinary facts unrelated to the patient’s treatment • Example: Name, address, insurance information, etc. • Patient’s authorization is not needed for most information • Information is disclosed on a legitimate need-to-know basis

  13. Health Insurance Portability and Accountability Act (HIPAA) Explain patient rights under HIPAA. Explain responsibilities of the health care organization to protect patient rights under HIPAA. State the guidelines for HIPAA privacy compliance. Lesson 2.2

  14. Health Insurance Portability and Accountability Act (HIPAA) (Cont’d) List the three major categories of security safeguards under HIPAA. Define the provisions of the HITECH act. List the civil and criminal penalties of noncompliance with HIPAA regulations. Lesson 2.2

  15. Patients’ Rights • Privacy Rules: Patients’ Rights Under HIPAA • Right to Notice of Privacy Practices (NPP) • Right to request restrictions on certain uses and disclosures of PHI • Right to request confidential communications • Right to access (inspect and obtain a copy) PHI • Right to request an amendment of PHI • Right to receive an accounting of disclosures of PHI

  16. Obligations of the Health Care Provider • Policy and Procedures • Verification of Identity and Authority • Validating Patient Permission • Training • Safeguards • Complaints and Workforce Sanctions • Mitigation • Refraining from Intimidating or Retaliatory Acts

  17. The Security Rule: Administrative, Physical, and Technical Safeguards • Three Safeguards (security measures encompassing an information system) • Administrative • Protect through administrative actions • Technical • Protect and control access to information on computer systems • Physical • Prevent unauthorized use or disclosure due to physical events

  18. Health Information Technology for Economic and Clinical Health Act • Provision of American Recovery and Reinvestment Act (ARRA) • Strengthens HIPAA Privacy protections and rights • Brought compliance changes to three areas • Business associates • Notification of breach • Civil penalties for noncompliance

  19. Consequences of Noncompliance with HIPAA and the HITECH Act • Civil Monetary Penalties (CMP) Law • Monetary fines (civil and/or criminal) • Imprisonment (criminal)

  20. Fraud and Abuse Identify the difference between fraud and abuse. Identify the Federal and State laws that regulate health care fraud and abuse. List the various fraud and abuse audit programs. Describe the basic components of an effective compliance program. Lesson 2.3

  21. Fraud and Abuse Laws • OIG promotes “efficiency and economy in departmental operations” • Fraud: Knowingly, willingly, and intentionally submit false information • See Box 2-9 in textbook for specific examples • Abuse: Inconsistent with accepted medical business or fiscal practices

  22. Fraud and Abuse Laws • Federal False Claims Act • Qui Tam Provision • Criminal False Claims Act • Stark I and II • Anti-Kickback Statute • Safe Harbors • Additional Laws and Compliance

  23. Compliance Program Guidance for Individual and Small Group Physician Practices • Compliance Plan • Internal monitoring and auditing • Implementing compliance and practice standards • Designate a compliance officer • Training and education • Responding to offenses and developing corrective action • Open lines of communication • Enforcing disciplinary standards

  24. Questions?

More Related