Beware: You might have to pay to access your own patient files.
Your PHI is being held hostage. What should you do? While this scenario sounds like something straight out of a new computer game, it’s all too real for one medical center. Now’s the time to plan how you would respond to a similar attack.
Background: On Feb. 17, Hollywood Presbyterian Medical Center announced that it paid 40 Bitcoins (equivalent to $17,000) to hackers that deployed malware into the hospital’s computer systems, locking access and preventing the hospital from sharing electronic communications. Although the...
To read the full article, sign in and subscribe to tci Medicare Compliance & Reimbursement.
Keep pace with evolving Medicare regulations — and onboard your team — with timely analysis of critical updates interpreted in an easy-to-follow, easy-to-apply format. Your subscription to TCI's Medicare Compliance & Reimbursement Alert will equip you to navigate code and guideline changes, CCI edits, and revisions to modifiers, payer policies, the fee schedule, OIG target areas, and more.
Current newsletters added each month
Fully searchable archives - over 4200 articles
ALL years/issues back to 2003 organized by year and issue
Codes mentioned in articles are linked to Code Information pages
Code Information pages link back to related articles
Access to this feature is available in the following products: