tci Medicare Compliance & Reimbursement - 2007 Issue 27

HIPAA: Experts Reveal How To Keep Security-Rule Violations At Bay

5 easy ways you can batten down your workstations' hatches.Even the most advanced internal security controls won't mean a thing if you haven't secured your organization's computers from external threats. Here's help you can put to good use now to keep your workstations--and your patients' protected health information (PHI)--out of the wrong hands. 1. Lock Up Your Hardware The simplest way to ensure no one tampers with your organization's computers is also the easiest: "Close your doors and lock them" when you are at work and when you step away from your computer, recommends Rick Ensenbach, senior security...

To read the full article, sign in and subscribe to tci Medicare Compliance & Reimbursement.


Keep pace with evolving Medicare regulations — and onboard your team — with timely analysis of critical updates interpreted in an easy-to-follow, easy-to-apply format. Your subscription to TCI's Medicare Compliance & Reimbursement Alert will equip you to navigate code and guideline changes, CCI edits, and revisions to modifiers, payer policies, the fee schedule, OIG target areas, and more.

  • Current newsletters added each month
  • Fully searchable archives - over 4200 articles
  • ALL years/issues back to 2003 organized by year and issue
  • Codes mentioned in articles are linked to Code Information pages
  • Code Information pages link back to related articles
Access to this feature is available in the following products:
  • tci Medicare Compliance & Reimbursement +Archives

demo
request yours today
subscribe
start today
newsletter
free subscription

Thank you for choosing Find-A-Code, please Sign In to remove ads.