Introducing Our New Service: Exclusion Screening for Healthcare Compliance

exclusion screening for healthcare

As healthcare providers navigate the complex web of rules and regulations in compliance, one aspect that needs more attention is exclusion screening of those working with federally funded healthcare programs. We’re excited to announce the launch of our new service, Exclusion Screening, that will assist healthcare organizations in adherence to requirements such as the initial […]

Securing Healthcare: The Crucial Role of Cyber Insurance

cyber insurance

Safeguarding patient data is paramount amidst the looming danger of cyber threats. The necessity of cyber insurance has never been clearer, as its presence or absence can significantly impact the resilience of healthcare providers. Let’s explore the benefits of cyber insurance, the risks faced by those without it, and the effects it has on those […]

It’s Your Call – April 2024

HIPAA: As a small provider practice, can we afford cyber insurance? Investing in cyber insurance is crucial for small provider practices facing the growing threat of cyberattacks. While the cost may vary depending on factors like coverage level and practice size, the expense of cyber insurance is often far outweighed by the potential financial losses […]

Understanding the Role of a HIPAA Compliance Officer

Healthcare regulations are continuously changing making the role of a HIPAA Compliance Officer paramount. This individual serves as the guardian of patient data privacy and ensures that healthcare organizations adhere to the guidelines set forth by HIPAA. Their duties are diverse, ranging from program implementation to educational outreach, and their traits are crucial for effective […]

It’s Your Call – March 2024

OSHA/Infection Control: What is the appropriate cleaning method for heavy duty utility gloves? It is best to follow the manufacturer’s instructions for use because the methods vary.  Here are some variations that you may find: Autoclavable up to 5 times Not autoclavable. Wash with mild soap and water. Hang to dry.   HIPAA: We are […]

It’s Your Call – February 2024

sanctions policies and OSHA COVID requirements

OSHA: We have an employee out with COVID-19. What is the current timeline for healthcare workers to return to work? The CDC guidance says that employees experiencing a mild to moderate case of COVID-19 who are not moderately to severely immunocompromised may return to work after 7 days have passed since symptoms first occurred (day […]

The Importance of Fair and Consistent Employee Sanctions

Importance of Fair & Consistent Employee Sanctions

In any organization, maintaining a harmonious work environment is pivotal to productivity and morale. However, navigating employee misconduct can be a challenging tightrope walk. When infractions occur, the response must be calibrated, fair, and reflective of the severity of the behavior while also considering the employee’s history, intent, and circumstances. Fair sanctions for employee misconduct […]

It’s Your Call – January 2024

HIPAA: What happens if we employ an individual who is found to be on an exclusion list? If you employ an individual who has been sanctioned or excluded by the Office of Inspector General (OIG) from participating in federal health care programs, and that individual provides reimbursable items or services under such programs, you may […]

Understanding Sanction Screening: Safeguarding Healthcare Integrity Under HIPAA

sanction screening

In the intricate landscape of healthcare, compliance with regulations isn’t just a choice but a necessity. HIPAA stands as a beacon of privacy and security standards within the industry. Among its many components, one crucial element often overlooked yet central is sanction screening. What is Sanction Screening? Sanction screening involves the meticulous examination of individuals […]

It’s Your Call – December 2023

HIPAA: What are prevalent healthcare scams during the holiday season? Email Phishing: Perpetrators adopt the personas of festive figures or reputable entities (e.g., charities) to entice recipients into clicking malicious links in emails. This tactic compromises personal data, including login credentials and credit card details. It is advised to verify authenticity by contacting the sender […]