Neurosurgery Coding Alert

Reader Questions:

Learn How to Protect e-Signatures

Question: During a recent risk assessment at our practice, we found that the e-signatures we use and have our patients use were accessible by someone outside of our organization. There were not breaches because this was an audit simulation, but do you have any advice for how we can best protect this information going forward? Iowa Subscriber Answer: There are [...]
You’ve reached your limit of free articles. Already a subscriber? Log in.
Not a subscriber? Subscribe today to continue reading this article. Plus, you’ll get:
  • Simple explanations of current healthcare regulations and payer programs
  • Real-world reporting scenarios solved by our expert coders
  • Industry news, such as MAC and RAC activities, the OIG Work Plan, and CERT reports
  • Instant access to every article ever published in Revenue Cycle Insider
  • 6 annual AAPC-approved CEUs
  • The latest updates for CPT®, ICD-10-CM, HCPCS Level II, NCCI edits, modifiers, compliance, technology, practice management, and more