Skip to main content

Home/ Healthcare 2.0/ Group items tagged Fraud

Rss Feed Group items tagged

Roger Steven

untitled - 0 views

  •  
    Healthcare fraud and abuse: Healthcare fraud and abuse are different but related kinds of malpractice. They affect everyone concerned: the patient, the healthcare unit, the healthcare sector, and eventually, the economy. Healthcare fraud and abuse are serious malpractices that can have very grave consequences for the patient, the hospital and the healthcare sector. They can also cost taxpayers heavy amounts of money. Healthcare fraud: There is some distinction between healthcare fraud and healthcare abuse. Healthcare fraud is said to happen, according to medicare.gov, when Medicare gets billed for a service or supply the end user never gets. These fraudulent claims result in loss of billions of dollars of revenue to Medicare each year. Healthcare fraud could be said to happen when: False statements are submitted knowingly or facts are misrepresented with the purpose of obtaining a federal health care payment for claims for which the person is not entitled A person knowingly solicits, pays, or/and accepts a payment with the intention of inducing or rewarding referrals for services or items that any of the federal healthcare programs reimburse Eligibility is falsified Prohibited referrals are made for select, designated health services Healthcare abuse: Although related, healthcare fraud and abuse are not totally similar to each other in spirit. A healthcare abuse can be when physicians do not comply with or bypass established good medical practices or administer treatments that are not necessary. This is less serious than fraud in terms of intent, but carries the same consequences: loss of billions of dollars to the exchequer and potential damage the patient's health and the physician's and/or healthcare provider's reputation. Some examples of healthcare abuse These are some of the examples of healthcare abuse: When services that are not medically warranted are performed and charged for When services and/or supplies are charged in excess of their actual value
Roger Steven

Basics of the Anti-Kickback Statute - 0 views

  •  
    Basics of the Anti-Kickback Statute : The Anti-Kickback Statute is aimed at curbing abuse and fraud in the Medicare and Medicaid systems by professionals who offer services and benefit in direct or indirect ways. In order to protect Medicare and Medicaid patients, as well as federal health care programs from abuse and fraud; the Anti-Kickback Statute was enacted. The core act that the Anti-Kickback Statute considered as fraud and abuse is the unlawful acceptance or diversion of money into influencing medical decision-making. The Anti-Kickback Statute is very clear on this. It states that anyone in the healthcare industry, who consciously and deliberately accepts a fee or remuneration of any kind or offers the same with the intention of manipulating the course of a medical decision-making, is liable to punishment. What acts attract penalties? Acts of various kinds attract penalties under the Anti-Kickback Statute. Some of these include: Carrying out advertising or marketing activities for promoting the brand of health care providers Participating in affiliate programs or pay per click commissions Working out promotion agreements with multiple companies Taking part in sponsorships Working out strategic alliances with healthcare providers Licensing content or technology Selling a healthcare provider's brands of products or services Taking a cut in the advertising revenue The nature of penalties under the Anti-Kickback Statute The Anti-Kickback Statute states major penalties for acts it prohibits. The Anti-Kickback Statute prescribes these major penalties: Up to five years in prison This has the potential to attract additional monetary fines of up to $25,000 Administrative civil money penalties that can go up to $50,000 In addition, the Office of Inspector General (OIG) could initiate administrative proceedings and take steps aimed at prohibiting anyone convicted of an Anti-Kickback violation from participating in State and federal programs. The OIG could also impose
Roger Steven

Strategies to Comply with Difficult Healthcare Fraud, Waste and Abuse Laws - 0 views

  •  
    Overview: Become knowledgeable and understand the False Claims Act, Anti-Kickback Statute, Physician Self-Referral Law, Excluded Individuals and additional criminal/civil laws that may worsen the punishment if these laws are violated. Understand the criteria of each law, exceptions and how to identify an issue that requires mitigation. Why should you Attend: Are you able to distinguish with certainty an agreement, contract or activity that is permissible versus one that is not under our current healthcare laws and regulations? Do you have a contract organization system where reviews are done regularly and retained centrally? Do you conduct auditing and monitoring of potential high risk compliance areas related to fraud, waste and abuse? If you are uncertain or need additional guidance on recognizing potential violations of healthcare fraud, waste and abuse regulations and how to audit and monitor for non-compliance, this training is for you. Areas Covered in the Session: Define and describe elements of the Anti-kickback Statute, False Claims Act, Exclusionary Rule, Physician Self-Referral Law and potential penalties for violations Discuss exceptions and related criteria to the Physician Self-Referral Law and the Anti-Kickback Statute Identify common potential issues that may result in violations and how to avoid or mitigate them Provide examples on how to comply with the regulations Describe areas to audit, monitor and implement policies/procedures for compliance Who Will Benefit: Health care providers Revenue cycle management employees Coders, Billers Compliance officers Contract management Compliance and Internal Audit professionals Healthcare administrators Speaker Profile Gail Madison Brown is a registered nurse and an attorney with over 25 years of experience in health care. For the last 15 years she has focused on health care compliance and revenue cycle management operations. Gail's experience ranges from starting new compliance programs and making impr
Roger Steven

Understanding Medical Identity Theft and ways of preventing it - 0 views

  •  
    Understanding Medical Identity Theft and ways of preventing it Medical Identity Theft is a common phenomenon in today's situation, where most health records are digitized. Although a lot of precaution goes into the security and protection of these records, Medical Identity Theft is a cause for worry. medicalIdentityTheft The most common types of data that are stolen are Social Security Number (SSN), name and the Medicare number, the most potent tools with which to impersonate and manipulate data. Why do crooks steal medical data? Medical Identity Theft happens mainly because hackers and mischief-makers access protected data to lay hands on confidential information about patients, using which they obtain medical care on behalf of the person/s whose records they steal or purchase expensive medicines. In many cases, a Medical Identity Theft is detected only after one gets a bill for a purchase or service that was never made. medicalIdentityTheft Medical Identity Theft is also committed to buy drugs and obtain fake bills that are then submitted to Medicare in the name of the original holder of the medical record. These acts can significantly dent a person's credit rating. More importantly, when wrong information or fictitious diagnosis is made into the medical record, it can lead to dangerous consequences. Ways of protection of medical data The Office of the Inspector General (OIG), which comes under Health and Human Services (HHS), realizing the gravity of the problem of Medical Identity Theft, has formulated the "3D" approach to protect medical data and prevent Medical Identity Theft. These are: Deter: One of the ways of protecting medical data is to prevent Medical Identity Theft. Users should be cautious about parting with information to anyone who claims, over phone, to have a new scheme whose enrolment requires the Social Security Number. Detect:Many fraudsters accost people at accessible public places to announce supposedly "new" medical schemes. Governm
Roger Steven

HIPAA Breaches and help from Cybersecurity Insurance - 0 views

  •  
    Overview: Remember spaghetti code? The HIPAA breach area is now almost as convoluted and overlapping and confusing as spaghetti code. Sometimes you think you are both coming and going at the same time when you think through an event to determine if your organization has had a breach. For example: Is a security incident always a beach? Is an ePHI breach a security incident as well? Is a cybersecurity event always a breach? What if it does not steal any clinical information, diagnoses or procedures information, or any payment information? A security incident? Or both? Are all the necessary kinds of notice in the Breach rule? What is Cybersecurity Insurance? Is it really the finger in the dike or itself full of Swiss cheese? Can the loss of patient or member data be a HIPAA breach and identity theft plus a fraud issue? Why should you Attend: HIPAA breaches now number in the multiple thousands, if not multiple millions. Your organization needs to be prepared for the initial sense of panic, a complete investigation, and the federal, state and reputational costs of a mega breach. A breach now costs in money approximately $225/record. And this does not include any fine of any type. The loss and theft of 1000 records may cost you organization from a quarter to $1 M, or more, and 6 months to a year to resolve. You need to know the basics of what PHI and ePHI really are; what puts the event into the breach safe harbor, what breach exceptions keeps the event out of OCR's hands, what the 4 factors are and how they are used. You need to know that your organization's breach plan and your policies and procedures include the need to notify when necessary the police, the FBI and other state and federal organizations beyond the Office for Civil Rights. Your organization needs to know how to protect itself after the fact by considering Cybersecurity Insurance. Areas Covered in the Session: Definition and reporting of a Security Incident Definition of a breach Breach Guidance Br
Roger Steven

Preparing to Comply with the New FDA FSMA Rules Planning Valid Preventive Food Safety C... - 0 views

  •  
    Overview: Upon completing this course participants will leave with a preliminary preventive control implementation plan and will: * Understand US FDA final rules for the Preventive Controls for Human and Animal Foods * Define and review your current system to identify gaps in your preventive controls planning. * Be able to develop and implement a valid preventive control company food safety plan to close any gaps * Write and implement appropriate procedures. * Know your requirements for control over your supply chain * Be able to plan and implement HARPC * Be able to perform environmental monitoring * Know how cross contamination can impact your preventive control plan * Know the difference between validation and verification * Understand and be able to use statistical process controls basics * Be able to plan and implement a team approach to preventive controls * Be able to help your food importers to jump through FDA hoops * Develop a system to risk rank your suppliers * Have a plan in hand that will pass any validation check for preventive controls * Understand some of the technology and costs that can help you establish preventive controls * Prove that your system actually prevents food safety problems * Be able to document and report results to upper management, external food safety auditors and FDA auditors * Save your company money Establish simple, low cost complete data collection and reporting systems. * Establish teambuilding between food safety and quality personnel to develop and implement changes to your current system * Understand food safety, security and recall responsibilities in light of cargo theft, adulteration and temperature failures * Learn how to use your system to get some ROI and improve your marketing position * Review current and future technologies designed to improve and simplify data collection * Establish a completely documented system Why should you attend: Validation of preventive co
Roger Steven

OIG CIAs: What Do They Mean To Your Compliance Program? - 0 views

  •  
    Overview: Learn how to improve your healthcare compliance program by using requirements found in corporate integrity agreements (CIAs) issued by the OIG. By proactively incorporating various features of CIAs, healthcare providers of all types can be better assured of meeting compliance standards. While there are many different types of healthcare compliance issues, probably the area of most concern is that of properly filing claims and receiving appropriate reimbursement. The OIG has issued various types of guidance including Federal Register entries, fraud alerts, and issues as listed in the OIG Work Plans. By providing such guidance, the OIG has given healthcare providers notice so that there can be no defense of not knowing about an issue. By organizing your compliance program to detect and then correcting various types of issues is a major objective of having a compliance program. Understanding systematic processes for improving your healthcare compliance program using CIA requirements can forestall possible criminal and civil monetary penalties. The hundreds of CIAs that have been developed when the OIG detects fraudulent activities can be used as a guide for developing and improving healthcare compliance programs for all types of healthcare providers. The process of statistical extrapolation is used by the OIG when conducting studies in order to determine recoupment amounts. Statistical extrapolation can also be used by healthcare providers when determining possible overpayments. However, the proper use of statistical extrapolation is a formal and complex mathematical process that must be properly applied. The OIG CIAs provide another resource for healthcare providers to study, understand, and then apply as appropriate. Why should you Attend: What are the OIG Corporate Integrity Agreements (CIAs)? Why does the OIG issue CIAs? Can I use general requirements from CIA to avoid monetary penalties or even avoid going to jail? Can any healthcare provider use
Roger Steven

2016 Update on Physician Compensation and Population Health - Strategies for Implementi... - 0 views

  •  
    Overview: This webinar will focus on the major fraud and abuse laws, including the Stark Law, the Anti-Kickback Statute, and the False Claims Act. In this webinar Mr. Wolfe will provide an overview of the health care regulatory issues related to implementing value-based physician compensation models. Why should you Attend: Given the substantial awards and settlements in recent Stark Law enforcement actions, Stark Law compliance has become more than just a compliance issue: it is an enterprise risk management issue. As medical groups, hospitals, and health systems transition to value-based physician compensation arrangements, they will need to make sure their arrangements continue to be compliant with the Stark Law. Areas Covered in the Session: Provide a general overview of the Stark Law, Anti-Kickback Statute and the False Claims Act. Explain the requirements for compliance with key regulatory exceptions and safe harbors. Compensation and valuation issues unique to the group practice model Discuss best practices when implementing value-based physician compensation models. Summarize the recent changes to the Stark Law for 2016. Who Will Benefit: In-House Counsel Health Care Compliance Officers Health Care Human Resources Health Care CFOs Health Care executives Speaker Profile Joseph Wolfe is an attorney with Hall, Render, Killian, Heath & Lyman, P.C., the largest health care focused law firm in the country. Mr. Wolfe provides advice and counsel to some of the nation's largest health systems, hospitals and medical groups on a variety of health care issues. He regularly counsels clients on a national basis regarding compliance-focused physician compensation and alignment strategies. He is a frequent speaker on issues related to the physician self-referral statute (Stark Law), hospital-physician transactions, physician compensation governance and health care valuation issues. Before attending law school at the University of Wisconsin, he served as a combat engi
Roger Steven

Setting up a compliance program in healthcare - 0 views

  •  
    Setting up a compliance program in healthcare: Organizations that set up a compliance program in healthcare should go by many voluntary regulations from the OIG, apart from those mandated by HIPAA. Setting up a compliance program in healthcare is about being compliant with standards. This entails having to be compliant with several standards, which cover a wide variety of areas. There are several voluntary and mandatory guidelines from the Office of the Inspector General (OIG), apart from standards from HIPAA. Setting up a compliance program in healthcare meeting HIPAA requirements is set out and mandated by the Patient Protection and Affordable Care Act (PPACA). Guidelines from the Office of the Inspector General (OIG) The series of compliance program guidance documents from the OIG are largely voluntary, and are meant for the different sections of the health care industry. These include Hospitals Nursing homes Third-party billers, and Durable medical equipment suppliers. These guidelines are issued with the intention of motivating healthcare units to develop and use their own internal controls aimed at helping them adhere to regulations, program requirements and statutes. The OIG issues documents, which act as guidelines for setting up a compliance program in healthcare by providing principles. These need to be adapted when healthcare organizations have to develop their own compliance program that is in tune with their best interests and needs. Another major aim is served in the implementation of these guidelines for setting up a compliance program in healthcare: They help healthcare units to understand the nature of fraud and other risks associated with abuse, when they are setting up a compliance program for their healthcare unit. HIPAA requirements Setting up a compliance program in healthcare while being compliant with HIPAA regulationsrequires a healthcare organization to put in place measures that ensure that health records must: Be confident
Roger Steven

The HIPAA/HITECH Security Audit - 0 views

  •  
    The federal Health Insurance Portability and Accountability Act (HIPAA) was legislated in 1996 with the primary aim of ensuring that employees who are in the process of changing or leaving their jobs do not lose their health insurance benefits. Additionally, HIPAA sought to bring down health care fraud and abuse by mandating pan-industry standards for the protection of health care information and automated billing and other related processes, and for ensuring the security of Protected Health Information (PHI). What is a HIPAA Security Audit? A HIPAA Security Audit is a program under the HIPAA Privacy, Security, and Breach Notification Audit Program of the Office of Civil Rights (OCR). A HIPAA Security Audit is carried out to make sure that the policies, processes and controls on the part of Covered Entities comply with the provisions of the HITECH Act of 2009. Adherence to the requirements laid out by HITECH is mandatory. Given the high degree of continued use of new technologies that go into and will continue to go into electronic records of patients and the criticality of the data contained in them; the US Department of Health and Human Services (HHS) recognizes that there could be chances of data breach of Protected Health Information. It is to prevent the occurrence of these breaches that a HIPAA Security Audit is mandated by the HITECH Act. Reporting of data breaches is mandatory The foremost highlight of the HITECH Act is the requirement that Entities covered by HIPAA report data breaches that affect 500 or more employees to the HHS. The OCR lays out an Audit Protocol, with whose policies, protocols and processes a facility has to comply if it is said to be compliant with the HIPAA Security Audit. Why is it necessary to carry out a HIPAA/HITECH Security Audit? Compliance with HIPAA Security Audit is necessary to demonstrate that a practice or business is well protected. The most important reason for which such entities need to be HIPAA/HITECH Security
Roger Steven

Dealing with Medicare and Medicaid Overpayments - 0 views

  •  
    Dealing with Medicare and Medicaid Overpayments : Medicare and Medicaid overpayments are pretty common. If they are not dealt with properly, they invite penalties. Medicare and Medicaid Overpayments happen when a person, provider or supplier receives a payment that is in excess of the amount due to him or her under Medicare statutes and regulations. This overpayment becomes a federal debt that is owed by the individual to the State. So, Centers for Medicare and Medicaid Services (CMS) is required by federal law to recover this amount. Overpayments routinely occur in Medicare and Medicaid. Many a time, these are unintended and are usually a result of oversight, but could also happen due to intent. Some of the most common reasons for which Medicare and Medicaid overpayments occur can be when: Duplicate submissions of the same service or claim are made Excessive or non-covered services are billed or furnished for billing Services that are not necessary medically or are excluded are paid for The wrong payee gets paid. How are Medicare and Medicaid overpayments processed? Obamacare has amended the federal False Claims Act (FCA), which is part of the Fraud Enforcement Recovery Act of 2009 (FERA), to add provisions relating to recovery of Medicare and Medicaid overpayments. This is how the process of Medicare and Medicaid overpayments works: Whenever Medicare comes to know that any overpayment of $10 (raised to $25 from July 2014) or more is made, it directs the Medicare Administrative Contractor (MAC) to initiate the process of recovery of this overpayment. The MAC starts the process by initially mailing a demand letter in which repayment is requested If no action is taken, a second and third demand letters are mailed in a month following the first one. Contents of a demand mail from Medicare/Medicaid: The demand letter sent by the MAC will explain the details of the Medicare and/or overpayment. When repayment is not made in full within 30 days, interest starts get
Roger Steven

Health Care Fraud and Abuse: Protecting the Organization in the Face of Enhanced Enforc... - 0 views

  •  
    Overview: This seminar will provide an introduction to health care fraud and abuse and the laws and regulations that the government uses in its enforcement efforts. It will discuss the potential risks, the exposure of organizations, and the likelihood of increased enforcement efforts in the future.
Roger Steven

Audits In The Health Care Industry - Getting Ready for an Outside Audit - 0 views

  •  
    Overview: You need to attend in order to control your own destiny. Get involved up front instead of being a "sitting duck". More Audits are coming and government & private payers are increasing their budgets for increased audit activity around the health care provider industry. The Department of Justice is zeroing in on providers who are aberrant. Private insurance special investigations units are also gearing up and local prosecutors who are hungering for these types of prosecutions are all part of building machinery to eliminate fraud and abuse in the nation's health care system. The concern about the audit/investigative machine that has been developed should create horrendous concern for the health care provider community, because these entities will have to come up with results. Don't become one for their "results". Areas Covered in the Session: Overview of audit risks 14 Strategies to tackling auditors: i.e. Appoint Audit Manager Appoint Audit Committee Proactively seek out info from audit visitors Respond quickly to audit visitor requests Identify On Site control person Provide strong support for onsite control person Onsite control person must be close to the visitors Audit committee to meet daily with visitors Respond quickly to early findings Request feedback from visitors Request Exit conference Carefully review preliminary findings Respond to final report Correct problem findings Who Will Benefit: Health Care Professionals Health Service Providers Compliance Officers CEO's Corporate Attorneys Speaker Profile Joseph R. Batte is president of Kristall Associates, a compliance, and risk assessment specialist for the health care provider community as well as the litigation support community. He is a former special agent with the US Office of Inspector General and participated in the development of that Departments compliance guidance's. He is a nationally known speaker on compliance and has authored the book "Doctors are from Jupiter, Compliance is from
Roger Steven

Physician Employment Agreements: Items to Consider - 0 views

  •  
    Overview:   We will review the various elements of the physician employment agreement, focusing on the pitfalls and the problems that can develop when the agreement does not clearly define the relationship, and/or when the parties do not fully understand what is being agreed to. Such items as term and termination, termination for cause, duties of the physician, call, non-compete, and compensation are all items that should be clearly set out in the agreement and fully understood by the parties. Why should you attend: Formal written contracts establish the legal relationship between the parties; they state the terms and conditions of that relationship and the rights and obligations of each party. They confirm the intentions and relationships of the parties as they enter into this relationship, and they eliminate uncertainties regarding mutual rights, obligations, and relationships. If everything remained as it is at the time the agreement is signed, there would be little need for formal documents. However, the agreement serves to protect against future disputes. Therefore, it should include as precise language as possible. Ambiguous terms in agreements are of little effect when disputes occur over the meaning of a party's rights or obligations. You should attend to gain an understanding of what should and what should not be in a physician employment agreement. Areas Covered in the Session: Corporate practice of medicine Term and termination Termination for Cause Severance pay Provision allowing physician to terminate for cause Severance pay Duties of the physician Standards for the provision of professional services Referral to hospital Continuing medical education Who Will Benefit: Physicians Healthcare executives Physician practice managers Speaker Profile William Mack Copeland MS, JD, PhD, LFACHE, practices health care law in Cincinnati at the firm of Copeland Law, LLC. He is also president of Executive & Managerial Development Group, a consu
pathsosh

Moving towards Business model Innovation in Health care delivery - 0 views

  •  
    In the healthcare system, the business days, as usual, are over. Around everywhere healthcare system is facing a tough time with rising costs and uneven quality despite the hard work of well-intentioned, well-trained clinicians. Health care leaders and policymakers have tried countless incremental fixes-attacking fraud, reducing errors, enforcing practice guidelines, making patients better "consumers," implementing electronic medical records-but none have had much impact.
instapayhealth

Medical Coding Audit Services | healthcare coding and consulting services - 0 views

  •  
    Medical coding audit services are essential for businesses in the healthcare industry. These services ensure accurate and compliant coding practices, minimizing errors and potential financial risks. With a team of experienced auditors, these services thoroughly examine medical records, billing data, and coding procedures. They identify discrepancies, coding inaccuracies, and potential fraud, ensuring adherence to industry standards and guidelines.
Roger Steven

Applied Statistics, with Emphasis on Risk Management in R and D, QA QC, and Manufacturing - 0 views

  •  
    2-day In-person Seminar Applied Statistics, with Emphasis on Risk Management in R&D, QA/QC, and Manufacturing Overview: The 2-day seminar explains how to apply statistics to manage risk in R&D, QA/QC, and Manufacturing, with examples derived mainly from the medical device design/manufacturing industry. The flow of topics over the 2 days is as follows: ISO standards and FDA/MDD regulations regarding the use of statistics. Basic vocabulary and concepts. Statistical Process Control Statistical methods for Design Verification Statistical methods for Product/Process Qualification Metrology: the statistical analysis of measurement uncertainty, and how it is used to establish QC specifications How to craft "statistically valid conclusion statements" (e.g., for reports) Summary, from a risk management perspective Agenda Day One Lecture 1: Regulatory Requirements Lecture 2: Vocabulary and Concepts Lecture 3: Confidence Intervals (attribute and variables data) Lecture 4: Normality Tests and Normality Transformations Lecture 5: Statistical Process Control (with focus on XbarR charts) Lecture 6: Confidence/Reliability calculations for Proportions Lecture 7: Confidence/Reliability calculations for Normally distributed data (K-tables) Lecture 8: Process Capability Indices calculations(Cp, Cpk, Pp, Ppk) Day Two Lecture 1: Confidence/Reliability calculations using Reliability Plotting (e.g., for non-normal data and/or censored studies) Lecture 2: Confidence/Reliability calculations for MTTF and MTBF (this typically applies only to electronic equipment) Lecture 3: Statistical Significance: t-Tests and related "power" estimations Lecture 4: Statistical Significance: ANOVA calculations Lecture 5: Metrology (Gage R&R, Correlation, Linearity, Bias , and Uncertainty Budgets) Lecture 6: QC Sampling Plans (C=0 and Z1.4 attribute AQL plans, and alternatives to such plans) Lecture 7: Statistically valid statements for use in reports Lecture 8: Summary and Impleme
P3 Healthcare Solutions

P3Care Investigates the Importance of Physicians Credentialing Service - 1 views

  •  
    With a growing number of frauds, the importance of medical credentialing services has strengthened. The need to stay updated with operational capability while ensuring the hands of the caregiver being safe is what this process strives for!
1 - 20 of 20
Showing 20 items per page