<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Insurance Archives - Herrin Health Law, P.C.</title>
	<atom:link href="https://herrinhealthlaw.com/category/insurance/feed/" rel="self" type="application/rss+xml" />
	<link>https://herrinhealthlaw.com/category/insurance/</link>
	<description>Comprehensive Legal Services Dedicated to the Healthcare Industry</description>
	<lastBuildDate>Thu, 16 May 2024 10:37:03 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://herrinhealthlaw.com/wp-content/uploads/2018/03/cropped-Herrin-Health-Law-Favicon-BC-64x-32x32.png</url>
	<title>Insurance Archives - Herrin Health Law, P.C.</title>
	<link>https://herrinhealthlaw.com/category/insurance/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>ERISA: the Key to Saving Your Company&#8217;s Private Healthcare</title>
		<link>https://herrinhealthlaw.com/erisa-the-key-to-saving-your-companys-private-healthcare/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=erisa-the-key-to-saving-your-companys-private-healthcare</link>
		
		<dc:creator><![CDATA[Barry Herrin]]></dc:creator>
		<pubDate>Thu, 15 Oct 2020 11:05:00 +0000</pubDate>
				<category><![CDATA[Employment]]></category>
		<category><![CDATA[Finance]]></category>
		<category><![CDATA[Insurance]]></category>
		<guid isPermaLink="false">https://herrinhealthlaw.com/?p=1161</guid>

					<description><![CDATA[<p>Learn about Employment Retirement Income Security Act's (ERISA) incredible power to improve health and save money.</p>
<p>The post <a href="https://herrinhealthlaw.com/erisa-the-key-to-saving-your-companys-private-healthcare/">ERISA: the Key to Saving Your Company&#8217;s Private Healthcare</a> appeared first on <a href="https://herrinhealthlaw.com">Herrin Health Law, P.C.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>William M. Satterwhite, JD, MD, CPE and Barry S. Herrin, JD, FACHE<sup> </sup></p>
<p>Everyone in business understands the term &#8220;ERISA&#8221;. Yet few people, even those in the benefits industry, actually really understand the incredible power to improve health and save money that is contained within the provisions of the Employment Retirement Income Security Act of 1974, as amended. Though originally ERISA only addressed pension plans and individual retirement plans, the Act has been amended several times and now covers employment-based medical and hospitalization benefits plans, called &#8220;welfare benefit plans&#8221; (WBP) in ERISA parlance.</p>
<p>Most companies offer traditional health benefits plans that have the usual monthly premiums, copays and deductibles, and some companies even offer a choice of plans each year. These plans are almost always a very &#8220;one-size-fits-all&#8221; approach, much the same as if the company said it was going to give every employee a free pair of socks &#8212; all of the same size! Who would do such a preposterous thing, you ask? Answer: almost every company in the US with more than 50 employees!</p>
<p>Welfare benefit plans (WBPs) as defined by ERISA, however, let a private employer create <em>extra</em> health benefits that are tailored to specific people or conditions, and these can be provided <em>in addition to </em>the company&#8217;s traditional health insurance benefit plans.  Moreover, ERISA allows an employer to determine <em>who</em> gets this benefit, <em>what</em> it is they actually get, and <em>how</em> it is given and paid for.</p>
<p>For example, in addition to a major medical plan, an employer can provide any or all of the following WBPs:</p>
<ul>
<li><em>A plan for employees or beneficiaries who have been diagnosed with depression, anxiety, or other mental health disorders.</em> This WBP can cover all visits to the psychiatrist and counselor at 100% without deductibles or copayments, along with all generic medications.</li>
<li><em>A plan for employees or beneficiaries with the diagnoses of diabetes and high blood pressure.</em> This WBP covers all visits to the doctor at 100% without deductibles or copayments when the purpose is addressing these diagnoses. Under this plan, insulin and all generic medications can be covered at 100% without deductibles or copayments.</li>
<li><em>A plan establishing an onsite clinic for all employees, regardless of whether they are on the company&#8217;s health benefit plan or not, where all visits can be free and may be done &#8216;on the clock&#8217; </em>(that is, without the need for the employee to &#8216;clock out&#8217; of work hours). Onsite visit-related generic medications can be free as well.[1]</li>
<li>Each WBP can have a designated &#8216;Nurse-Health Coach&#8217; who is available onsite in person at certain intervals and available by phone at other times. These Nurse-Health Coaches are the &#8216;go-to&#8217; people for these WBP participants and a key operational component to decreasing the cost of care, triaging those with acute needs, and coaching them regarding relevant lifestyle changes.</li>
</ul>
<p><!-- /wp:post-content --></p>
<p><span style="color: #333333; font-family: 'Cormorant SC', Georgia, 'Times New Roman', serif; font-size: 26px;">WHY THIS WORKS</span></p>
<p>Insurance companies generally price coverage for employers on a year-to-year basis, which means that the insurer builds in its risk of loss to both known and unknown health conditions. This is why, for example, dental insurance benefits punish insureds that have to have a crown replaced with a bridge within 5 years of the placement of the crown. The insurer would rather have paid for a bridge that creates a risk of bone loss and damages two healthy teeth instead of trying (albeit unsuccessfully) to save a damaged tooth before resorting to a bridge. This kind of pricing and payment strategy makes no sense to most employers, because the average tenure for employed professionals is five years, with 23 percent of professional workers having tenure greater than 10 years.[2] Indeed, one of the authors notes in a prior article[3] that, with this information, it might be better for an employer to pay for LASIK (at an average cost of $2500) rather than years and years of eyeglasses (at an average cost of $200 per year) because the total cost to the employer over time might well be less.</p>
<p>Similarly, delivering more care up front &#8212; as these models suggest &#8212; would in many cases save the employer money over time for long-term employees. It has been known for decades (at least) that the administration of a six-month course of beta blockers (available as a generic at low cost) following an acute heart attack lowers the rather substantial likelihood of a typical second heart attack occurring within the next 12 months and its attendant costs.[4] Recent studies[5] show that the use of statins combined with cardiac rehabilitation also proves cost-effective over the lifespan of the patient, and perhaps even a shorter period of time. However, insurers looking only at a yearly expense might not choose to pay for therapy that only has benefits to the patient over a multi-year period, whereas an employer who knows he will have that employee as an insured for several years, if not decades, might want to make that early expense in order to save overall dollars.</p>
<p>Additionally, early and persistent intervention in diabetes care and chronic obesity can prevent increases in care costs and progression of disease that could lead to short-term disability, long-term disability, and perhaps death. Such intervention can be in-person with or without the addition of drug therapy, but such interventions are a long-term commitment to decreasing long-term costs of care.[6] The attendant weight loss from such therapy also can improve cardiac health as well as reduce stress on the musculoskeletal system caused by excess weight.</p>
<p>Finally, for many employees with diabetes, for example, the dual barriers of high cost and inconvenient care result in poor care and poor outcomes, incurring average health care spending of $16,572 to remediate these issues.[7] With the right kind of WBP, many employers could see a drop in Year 1 costs of care for their diabetic employees. It is also not uncommon to see reductions in emergency department costs from 35% of the care spend on these employees to the single digits.</p>
<p>Only a payor that knows it has &#8220;bought&#8221; the risk of an insured for a longer period of time would engage in these strategies; however, most employers on the short-term financial advice of their insurers don&#8217;t do these things. The result? Less long-term improvement in employee health and higher overall health care costs to the employer.</p>
<h2>GETTING PROVIDER BUY-IN</h2>
<p>To be honest, the average health care provider doesn&#8217;t have any interest in lowering the health care costs its customers pay unless there is something in it for them. The alternative WBPs listed here offer the employer and a narrow network of providers the opportunity to share the rewards of a successful health care payment strategy. For example, Wake Forest Baptist Health as an integrated service provider (meaning a health care provider that owns and controls hospitals and ambulatory surgery centers and employs physicians) can offer a direct contract to self-insured employers in its service area, using only its owned and controlled resources, that could include an agreement to share any savings that these WBPs achieve each plan year with the employers. Because of the pre-emption of certain state insurance laws afforded by ERISA, such plans cannot be characterized as insurance under North Carolina law, thereby removing the necessity that an insurer (with its cost structure) be involved in the plan&#8217;s administration. In summary, a well-articulated strategic deployment of WBPs with select employers can provide a health system with steady cash flows, upside gain, and highly satisfied physicians who are not compensated by the &#8220;volume wheel.&#8221;</p>
<h2>WHAT ARE THE POTENTIAL DOWNSIDES?</h2>
<p>Most employers will not have the internal capacity to monitor and administer these programs and will therefore rely on their third-party administrators (TPAs) to do it for them. However, if the TPA is a subsidiary or affiliate of a major health insurer, it will be virtually impossible to get the TPA to agree to load these providers as in network and administer their claims, especially if the narrow networks compete with their other in-network providers. This is one of the dirty little secrets of health care insurers: even though ERISA permits the self-insured employer to direct the makeup of network providers, insurer-based TPAs rebel at this because it breaks the leverage that the insurer has to exclude providers who do not agree to their (usually very low) payment rates from the networks of self-insured employer plans.</p>
<p>One other important point needs to be mentioned and that is the other big federal law controlling employer health plans: the Consolidated Omnibus Budget Reconciliation Act of 1986, known to every human resources professional as simply COBRA. COBRA is what requires employers with 20 or more employees to allow former employees to extend their health care benefits post-employment. That means that, even though the employer has lost the potential future savings these WBPs offer, it must continue to allow former employees (and others qualified under COBRA) to continue to access these benefits.</p>
<h2>CONCLUSION</h2>
<p>As with many great ideas that can transform modern industry, nothing in this article is really new, as the laws have been on the books for decades and the evidence of what we&#8217;re advocating has been around for many years. However, employers find it easier simply to follow their broker&#8217;s advice and pay an insurance company or an insurer-controlled TPA to make decisions about the health and wellbeing of the employer&#8217;s most valuable resource, chalking up the ever-increasing cost of care as an expense of doing business. Employers owe it to themselves to explore every avenue to increase worker health and productivity and decrease costs. Happily, the strategies suggested here can in many cases do both. If you&#8217;d like to explore these ideas for your company, or begin a direct-to-employer offering as a healthcare provider, let us know.</p>
<p><em><a href="https://herrinhealthlaw.com/barry-herrin/">Barry S. Herrin</a>, JD, FAHIMA, FACHE, is the founder of <a href="https://herrinhealthlaw.com/">Herrin Health Law, P.C</a>., in Atlanta, Ga. Herrin offers more than 30 years of experience practicing law in the areas of healthcare and hospital law and policy, privacy law and health information management, among other healthcare-specific practice areas. He is a Fellow of the American College of Healthcare Executives and a Fellow of the American Health Information Management Association. He also holds a Certificate in Cyber Security from the Georgia Institute of Technology. Reach him at 404-459-2526 or <a href="mailto:barry.herrin@herrinhealthlaw.com">barry.herrin@herrinhealthlaw.com</a>.   </em></p>
<p><!-- /wp:paragraph --></p>
<hr class="wp-block-separator" />
<p><!-- /wp:separator --></p>
<p><!-- wp:heading --></p>
<h2>ENDNOTES</h2>
<p>Dr. Satterwhite is admitted to the Bar of North Carolina and is Chief Wellness Officer of Wake Forest Baptist Medical Center. Mr. Herrin is also admitted to the Bar of North Carolina and is outside counsel to Wake Forest Baptist Medical Center. Â© 2020 William Satterwhite and Herrin Health Law, P.C. All rights reserved.</p>
<p>[1] This might not be truly a welfare benefit plan in the ERISA sense but another nonmonetary benefit of employment. The distinction, although at first seemingly unimportant, affects how the employee&#8217;s health information is used and disclosed under HIPAA. Additionally, such benefits cannot, for example, be extended to dependents of employees under the employer&#8217;s health plans.</p>
<p><!-- /wp:paragraph --></p>
<p><!-- wp:paragraph --></p>
<p>[2] U.S. Bureau of Labor Statistics. (2018, Sept. 20). Employee Tenure Summary. Retrieved from <a href="https://www.bls.gov/news.release/tenure.nr0.htm" target="_blank" rel="noreferrer noopener">https://www.bls.gov/news.release/tenure.nr0.htm</a></p>
<p><a href="#_ednref3">[3]</a> <a href="https://herrinhealthlaw.com/disrupting-the-talk-about-disruption/">https://herrinhealthlaw.com/disrupting-the-talk-about-disruption/</a></p>
<p><a href="#_ednref4">[4]</a> <a href="https://herrinhealthlaw.com/wp-content/uploads/2018/12/AHLA-2004-Feb-Herrin-Health-Law-Analysis-Pay-Performance.pdf">https://herrinhealthlaw.com/wp-content/uploads/2018/12/AHLA-2004-Feb-Herrin-Health-Law-Analysis-Pay-Performance.pdf</a></p>
<p><a href="#_ednref5">[5]</a> <a href="https://heart.bmj.com/content/104/17/1403" target="_blank" rel="noreferrer noopener">https://heart.bmj.com/content/104/17/1403</a></p>
<p><a href="#_ednref6">[6]</a> <a href="https://care.diabetesjournals.org/content/39/Supplement_1/S47" target="_blank" rel="noreferrer noopener">https://care.diabetesjournals.org/content/39/Supplement_1/S47</a></p>
<p><a href="#_ednref7">[7]</a> <a href="https://www.diabetes.org/resources/statistics/cost-diabetes#:~:text=People%20with%20diagnosed%20diabetes%20incur,in%20the%20absence%20of%20diabetes" target="_blank" rel="noreferrer noopener">https://www.diabetes.org/resources/statistics/cost-diabetes#:~:text=People%20with%20diagnosed%20diabetes%20incur,in%20the%20absence%20of%20diab</a></p>
<p><!-- /wp:paragraph --></p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div><p>The post <a href="https://herrinhealthlaw.com/erisa-the-key-to-saving-your-companys-private-healthcare/">ERISA: the Key to Saving Your Company&#8217;s Private Healthcare</a> appeared first on <a href="https://herrinhealthlaw.com">Herrin Health Law, P.C.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity insurance &#8212; the basics</title>
		<link>https://herrinhealthlaw.com/cybersecurity-insurance/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cybersecurity-insurance</link>
		
		<dc:creator><![CDATA[Barry Herrin]]></dc:creator>
		<pubDate>Tue, 08 Jan 2019 04:10:12 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Insurance]]></category>
		<guid isPermaLink="false">https://herrinhealthlaw.com/?p=786</guid>

					<description><![CDATA[<p>Potential insureds must critically evaluate cybersecurity insurance prices. Learn which coverages are vital and how compliance plays a critical role.</p>
<p>The post <a href="https://herrinhealthlaw.com/cybersecurity-insurance/">Cybersecurity insurance &#8212; the basics</a> appeared first on <a href="https://herrinhealthlaw.com">Herrin Health Law, P.C.</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>In October of 2002, <em>The Economis</em>t magazine wrote that &#8220;total security was impossible&#8221; and that insurance would be how businesses managed the financial aspects of cyber risk. Since then, security attacks have changed and become more deceptive and complex, and cyber defenses have become more technologically dependent. The insurance market, though maturing, is not developing at as rapid a pace as the criminal industry and the technological response.</p>



<p>Potential insureds cannot wait for the waters to calm, and must critically evaluate cybersecurity insurance prices and coverage options. The first and most important of these coverages should be the coverage of costs related to managing breaches, to include expenses related to the investigation, remediation efforts, and patient notification. Other costs that may also be incurred are credit monitoring services, damages associated with identity theft, damages associated with recovery of data, damages incurred due to having to reset EHR systems, and damages to reconstruct or recover websites and other Internet presences. Business continuity expenses (for workarounds or loss of revenue due to a cybersecurity incident) might also need coverage, especially as most standard commercial policies now exclude cyber-related risks from their covered losses. Finally, coverage for rogue employees and insider threats needs to be a part of the insurance discussion and any available coverage needs to be understood.</p>



<p>What coverage a healthcare enterprise can purchase and how much that coverage costs may also change based on how the enterprise addresses these critical aspects of compliance:<br></p>



<ul class="wp-block-list">
<li>The enterprise should be able to show that it is in compliance with HIPAA, including those provisions that require security and privacy risk assessments and proof of a plan of mitigation and remediation. Insurers likely will not cover losses resulting from a gap in HIPAA compliance, especially because there is a legal obligation on the enterprise to find out what those are.</li>
</ul>



<ul class="wp-block-list">
<li> Insurers may impose requirements for technology controls (such as encryption, for example) beyond those mandated by HIPAA. Some coverages require more secure and more robust email systems that are more resistant to phishing and spoofing, and other coverages may even require intentional phishing attacks by the insured&#8217;s IT department or vendors to gauge compliance with training.</li>
</ul>



<ul class="wp-block-list">
<li> The training requirements for new employee onboarding and access by non-employee contractors may need to meet certain criteria beyond HIPAA workforce awareness training.</li>
</ul>



<ul class="wp-block-list">
<li> Insurers may require that contractors providing &#8216;business associate&#8217; services be separately insured as a first layer of defense against cost, and that those business associate policies explicitly cover the covered entity for losses and damages caused by the business associate.</li>
</ul>



<ul class="wp-block-list">
<li>The purchased coverage, as with certain types of malpractice insurance, should be based on the &#8216;date of detection&#8217; as opposed to &#8216;date of intrusion.&#8217; It is so difficult, even with the best system monitoring tools, to determine when a breach or incident actually first occurred, so the enterprise does not want to be locked into a technical dispute with the insurer about when the hack &#8216;should have been&#8217; detected.</li>
</ul>



<ul class="wp-block-list">
<li> The policy should explicitly address whether offshore operations will be covered. Significant risks are associated with outsourcing certain data manipulation and management functions to countries or regions that have stronger privacy and data security rules than the United States.</li>
</ul>



<p>Finally, and regardless of what specific coverage requirements your policy contains, any policy&#8217;s limits need to avoid &#8216;cannibalizing&#8217; limits, in which the costs of defense reduce the limits available to pay damages or judgments. As with professional malpractice and commercial general liability coverage, the best coverage separates costs of defense from claims expenses.</p>



<p><em><a href="https://herrinhealthlaw.com/barry-herrin/">Barry Herrin </a>(<a href="mailto:barry.herrin@herrinhealthlaw.com" target="_blank" rel="noreferrer noopener" aria-label="barry.herrin@herrinhealthlaw.com (opens in a new tab)">barry.herrin@herrinhealthlaw.com</a>) is an attorney and Fellow of AHIMA. He is admitted to the bar in Florida, Georgia, North Carolina, and the District of Columbia and often speaks at the FHIMA Annual Meeting.</em></p>



<ul class="wp-block-list">
<li>&#8220;Putting It All Together,&#8221; <em>The Economist</em> (October 24, 2002)</li>



<li>Koo, &#8220;More Incident Data Needed for Cybersecurity Insurance,&#8221; Bloomberg BNA (March 28, 2016)</li>



<li>Even though there is almost a universal recognition in the law enforcement and security communities that these programs do no good at all, as the sophisticated hacker knows to wait out the 1 to 2 years of service before making use of the stolen data.</li>
</ul>



<p><em>As published in the November 2018 FHIMA Monthly Newsletter. Reprinted with permission.  </em></p>
<p>The post <a href="https://herrinhealthlaw.com/cybersecurity-insurance/">Cybersecurity insurance &#8212; the basics</a> appeared first on <a href="https://herrinhealthlaw.com">Herrin Health Law, P.C.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Shift to Value-based Reimbursement (VBR) &#124; Highlights from Georgia HIMSS 2018 conference</title>
		<link>https://herrinhealthlaw.com/shift-value-based-reimbursement-vbr-highlights-from-georgia-himss-2018-conference/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=shift-value-based-reimbursement-vbr-highlights-from-georgia-himss-2018-conference</link>
		
		<dc:creator><![CDATA[Herrin Health Law]]></dc:creator>
		<pubDate>Sat, 03 Nov 2018 01:23:45 +0000</pubDate>
				<category><![CDATA[Finance]]></category>
		<category><![CDATA[Insurance]]></category>
		<guid isPermaLink="false">https://herrinhealthlaw.com/?p=740</guid>

					<description><![CDATA[<p>Enormous complexities of the healthcare system make it impossible for a single approach like VBR to â€œtame the cost beast.â€ Here are interlocking issues.</p>
<p>The post <a href="https://herrinhealthlaw.com/shift-value-based-reimbursement-vbr-highlights-from-georgia-himss-2018-conference/">The Shift to Value-based Reimbursement (VBR) | Highlights from Georgia HIMSS 2018 conference</a> appeared first on <a href="https://herrinhealthlaw.com">Herrin Health Law, P.C.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://herrinhealthlaw.com/barry-herrin/">Barry Herrin</a>, CHPS, FAHIMA, FHIMSS, FACHE, attorney and founder of Herrin Health Law, served as one of three panelists at the Georgia HIMSS annual conference Oct. 16, 2018, in Atlanta. The trio discussed &#8220;The Shift to Value-based Reimbursement (VBR).&#8221; Fellow panelists and moderator were:</p>
<ul>
<li>Mary G. Gregg, MD, FACS, MHA, Enterprise Director, CareSource (panelist)</li>
<li>Raymond Snead, Jr., D.Sc., FHFMA, FACHE, long-time CFO/CEO who recently served as Interim CEO at Grant Memorial Hospital, Petersburg, WV (panelist)</li>
<li>Glenn Pearson, FACHE, MHA, principal and founder, Pearson Health Tech Insights (moderator)</li>
</ul>
<p>Here are some highlights from our lively interchange:</p>
<ul data-rte-list="default">
<li>There has been little true progress toward containing healthcare expenditures despite decades of trying various approaches including HMOs, PPOs, DRGs, ACOs, CON, and other efforts.</li>
<li>For the most part, VBR amounts to transferring risk to providers and does little to truly improve care.</li>
<li>Each party in the healthcare equation has a different definition of &#8216;value.&#8217; Patients want the most care for the least amount of money. Payers and employers want to pay providers as little as possible. Providers want to be adequately compensated for the care they deliver.</li>
<li>By and large, VBR does not allow for variability in patient differences, including the extent to which they follow good health practices and adhere to suggested care guidelines. Chronic illnesses represent a huge part of health status and medical costs. Patients can do more to improve their health and, thereby, help moderate costs through better lifestyle choices and compliance with care guidelines.</li>
<li>Technology can help identify and address health and, therefore, tamp down coats. However, some organizations merely throw new technology or an app at a problem without adequately defining it or developing a comprehensive plan to address root-cause issues.</li>
<li>Hospitals must get physician involvement from the very beginning whenever proposing a change in medical practice or adopting new technology. Walking three-quarters of the way through a process and then inviting physicians into the discussion guarantees failure.</li>
<li>The days of considering data security as an afterthought are over. Ironclad practices must be baked in from Day One.</li>
<li>We need better analytics for identifying and tracking the 20% of patients who require the greatest level of care.</li>
<li>Patient mental health issues contribute greatly to total costs but are not being effectively addressed.</li>
<li>Cost coverage is being relegated to a smaller and smaller percentage of patients with insurance policies that fully cover the cost of care. As the number of plans covering costs dwindles, in order to stay in business, hospitals continue to shift more and more costs to those with more adequate plans. This effectively makes hospitals taxing agencies.</li>
<li>With increasing pressures from all sides, physicians are burning out faster than ever before.</li>
<li>Innovation is not being rewarded within the current delivery and payment system.</li>
<li>Amazon and others outside the traditional healthcare arena may be the source of truly disruptive innovation.</li>
</ul>
<p>You can see the conversation went well beyond just VBR since all these issues covered interlock. The overall consensus was that the enormous complexities of the healthcare system make it impossible for a single approach like VBR to tame the cost beast.</p>
<p>Reprinted with permission from Pearson Health Tech Insights.</p>


<p><em><a href="https://herrinhealthlaw.com/barry-herrin/">Barry S. Herrin</a>, JD, FAHIMA, FACHE, is the founder of&nbsp;<a href="https://herrinhealthlaw.com/">Herrin Health Law, P.C</a>., in Atlanta, Ga. Herrin offers more than 30 years of experience practicing law in the areas of healthcare and hospital law and policy, privacy law and health information management, among other healthcare-specific practice areas. He is a Fellow of the American College of Healthcare Executives and a Fellow of the American Health Information Management Association. He also holds a Certificate in Cyber Security from the Georgia Institute of Technology. Reach him at 404-459-2526 or&nbsp;<a href="mailto:barry.herrin@herrinhealthlaw.com">barry.herrin@herrinhealthlaw.com</a>.&nbsp;</em></p>
<p>The post <a href="https://herrinhealthlaw.com/shift-value-based-reimbursement-vbr-highlights-from-georgia-himss-2018-conference/">The Shift to Value-based Reimbursement (VBR) | Highlights from Georgia HIMSS 2018 conference</a> appeared first on <a href="https://herrinhealthlaw.com">Herrin Health Law, P.C.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>HIM and Health IT Considerations for Advanced Payment Model Contracts</title>
		<link>https://herrinhealthlaw.com/him-and-health-it-considerations-for-advanced-payment-model-contracts/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=him-and-health-it-considerations-for-advanced-payment-model-contracts</link>
		
		<dc:creator><![CDATA[Barry Herrin]]></dc:creator>
		<pubDate>Tue, 10 Jul 2018 01:20:31 +0000</pubDate>
				<category><![CDATA[Finance]]></category>
		<category><![CDATA[Insurance]]></category>
		<guid isPermaLink="false">https://herrinhealthlaw.com/?p=697</guid>

					<description><![CDATA[<p>Learn what alternative payment model (APM) activities entail and what to measure and benchmark. As published in the Journal of AHIMA, July to August 2018. </p>
<p>The post <a href="https://herrinhealthlaw.com/him-and-health-it-considerations-for-advanced-payment-model-contracts/">HIM and Health IT Considerations for Advanced Payment Model Contracts</a> appeared first on <a href="https://herrinhealthlaw.com">Herrin Health Law, P.C.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>As published in the Journal of AHIMA, July to August 2018, Vol. 89, no. 07</em></p>
<p>Institutions entering the alternative payment model (APM) landscape for the first time need to have an appreci­ation of what this activity does and does not entail. It does not simply mean that the enterprise can package a reduced fee-for-service pricing structure into a different bag. Neither does it mean that the enterprise can expect &#8220;new money&#8221; for meeting quality benchmarks that it should already be meet­ing. And, in the words of one hospital executive, it does not mean that &#8220;everything can stay the same except I can write the doctors a check.&#8221;</p>
<p>A true APM offering creates the kind of clinical and finan­cial integration that can help with federal and state anti­trust compliance as well as with elimination of duplicative or redundant care. APMs can increase positive clinical out­comes and reduce cost, all without denying patients medi­cally necessary services. This paradigm shift brings with it changes in operations, often occurring in parallel with ongoing efforts to stabilize revenues under the &#8220;old&#8221; way of doing things.</p>
<h3>Getting Started with Advanced Payment Models</h3>
<p>The biggest initial hurdle for institutions contemplating APM relationships is whether the information technology already within the enterprise is capable of gathering even basic clini­cal outcome data and sorting it within a variety of patient populations. Claims data, if made available by payers, and especially for a care-managed population, can show a va­riety of clinical activities, such as medication compliance (with prescription refill information) and clinical activity outside of the APM enterprise.</p>
<p>Most hospitals and multispecialty physician groups do not include vision, dental, and other types of routine care services.</p>
<p>Integrating this claims data with the enterprise&#8217;s electronic health record (EHR) is a critical first step, and many legacy systems (and some modern EHRs) do not have this capability. Interface engines and bridging technology are expensive as well. So, a business decision about whether the cost of new APM-assistive technology is less than the anticipated additional revenue from APM payers should be made.</p>
<p>Additionally, some health information management (HIM) professionals still recoil at the notion of incorporating ex­ternally generated information into the official record of care, regardless of how thoroughly this objection has been debunked, and notwithstanding how the push for interop­erability has expanded the information on which clinicians rely in developing a plan of care. Such external information is critical both to care coordination in a clinically integrated environment and to developing payment models for shared savings and case rates.</p>
<p>The modern HIM professional must be a participant in helping the organization integrate its record of care simulta­neously with its integration of payment for-and the delivery of-that care.</p>
<p>While considering the capability of the EHR to gather and sort clinical data in a helpful way, the enterprise should also analyze its business systems to make sure that, among other things, revenue from care not provided can be linked to patients whose overall care is being managed within the APM framework. Many APMs link the payment of bonuses to decreases in the overall &#8220;spend&#8221; experienced by individual patients or patient groups; linking these shared savings and other payments to providers who prevented unneeded (and therefore unbilled) patient care thus becomes important. A variety of regulatory schemes require that these savings be paid proportionally to the owners or participants in the APM venture as well, so business systems need to be able to track this and integrate this information into the back-end pay­ments of bonus or savings revenues.</p>
<h3>Deciding What to Measure</h3>
<p>Once the capabilities of the enterprise&#8217;s various data sys­tems have been established, the contract negotiation team, which should include providers as well as business executives, counsel, and other subject matter experts, should convene to discuss which data will be measured within the APM and what monetary value will be assigned to each of these measurable data points.</p>
<p>Clinicians generally do not like being measured on things that don&#8217;t matter clinically; yet, &#8220;you can&#8217;t manage what you don&#8217;t measure&#8221; is still the order of the day. The unfortunate reality of APM contracting is that once one payer requires a healthcare provider to measure some performance capability, the APM ends up measuring it for all payers on the theory that quality is payer agnostic and the enterprise doesn&#8217;t want to discriminate in the quality care it delivers based on payer type. Thus, controlling the number and quality of measurable data points at the outset of an APM relationship is critical to prevent partici­pants from measuring everything and focusing on nothing of clinical significance.</p>
<p>APM participants can&#8217;t forget the various legal mandates not to create payment methodologies that incentivize pro­viders to deprive patients of medically necessary care. However, the definition of &#8220;medically necessary&#8221; may vary depending on which regulatory scheme you apply and what a particular payer thinks about therapeutically equivalent care.</p>
<p>Monitoring compliance with all of the contract&#8217;s provi­sions is a necessary step, which is made more difficult by the traditional separation of enterprise oversight and manage­ment into different silos of responsibility. To the extent that a separate business organization has not been formed to deal with APM contracting and payment issues, close collabo­ration between clinical and administrative departments needs to be created and maintained.</p>
<p>For example, physicians may not make critical distinctions between care pathways that have vastly different financial consequences unless they are both included in the conver­sation about developing those pathways and reminded of those pathways when atypical patients present.</p>
<p>Similarly, combining clinical documentation improve­ment (CDI) programs with new clinical and financial measurements helps make the case for both. Compliance doc­trine would indicate that there needs to be valid clinical reasons present when business office or HIM staff request additions to or changes to medical record documentation after discharge (such as hospital-acquired conditions or &#8220;present on admission&#8221; indicators). Any changes to medical records after discharge typically relate only to changes in fee-for-service reimbursement, which as a motivator typ­ically does not impress physician partners and impresses regulators even less.</p>
<p>However, correcting clinical documentation concur­rently with an admission-or correcting entries in the re­cord after admission that relate to the continuum of care ­in a clinically integrated network has more than a simple &#8220;change the document to upcode the care&#8221; impact. It affects how all of the participants in the APM structure approach ongoing care and the financial incentives for persons other than the care provider whose record has been supplemented.</p>
<h3>Providing Feedback on Benchmarks</h3>
<p>Frequent feedback on both clinical and financial bench­marks needs to be provided to all participants. Industry information shows that this &#8220;dashboard&#8221; information is more effective when presented as a comparison with other partici­pants (on an anonymous basis, of course), as most providers do not want to be viewed as negative outliers. Additionally, the completeness and accuracy of clinical documentation can be dashboarded and compared with industry and com­petitor norms in order to show the effect on care provided ­or not needed-and the corresponding effect of medical spending and enterprise costs. Both are helpful in establishing the proof of clinical and financial integration desired by regulators and payers.</p>
<p>If a separate organization has been established to man­age the APM arrangements, then one compliance-related item of documentation should be a business associate agreement between each APM provider and the manage­ment organization. Unless the manager is a licensed entity under state insurance law, most likely it will be viewed as a &#8220;legal stranger&#8221; to the flow of &#8220;protected health information&#8221; (PHI) and will need a business associate agree­ment with each provider. Likewise, the provision of protected health information (PHI) to members of the APM collaborative <em>not</em> involved in direct patient care creates another compliance risk and such information should be &#8220;de-identified&#8221; before sharing with APM management and membership.</p>
<p>Finally, audits of payments and explanation of benefit forms should be undertaken regularly to make sure that the payer pays in accordance with the APM agreement. For many providers, these payments will be all that they receive for services rendered, and it is not uncommon (un­fortunately) for payers not to pay in accordance with their agreements.</p>
<p><em><a href="https://herrinhealthlaw.com/barry-herrin/">Barry S. Herrin</a>, JD, FAHIMA, FACHE, is the founder of <a href="https://herrinhealthlaw.com/">Herrin Health Law, P.C</a>., in Atlanta. Herrin offers more than 30 years of experience practicing law in the areas of healthcare and hospital law and policy, privacy law and health information management, among other healthcare-specific practice areas. He is a Fellow of the American College of Healthcare Executives and a Fellow of the American Health Information Management Association. He also holds a Certificate in Cyber Security from the Georgia Institute of Technology.</em></p>
<p>The post <a href="https://herrinhealthlaw.com/him-and-health-it-considerations-for-advanced-payment-model-contracts/">HIM and Health IT Considerations for Advanced Payment Model Contracts</a> appeared first on <a href="https://herrinhealthlaw.com">Herrin Health Law, P.C.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity Risk in Health Care</title>
		<link>https://herrinhealthlaw.com/cybersecurity-risk-in-health-care/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cybersecurity-risk-in-health-care</link>
		
		<dc:creator><![CDATA[Barry Herrin]]></dc:creator>
		<pubDate>Sun, 08 Apr 2018 12:30:46 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data security]]></category>
		<category><![CDATA[Electronic Medical Record]]></category>
		<category><![CDATA[Insurance]]></category>
		<guid isPermaLink="false">http://hhl.healthwealthmarketing.com/?p=397</guid>

					<description><![CDATA[<p>Learn the current state of healthcare data privacyÂ and security, legal issues that need attention,Â risks of the growing use of remote technologies, health and wearable technology, and finally cybersecurity insurance as a way to mitigate the financial costs of breach.</p>
<p>The post <a href="https://herrinhealthlaw.com/cybersecurity-risk-in-health-care/">Cybersecurity Risk in Health Care</a> appeared first on <a href="https://herrinhealthlaw.com">Herrin Health Law, P.C.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong><em>As published in Health Law Developments, The Newsletter of the Health Law Section State Bar of Georgia</em></strong><br />
<a href="https://www.gabar.org/committeesprogramssections/sections/healthlaw/upload/Health_Law_Winter_18_NL.pdf"><strong><em>Winter 2018</em></strong></a></p>
<p><strong>Abstract</strong></p>
<p>The need for constant availability and integrity of patient data means that many organizations compromise on privacy and security, often to their detriment. This article discusses the current state of healthcare data privacy and security, examines the legal issues requiring attention, discusses risks of the growing use of remote technologies, health and wearable technology, and finally discusses cybersecurity insurance as a way to mitigate the financial costs of breach.</p>
<p><strong>The Current State</strong></p>
<p>Notwithstanding the imperative of the federal Health Insurance Portability and Accountability Act of 1996 (HIPAA) and its Privacy and Security Rule,<sup>3 </sup>the era of interoperability has created a de-emphasis on the confidentiality of medical information while, at the same time, creating a tremendous emphasis on integrity and availability.</p>
<p>Findings from the Health Care Industry Cybersecurity Task Force in its final report of June 2, 2017<sup>4</sup>show that, of the three aims of cybersecurity confidentiality, integrity, availability), availability is the most important. You cannot take care of patients without having availability of information. Having high availability of patient information is especially important with hospitals that operate 24&#215;7 and 365 days a year. Second to availability was integrity of data. The HCIC report specifically stated that integrity of data is important for protecting patient safety, which is directly implicated when it comes to connected medical devices and patients whose health can be directly impacted by the operation of the medical device. However, the report recognizes that the drive to interoperability has resulted in the confidentiality of medical information being de-prioritized and asserts that healthcare data confidentiality must remain top of mind.</p>
<p>A 2017 KLAS survey reports that 41 percent of respondents said their health systems dedicate less than three percent of the IT budget to cybersecurity, primarily because IT leadership has been focused on implementing electronic health record systems and dealing with interoperability challenges.<sup>5</sup></p>
<p>Task Force Imperative four calls for an increase [in] healthcare industry readiness through improved cybersecurity awareness and education. However, the increase in readiness requires a holistic cybersecurity strategy. Organizations that do not adopt a holistic strategy not only put their data, organizations, and reputation at risk, but also – most importantly – the welfare and safety of their patients.</p>
<p>In the healthcare industry specifically, the financial impact of cybersecurity breaches is grim. One in three Americans were affected by healthcare breaches in 2015, according to a report from Bitglass.<sup>6 </sup>That’s more than 113 million individuals. Each lost or stolen medical record costs a healthcare organization $363 per record on average, per a Ponemon Institute report.<sup>7 </sup>The anecdotal record is not any more pleasant: Hollywood Presbyterian’s information systems were held hostage in Feb. 2016 for $3.6 million in Bitcoin,<sup>8</sup> and more and more healthcare enterprises are creating reserves for data ransom. A 2016 IBM study quoted by <em>SC Media UK</em> showed that, in the United States, 70 percent of businesses receiving a ransomware demand paid to get their data back, with 50 percent of those paying more than $10,000 and a further 20 percent paying more than $40,000.<sup>9</sup></p>
<p>No matter the technology used in the healthcare industry today – e-signature software, EHR platforms, wearable devices, smartphones, tablets, or other software or hardware – providers can either work to mitigate risk or watch the organization spiral into potentially uncontrollable vulnerability. Today’s electronic environment leaves little room for laissez-faire security efforts if a healthcare provider wants to remain safe from attack and protected from the financial consequences of the inevitable.</p>
<p><strong>Why HIPAA Still Matters</strong></p>
<p>HIPAA in general, and the Security Rule in particular, imposes specific compliance burdens on healthcare covered entities. Any use or disclosure of electronic protected health information (ePHI) not in compliance with the Privacy and Security Rules or more stringent state law constitutes a violation of HIPAA.<sup>10</sup> The failure of a covered entity to implement sufficient security measures regarding the transmission of and storage of ePHI to reduce risks and vulnerabilities to a reasonable and appropriate level is also a violation.<sup>11</sup> Likewise, a failure to implement policies and procedures that govern the receipt and removal of hardware and electronic media that contain ePHI into and out of its facility, and the movement of these items within its facility, are violations.<sup>12</sup> And, once a security incident occurs, the failure to timely identify and respond to a known security incident, mitigate the harmful effects of the security incident, and document the security incident and its outcome are all violations.<sup>13</sup></p>
<p>At the time of writing, most of the Security Rule fines and penalties assessed by the US Department of Health and Human Services Office for Civil Rights (OCR) relate solely or primarily to either (1) theft of devices containing unsecured ePHI or (2) failure to conduct a security risk assessment that is discovered when another privacy or security breach is investigated. Examples of such traditional enforcement activity in recent times include the August 2015 announcement of a $750,000 settlement against Cancer Care Group, P.C. for the theft of an employee laptop containing ePHI on 55,000 individuals, the December 2013 announcement of a $150,000 settlement against Adult &amp; Pediatric Dermatology, P.C. for the theft of a thumb drive containing ePHI on 2,200 patients, and the announcement of settlements by Idaho State University and University of Washington Medicine for failure to conduct privacy and security risk assessments and failure to adequately adopt security measures. Were this still the level of involvement by OCR in ePHI enforcement, a shrug of the CIO’s shoulders and a promise to encrypt all ePHI data at rest would be the universal response.</p>
<p>However, in recent times the enforcement focus has shifted to more core system security functions and away from the low hanging fruit of lost or stolen data-carrying devices. For example, a $850,000 settlement paid by Lahey Clinic Hospital in 2015 specifically references the failure to assign a unique user name for identifying and tracking user identity with respect to a particular workstation,<sup>14</sup> failure to have a working audit trail capability with respect to workstation activity,<sup>15</sup> and the failure to restrict physical access to workstations generally to authorized personnel. A similar enforcement activity against South Broward Hospital District in February 2017 resulted in a $5,500,00 settlement payment based on improper access to ePHI by over a dozen individuals exposing in excess of 80,000 patient records and the failure of the covered entity to implement procedures to regularly review records of information system activity, such as audit logs, access reports, and security incident tracking reports<sup>16 </sup>and to implement policies and procedures that establish, document, review, and modify a user’s right of access to a workstation, transaction, program, or process.<sup>17 </sup>Several enforcement activities also resulted in settlements for failure to have business associate agreements in place with third-party vendors responsible for storing ePHI.<sup>18 </sup>Just as the environment for bad cyber behavior has matured, so has the OCR’s level of understanding of system and enterprise failures of the healthcare community.</p>
<p><strong>The Healthcare Internet of Things</strong></p>
<p>The task of HIPAA compliance and compliance with cybersecurity best practices is being made harder with the proliferation of Internet-connected services in the healthcare industry. As recently as 2012, a Ponemon Institute survey reported that 69 percent of respondents did not even address the security of US Food and Drug Administration (FDA) approved medical devices in their IT security or data protection activities.<sup>19 </sup>Since that time, over five billion devices – not including smartphones – have connected to the Internet, and that number is expected to grow to between 25 billion and 50 billion by 2025.<sup>20</sup></p>
<p>The healthcare industry has particular patient safety risks associated with these devices, as revealed in a 2012 US Government Accountability Office report on the lack of action by the FDA to expand its consideration of information security for medical devices.<sup>21 </sup>A November 2015 Wired.com survey listed the seven healthcare device types most vulnerable to hacking or other violation which included drug infusion pumps, Bluetooth-enabled defibrillators, blood refrigeration units, and CT scanners – the failure of any of which would create tremendous patient risk. We have grown far beyond the fear of hacking the vice president’s pacemaker.<sup>22</sup></p>
<p>The fact that smartphones are not included in this total is worrisome, as the growth in potential cyber risk due to smartphone use is even more troubling. 84 percent of health applications for smartphones that were approved by the FDA were found to create HIPAA violations and were hackable.<sup>23 </sup>Also worrisome is the continued increase in the use of smartphones to transmit and receive unsecured ePHI (primarily by text message) for patient treatment by healthcare professionals, in spite of HIPAA’s requirements and facility rules attempting to limit such activity.<sup>24 </sup>Most health care enterprises gave up the fight over bring your own device, or BYOD, rules due to provider pressure a long time ago anyway. Although study results vary, as of 2014 upward of 90 percent of healthcare organizations permit employees and clinicians to use their own mobile devices to connect to a<br />
provider’s network or enterprise systems.<sup>25</sup></p>
<p>One has to wonder what OCR’s response to all of this would be in light of the settlement agreements mentioned earlier: the decision not to impose device accountability for provider convenience may be fertile ground for future fines and penalties. And there is always the modern privacy paradox: health care consumers voluntarily share endless amounts of personal health information with applications on their smartphones, resulting in data being stored who knows where on the Internet without them thinking if it is convenient for them<sup>26</sup>; however, these same consumers continue to resist the same sharing activities by their own healthcare providers, even if such activity would result in faster and better health care.<sup>27</sup></p>
<p><strong>Cybersecurity Insurance</strong></p>
<p>In October of 2002, <em>The Economist</em> magazine opined<sup>28</sup> that total security was impossible and that insurance would be the way that businesses mitigated the financial risk caused by this lack of security. Since that time, both security defenses and security attacks have proliferated, changed, and become more aggressive and complex. However, the cybersecurity insurance market, though maturing, is not developing at as rapid a pace. Some issues that remain to be explored are due to the relative newness of the coverage and the lack of good predictive actuarial models.<sup>29</sup></p>
<p>While the market matures, there are various factors that potential insureds should evaluate closely as they shop for and price out cybersecurity insurance. The first and most important of these coverages should be the coverage of costs related to managing breaches, to include expenses related to the investigation, remediation efforts, and patient notification. Other costs that may also be incurred are credit monitoring services,<sup>30</sup> damages associated with identity theft, damages associated with recovery of data, damages incurred due to having to reset EHR systems, and damages to reconstruct or recover websites and other Internet presences. Business continuity expenses related to workarounds or loss of revenue due to a cybersecurity incident might also need coverage, especially as most commercial policies of this type are figuring out how to exclude cyber-related risks from their covered losses. Finally, but not least importantly, coverage for rogue employees and insider threats needs to be a part of the insurance package.</p>
<p>The type of coverage a healthcare enterprise can obtain, and the premiums therefor, may be affected by certain underwriting considerations, all of which should inform the enterprise’s compliance efforts:</p>
<ul>
<li>The enterprise should be able to show that it is in compliance with HIPAA, including those provisions that require security and privacy risk assessments and proof of a plan of mitigation and remediation. Insurers likely will not cover losses resulting from a gap in HIPAA compliance, especially because there is a legal obligation on the enterprise to find out what those are.</li>
<li>The potential insured needs to know what the insurer’s requirements are for encryption beyond those mandated by HIPAA. Some coverages require more secure and more robust email systems that are more resistant to phishing and spoofing, and even other coverages may require intentional phishing attacks by the insured’s IT department or vendors to gauge compliance with training.</li>
<li>The training requirements for new employee onboarding and access by non-employee contractors may need to meet certain criteria beyond HIPAA workforce awareness training.</li>
<li>Insurers may require that contractors providing business associate services be separately insured as a first layer of defense against cost.</li>
<li>The potential purchaser needs to be on the lookout for what is referred to in the industry as cannibalizing coverage, in which the costs of defense reduce the limits available to pay damages or judgments. The best coverage separates costs of defense from claims expenses.</li>
<li>The purchased coverage, as with certain types of malpractice insurance, should be based on the date of detection as opposed to date of intrusion. It is so difficult, even with the best system monitoring tools, to determine when a breach or incident actually first occurred, so the enterprise does not want to be locked into a technical dispute with the insurer about when the hack should have been detected.</li>
<li>The prospective insured needs to know whether offshore operations will be covered. Significant risks are associated with outsourcing certain data manipulation and management functions to countries or regions that have stronger privacy and data security rules than the United States. In particular, the European Union takes a dim view of American-style discovery and most likely will not permit the compelled return of data from an EU vendor in litigation pending in United States courts.</li>
</ul>
<p><strong>Conclusions</strong></p>
<p>The growth of connected devices, connected physicians, and connected patients will continue to push healthcare facilities to provide more interoperability for health data than ever before. These same technological pressures will make it easier for cybercriminals and disgruntled employees to compromise the data upon which everyone relies for reliable patient care, because an increase in interoperability in most cases creates an increase in gaps in security. Healthcare systems need to recognize this risk as a direct threat to patient care, and not just to its financial and technology resources. A holistic security approach, combining effective cybersecurity practices, HIPAA training and compliance, and appropriate insurance coverages will be the best way to address this growing area of opportunity and risk in the future.</p>
<p><em><a href="https://herrinhealthlaw.com/barry-herrin/">Barry S. Herrin</a>, JD, FAHIMA, FACHE, is the founder of <a href="https://herrinhealthlaw.com/">Herrin Health Law, P.C</a>., in Atlanta. Herrin offers more than 25 years of experience practicing law in the areas of healthcare and hospital law and policy, privacy law and health information management, among other healthcare-specific practice areas. He is a Fellow of the American College of Healthcare Executives and a Fellow of the American Health Information Management Association. He also holds a Certificate in Cyber Security from the Georgia Institute of Technology.</em></p>
<p><strong>Endnotes</strong></p>
<ol>
<li>Originally published in the September 2017 ISSA Journal, the monthly publication of the Information Systems Security  Association (ISSA)  Developing and Connecting Cybersecurity Leaders Globally  <a href="http://www.issa.org/?page=ISSAJournal">www.issa.org/?page=ISSAJournal</a>. Reprinted with permission.</li>
<li>Barry S. Herrin, JD, FAHIMA, FACHE, is the founder of Herrin Health Law P.C. in Atlanta, Georgia. Herrin has over 25 years of experience practicing law in the areas of healthcare and hospital law and policy, privacy law and health information management, among other healthcare-specific practice areas. He is both a Fellow of the American College of Healthcare Executives and a Fellow of the American Health Information Management Association and holds a Certificate in Cyber Security from the Georgia Institute of Technology. He may be reached at <a href="https://barry.herrin@herrinhealthlaw.com">https://barry.herrin@herrinhealthlaw.com</a>.</li>
<li>45 CFR Parts 160 and 164; the enabling legislation is found at 42 U.S.C. Section 1320a-7c.</li>
<li>Report on Improving Cybersecurity in the Health Care Industry, Health Care Industry Cybersecurity Task Force (June 2017) <a href="https://www.phe.gov/Preparedness/planning/CyberTF/Documents/report2017.pdf"> https://www.phe.gov/Preparedness/planning/CyberTF/Documents/report2017.pdf</a>.</li>
<li>Center for Connected Medicine report, The Internet of Medical Things: Harnessing IoMT for Value-Based Care, July 2017  <a href="https://www.connectedmed.com/files/assets/common/downloads/publication.pdf">https://www.connectedmed.com/files/assets/common/downloads/publication.pdf</a>.</li>
<li>Bitglass. Bitglass Healthcare Breach Report 2016, Bitglass  <a href="https://pages.bitglass.com/BR-Healthcare-Breach-Report-2016_PDF.html">https://pages.bitglass.com/BR-Healthcare-Breach-Report-2016_PDF.html</a>.</li>
<li>Larry Ponemon, Cost of Data Breaches Rising Globally, Says &#8216;2015 Cost of a Data Breach Study: Global Analysis,’  Security Intelligence, May 27, 2015 <a href="https://securityintelligence.com/costof-a-data-breach-2015"> https://securityintelligence.com/costof-a-data-breach-2015</a>.</li>
<li>Vincent Lanaria, Hackers Hold Hollywood Hospital’s Computer System Hostage, Demand $3.6 Million As Patients Transferred, Tech Times, 16 February 2016  <a href="http://www.techtimes.com/articles/133874/20160216/hackers-hold-hollywood-hospitals-computer-system-hostage-demand-3-6-million-as-patientstransferred.htm">http://www.techtimes.com/articles/133874/20160216/hackers-hold-hollywood-hospitals-computer-system-hostage-demand-3-6-million-as-patientstransferred.htm</a>. The hospital eventually paid $17,000 in Bitcoin.</li>
<li>Max Metzger, Your Money or Your Files: Why Do Ransomware Victims Pay Up? SC Magazine UK, May 25, 2017  <a href="https://www.scmagazineuk.com/your-money-or-your-files-why-do-ransomwarevictims-pay-up/article/664211/">https://www.scmagazineuk.com/your-money-or-your-files-why-do-ransomwarevictims-pay-up/article/664211/</a>.</li>
<li>45 C.F.R. §§ 160.103 and 164.502 (a). NOTE: CFR 45, Parts 160 and 164 can be found at US Electronic Code of Federal Regulations: Title 45 Public Welfare, Subchapter C Administrative Data Standards and Related Requirements: 160-164  <a href="https://www.ecfr.gov/cgi-bin/text-idx?SID=fbc57ba7be313c69e19aa1e78ac97adf&amp;mc=true&amp;tpl=/ecfrbrowse/Title45/45CsubchapC.tpl">https://www.ecfr.gov/cgi-bin/text-idx?SID=fbc57ba7be313c69e19aa1e78ac97adf&amp;mc=true&amp;tpl=/ecfrbrowse/Title45/45CsubchapC.tpl</a></li>
<li>45 C.F.R. §164.308(a)(1)(ii)(B)</li>
<li>45 C.F.R. § 164.310(d)(1)</li>
<li>45 C.F.R. § 164.308(a)(6)(ii)</li>
<li>45 C.F.R. § 164.312(a)(2)(i)</li>
<li>45 C.F.R. § 164.312(b)</li>
<li>45 C.F.R. §164.308(a)(l)(ii)(D)</li>
<li>45 C.F.R. § 164.308(a)(4)(ii)(C)</li>
<li>As examples, see the July 18, 2016 Resolution Agreement with Oregon Health &amp; Science University in which $2,7 million was paid and the September 23, 2016 Resolution Agreement with Care New England Health System in which $400,000 was paid.</li>
<li>John Glaser, The Risky Business of Information Security: With Growing Threats to Patient Privacy and Increasing Sanctions by Regulators, Make Data Security Central to Your Business, Hospitals &amp; Health Networks, August 12, 2014  <a href="http://www.hhnmag.com/articles/4064-the-risky-business-of-informationsecurity">http://www.hhnmag.com/articles/4064-the-risky-business-of-informationsecurity</a>.</li>
<li>The Florida Bar, 8th Annual FUNdamentals: The Legal Implications of the &#8216;Internet of Things’, Course 2232R (September 16, 2016)</li>
<li>GAO, Report to Congressional Requesters: Medical Devices: FDA Should Expand Its Consideration of Information Security for Certain Types of Devices, United States Government Accountability Office, August 2012  <a href="http://www.gao.gov/assets/650/647767.pdf">http://www.gao.gov/assets/650/647767.pdf</a>.</li>
<li>Lisa Vaas, Doctors Disabled Wireless in Dick Cheney’s Pacemaker to Thwart Hacking, Naked Security, Sophos, 22 Oct 2013 <a href="https://nakedsecurity.sophos.com/2013/10/22/doctors-disabled-wireless-indick-cheneys-pacemaker-to-thwart-hacking/">https://nakedsecurity.sophos.com/2013/10/22/doctors-disabled-wireless-indick-cheneys-pacemaker-to-thwart-hacking/</a>.</li>
<li>Ibid.</li>
<li>Ibid. (citing a 2015 University of Chicago survey finding that over 70 percent of its medical residents improperly sent ePHI by text messages).</li>
<li>John Glaser, The Risky Business of Information Security: With Growing Threats to Patient Privacy and Increasing Sanctions by Regulators, Make Data Security Central to Your Business, Hospitals &amp; Health Networks, August 12, 2014  <a href="http://www.hhnmag.com/articles/4064-the-risky-business-of-informationsecurity">http://www.hhnmag.com/articles/4064-the-risky-business-of-informationsecurity</a>.</li>
<li>Shannon Barnet, Millennials and Healthcare: 25 Things to Know, Becker’s Hospital Review, August 04, 2015  <a href="http://www.beckershospitalreview.com/hospital-management-administration/millennials-and-healthcare-25-things-to-know.html">http://www.beckershospitalreview.com/hospital-management-administration/millennials-and-healthcare-25-things-to-know.html</a>. 71 percent of Millennials surveyed by Harris would use a mobile app to share health care data with providers. See also Mintel, Sixty Percent of Millennials Willing to Share Personal Info with Brands, Mintel, March 7, 2014  http://www.mintel.com/press-centre/social-andlifestyle/millennials-share-personal-info, in which the study reports that 60% of Millennials would be willing to provide details about their personal preferences and habits to marketers, and, of those that would not initially provide such information, 30% would do so after receiving an incentive offer such as a discount off future purchases.</li>
<li>Denver Nicks, Survey: Millennials Care about Privacy (But Not So Much in Japan), Time, Nov. 07, 2013  <a href="http://techland.time.com/2013/11/07/survey-millennials-care-about-privacy-but-not-somuch-in-japan/">http://techland.time.com/2013/11/07/survey-millennials-care-about-privacy-but-not-somuch-in-japan/</a>. Only 4% of respondents would be comfortable with data being used for a purpose outside of its original context. The study also says that these preferences vary by economic status, with high-income worried more about data privacy than low-income people.</li>
<li>Putting It All Together, <em>The Economist</em> (October 24, 2002)</li>
<li>Koo, More Incident Data Needed for Cybersecurity Insurance, Bloomberg BNA (March 28, 2016)</li>
<li>Even though there is almost a universal recognition in the law enforcement and security communities that these programs do no good at all, as the sophisticated hacker knows to wait out the 1-2 years of service before making use of the stolen data.</li>
</ol>
<p>The post <a href="https://herrinhealthlaw.com/cybersecurity-risk-in-health-care/">Cybersecurity Risk in Health Care</a> appeared first on <a href="https://herrinhealthlaw.com">Herrin Health Law, P.C.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Respond to Federal Recoupment Initiatives by Improving Clinical Documentation</title>
		<link>https://herrinhealthlaw.com/federal-recoupment-clinical-documentation/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=federal-recoupment-clinical-documentation</link>
		
		<dc:creator><![CDATA[Barry Herrin]]></dc:creator>
		<pubDate>Sun, 08 Apr 2018 11:22:46 +0000</pubDate>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Insurance]]></category>
		<guid isPermaLink="false">https://herrinhealthlaw.com/?p=535</guid>

					<description><![CDATA[<p>The concept of â€œlow-hanging fruitâ€ is a motivational factor in Recovery Audit Contractor (RAC) audits. But just because you have a code doesnâ€™t mean itâ€™s covered. Not knowing the rules can land you in jail.</p>
<p>The post <a href="https://herrinhealthlaw.com/federal-recoupment-clinical-documentation/">Respond to Federal Recoupment Initiatives by Improving Clinical Documentation</a> appeared first on <a href="https://herrinhealthlaw.com">Herrin Health Law, P.C.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The concept of &#8216;low-hanging fruit&#8217; is a motivational factor in Recovery Audit Contractor (RAC) audits. The following diagnoses are some of the most common areas of recoupment activity:</p>
<ul>
<li>Renal and urinary tract disorders</li>
<li>Surgical cardiovascular procedures</li>
<li>Acute inpatient admissions for neurological disorders</li>
<li>Outpatient services billed as inpatient encounters.</li>
</ul>
<p>The application of overpayment recoupment provisions under the Patient Protection and Affordable Care Act as well as Medicare Conditions of Participation provisions were illustrated with specific examples seen in practices. Some reasons for queries include ineffective practices of resulting from having the practice&#8217;s utilization review department being absorbed into the case management function, creation of workarounds for physician satisfaction, submission of noncompliant (leading) queries, assumptive actions by coders, and misconceptions of providers.</p>
<p>It is important for CDI professionals to focus on revenue integrity, understanding that the outcome of such an approach may not be an increase in billing, but rather keeping more of what has been billed. Correct coding may mean lower initial reimbursement but more certainty in the revenue picture. To ensure success, revenue integrity initiatives can be initiated, such as creating teams of internal experts, which may include health information management (HIM), case management, nursing, medical staff, billing, and corporate compliance. The continuous training of staff is important and can include teaching physicians the basics of coding and teaching coders about clinical documentation processes. One way to provide this education is by having CDI professionals involved in reviewing health records for content on the floor during episodes of care. Coding is a HIM function, not a business office function. Some postulates that can be beneficial to follow include: just because you have a code doesn&#8217;t mean it&#8217;s covered, just because you&#8217;ve been paid once doesn&#8217;t mean you&#8217;ll get paid again, and not knowing the rules can land you in jail.</p>
<p><b><i>Proceedings of AHIMA&#8217;s 2017 Summit on Clinical Documentation Improvement: Advancing the Documentation Journey</i></b></p>
<p>The excerpt above describes Barry Herrin&#8217;s presentation during the American Health Information Management Association&#8217;s annual clinical documentation improvement (CDI) summit July 31 to Aug. 1, 2017.</p>
<p><em><a href="https://herrinhealthlaw.com/barry-herrin/">Barry S. Herrin</a>, JD, FAHIMA, FACHE, is the founder of <a href="https://herrinhealthlaw.com/">Herrin Health Law, P.C</a>., in Atlanta. Herrin offers more than 25 years of experience practicing law in the areas of healthcare and hospital law and policy, privacy law and health information management, among other healthcare-specific practice areas. He is a Fellow of the American College of Healthcare Executives and a Fellow of the American Health Information Management Association. He also holds a Certificate in Cyber Security from the Georgia Institute of Technology.</em></p>
<p>The post <a href="https://herrinhealthlaw.com/federal-recoupment-clinical-documentation/">Respond to Federal Recoupment Initiatives by Improving Clinical Documentation</a> appeared first on <a href="https://herrinhealthlaw.com">Herrin Health Law, P.C.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
