Medicare Compliance & Reimbursement

PHI:

Keep Looking for New Ways To Secure Data

Growing number of breaches in 2015 indicate continuing vulnerability. Accidental losses of laptops, external hard drives or even papers are as likely to cause a data breach as hackers getting access to payer or provider servers. The recent examples of whopping penalties that have been imposed for breaches underscore the importance of keeping protected health information secure. Note there have [...]
You’ve reached your limit of free articles. Already a subscriber? Log in.
Not a subscriber? Subscribe today to continue reading this article. Plus, you’ll get:
  • Simple explanations of current healthcare regulations and payer programs
  • Real-world reporting scenarios solved by our expert coders
  • Industry news, such as MAC and RAC activities, the OIG Work Plan, and CERT reports
  • Instant access to every article ever published in Revenue Cycle Insider
  • 6 annual AAPC-approved CEUs
  • The latest updates for CPT®, ICD-10-CM, HCPCS Level II, NCCI edits, modifiers, compliance, technology, practice management, and more