Inpatient Facility Coding & Compliance Alert

Compliance:

Safeguard Your Facility From HIPAA Security Sabotage

Key: Make sure your business partners are on the up-and-up. How far does your facility go in policing your business partners' HIPAA information security practices? Check out this lesson from one Connecticut provider, and see if you need to take additional steps. The situation: VNA HealthCare in Hartford, Conn., and its parent Hartford Hospital, learned that a laptop was stolen from the home of a contractor's employee, according to a news statement from Hartford Hospital. The violation? The employee was working on hospital readmission data analysis. The laptop contained unencrypted data on more than 7,400 VNA patients and 2,000 hospital patients, they reveal.The data included patients' names, addresses, dates of birth, marital status, Social Security numbers, Medicaid and Medicare numbers, medical record numbers, and certain diagnosis and treatment information. Having such unencrypted data on the employee's laptop was a violation of the contractor's policy, the VNA and hospital note in [...]
You’ve reached your limit of free articles. Already a subscriber? Log in.
Not a subscriber? Subscribe today to continue reading this article. Plus, you’ll get:
  • Simple explanations of current healthcare regulations and payer programs
  • Real-world reporting scenarios solved by our expert coders
  • Industry news, such as MAC and RAC activities, the OIG Work Plan, and CERT reports
  • Instant access to every article ever published in Revenue Cycle Insider
  • 6 annual AAPC-approved CEUs
  • The latest updates for CPT®, ICD-10-CM, HCPCS Level II, NCCI edits, modifiers, compliance, technology, practice management, and more

Other Articles in this issue of

Inpatient Facility Coding & Compliance Alert

View All