Neurology & Pain Management Coding Alert

Compliance Checkpoint:

Add This Checklist to Your HIPAA Toolkit to Boost

Watching details helps you watch your leak-prone spots The scenario: A patient in your financial planner's office gets too good a look at the planner's computer screen, which includes other patients- information. How do you prevent future leaks like this? The resolution: You can take a step in the right direction by conducting a walk-through of your office. Use this checklist created by Patricia Johnston, a consultant with Texas Health Resources in Arlington, to help you catch HIPAA violations and track problem areas. For each item listed, check whether you observed the activity, the number of occurrences, and any pertinent comments. - Staff discusses confidential information in public areas. - Conversations with patient or family regarding confidential information are held in public areas. - Overhead and intercom announcements include confidential information. - Phone conversations and dictation are in areas where confidential information can be overheard. - Visitors in public areas can see computer monitors. - Unattended computers are not logged out or protected with password-enabled screen savers. - Computer passwords are shared or posted for unauthorized access. - Documents, films and other media with confidential patient information are not concealed from pubic view. - Whiteboards in public areas have more than the allowable information. - Medical records are not stored or filed in such a way as to avoid observation by passersby. - Confidential patient information is called out in the reception area. - Confidential information is left on unattended fax machines, printers and/or copiers in unsecured areas. - Confidential information is found in trash, recycle bins or unsecured pre-shredding receptacles. - Patient lists, such as scheduled procedures, are readily visible by patients or visitors. - Contractors, vendors and other nonprofit visitor third parties are not appropriately identified. - Staff are not wearing name badges. - Patient records not filed in locking storage cabinets or rooms that are locked when unattended. - Security access mechanisms for buildings are bypassed. - When questioned, staff demonstrates lack of privacy awareness. Next step: If you uncover any of these issues, train your staff on weak spots and take immediate action to correct any problems.
You’ve reached your limit of free articles. Already a subscriber? Log in.
Not a subscriber? Subscribe today to continue reading this article. Plus, you’ll get:
  • Simple explanations of current healthcare regulations and payer programs
  • Real-world reporting scenarios solved by our expert coders
  • Industry news, such as MAC and RAC activities, the OIG Work Plan, and CERT reports
  • Instant access to every article ever published in your eNewsletter
  • 6 annual AAPC-approved CEUs*
  • The latest updates for CPT®, ICD-10-CM, HCPCS Level II, NCCI edits, modifiers, compliance, technology, practice management, and more
*CEUs available with select eNewsletters.

Other Articles in this issue of

Neurology & Pain Management Coding Alert

View All