HHS OIG Issues a New Compliance Resource Guide Monday, April 3, 2017 On March 27, 2017, the Department of Health and Human Services, Office of Inspector General (OIG) issued a new resource titled, Measuring Compliance Effectiveness: A Resource Guide. The intent of this guide is to provide numerous ideas for measuring the various elements of a compliance program. Read more
HHS OIG Provides Short Compliance Presentations for Health Care Providers Friday, March 3, 2017 The Office of Inspector General (OIG) of the Department of Health and Human Services (HHS) provides short video and audio presentations for health care providers on top health care compliance topics. These free videos and audio podcasts - averaging about four minutes each - cover major health care fraud and abuse laws, the basics of health care compliance programs, and what to do when a compliance issue arises. Read more
ONC Releases Guide to Electronic Health Record Contracting Sunday, February 19, 2017 Selecting and negotiating the acquisition of an electronic health record system (EHR) is a challenging but important undertaking for any health care provider organization. The guide issued by the Office of the National Coordinator for Health Information Technology (ONC) is intended to help the health care provider understand how to manage risks via an EHR contract in order to maximize the value of a health IT investment, whether acquiring the first EHR or upgrading or replacing existing technology. Read more
Significant Points for Physicians and Hospitals from the FY 2017 OIG Work Plan Sunday, January 22, 2017 MEDICARE PARTS A & B HOSPITALS New: Hyperbaric Oxygen Therapy Services – Provider Reimbursement in Compliance with Federal Regulations Incorrect Medical Assistance Days Claimed by Hospitals Inpatient Psychiatric Facility Outlier Payments Case Review of Inpatient Rehabilitation Hospital Patients Not Suited for Intensive Therapy Read more
Preventing Ransomware Attacks Friday, December 9, 2016 Ransomware is a type of malicious software designed to block access to computer data and systems until a sum of money is paid. There is no one technology solution that can be deployed to prevent ransomware attacks from occurring, although preventive measures can be taken to limit vulnerability. Read more