HEALTHCARE BUSINESS MONTHLY December 2015 Coding | Billing | Auditing | Compliance | Practice Management

Total Page:16

File Type:pdf, Size:1020Kb

HEALTHCARE BUSINESS MONTHLY December 2015 Coding | Billing | Auditing | Compliance | Practice Management HEALTHCARE BUSINESS MONTHLY December 2015 www.aapc.com Coding | Billing | Auditing | Compliance | Practice Management Let Blood Transfusion Payment Flow: 25 Keep revenue roads clear of denial roadblocks Watch Out for Identity Thieves: 42 Protect patients from losing their medical identities Note Medical Scribes: 50 Qualified scribes can streamline processes DME, Dental, Drugs, Supplies, and Quality Retail $99.95 Member $59.95 AAPC - CodeBooks ORDER YOUR BOOK TODAY! 800-626-2633 Advancing the Business of Healthcare www.aapc.com/medical-coding-books Healthcare Business Monthly | December 2015 COVER | Coding/Billing | 29 Sneak a Peek at 2016 CPT® Changes G.J. Verhovshek, MA, CPC, and Raemarie Jimenez, CPC, CPB, CPMA, CPPM, CPC-I, CANPC, CRHC [contents] ■ Coding/Billing ■ Auditing/Compliance ■ Practice Management 40 Make the Most of HCCs 42 Nobody Is Immune 50 The Medical Scribe: Colleen Gianatasio, CPC, CPC-P, CPMA, CPC-I to Medical Identity Theft A Hot Commodity Jonnie Massey, CPC, CPC-P, CPC-I, Renee Dustman CPMA, AHFI [continued on next page] www.aapc.com December 2015 3 Healthcare Business Monthly | December 2015 | contents 12 ■ Code of Ethics ■ Facility 10 Ethics Update Strengthens 25 Blood Transfusions: Document AAPC Membership Properly for ICD-10-PCS AAPC Ethics Committee Diana H. Williams, BS, CPC, CCS-P, CCS, CPMA ■ AAPC Chapter ■ Added Edge Association 36 Distance Learning: 12 Make Your Chapter a Success Choose Wisely Faith C.M. McNicholas, RHIT, CPC, CPCD, Dawn Moreno, PhD, CPC, CBCS, CMAA, PCS, CDC MTC, CPL, CLT ■ 22 ■ Added Edge Auditing/Compliance 14 How a Credential Is Born 44 Handling PHI Glenda Hamilton, CPC, COC, CPMA, CEMC, Disclosure for Genealogists CPC-P Joseph de Beauchamp, PhD ■ Coding/Billing ■ Practice Management 16 Medicare Primary Care 47 Boost Your Immune Center Exception Update System with Office Yoga Maryann C. Palmeter, CPC, CENTC, CPCO Bridget Toomey, CPC, CPB, CRCR, RYT-200 20 Claim All Your Pennies for 54 Onboarding Employees Discontinued Procedures in a Small Office Ellen M. Wood, CPC, CMPE 54 Sarah W. Sebikari, MHA, CPC 22 Specimen Validity Testing ■ Member Feature Frank Mesaros, MPA, MT (ASCP), CPC 56 Military Members: Trained for Success 26 Coding that Brings You to Your Knees Michelle A. Dick Ken Camilleis, CPC, CPC-I, COSC, CMRS, CCS-P COMING UP: • 2015 Salary Survey • 2016 OPPS DEPARTMENTS EDUCATION • OIG Work Plan 7 Letter from CEO 60 Newly Credentialed Members • Pediatric Vaccination 8 Letters to the Editor • 36415 Venipuncture 9 Healthcare Business News Online Test Yourself – Earn 1 CEU 10 Code of Ethics On the Cover: John Verhovshek, MA, CPC, and Raemarie Jimenez, www.aapc.com/resources/publications/ CPC, CPB, CPMA, CPPM, CPC-I, CANPC, CRHC, give you a sneak peek into 66 I Am AAPC healthcare-business-monthly/archive.aspx what changes are in store for CPT® 2016. Cover design by Kamal Sarkar. 4 Healthcare Business Monthly ZHealth Publishing, LLC C M www.zhealthpublishing.com Y CM MY CY CMY K Serving 153,000 Members – Including You! Go Green! HEALTHCARE Why should you sign up to receive Healthcare Business Monthly in digital format? BUSINESS MONTHLY Coding | Billing | Auditing | Compliance | Practice Management Here are some great reasons: December 2015 • You will save a few trees. • You won’t have to wait for issues to come in the mail. Director of Publishing Brad Ericson, MPC, CPC, COSC • You can read Healthcare Business Monthly on your computer, tablet, or [email protected] other mobile device—anywhere, anytime. • You will always know where your issues are. Managing Editor John Verhovshek, MA, CPC • Digital issues take up a lot less room in your home or office than paper [email protected] issues. Go into your Profile on www.aapc.com and make the change! Editorial Michelle A. Dick, BS Renee Dustman, BS HealthcareBusinessOffice, LLC ...........................................39 Designer www.HealthcareBusinessOffice.com Mahfooz Alam Optum360TM A leading health services business ................67 Kamal Sarkar www.optumcoding.com Advertising Jon Valderama Supercoder, LLC ................................................................... 8 www.SuperCoder.com Address all inquires, contributions, and change of address notices to: ZHealth Publishing, LLC ...................................................... 5 Healthcare Business Monthly PO Box 704004 www.zhealthpublishing.com Salt Lake City, UT 84170 (800) 626-2633 vendor index vendor ©2015 Healthcare Business Monthly. All rights reserved. Reproduction in whole or in part, in any form, without written permission from AAPC® is prohibited. Contributions are welcome. Healthcare Business Monthly is a publication for members of AAPC. Statements of fact or opinion are the responsibility of the authors alone and do not represent an opinion of AAPC, or sponsoring organizations. CPT® copyright 2015 American Medical Association. All rights reserved. Fee schedules, relative value units, conversion factors and/or related components are not as- signed by the AMA, are not part of CPT®, and the AMA is not recommending their use. The AMA is not recommending their use. The AMA does not directly or indirectly practice medi- cine or dispense medical services. The AMA assumes no liability for data contained or not contained herein. The responsibility for the content of any “National Correct Coding Policy” included in this product is with the Centers for Medicare and Medicaid Services and no endorsement by the AMA is intended or should be implied. The AMA disclaims responsibility for any consequenc- es or liability attributable to or related to any use, nonuse or interpretation of information con- Ask the Legal Advisory Board tained in this product. CPT® is a registered trademark of the American Medical Association. From HIPAA’s Privacy Rule and anti-kickback statute, to compliant coding, to fraud and abuse, there are a lot of legal ramifications to working in healthcare. You almost CPC®, COCTM, CPC-P®, CPCOTM, CPMA®, and CIRCC® are registered trademarks of AAPC. need a lawyer on call 24/7 just to help you make sense of all the new guidelines. As luck would have it, you do! AAPC’s Legal Advisory Board (LAB) is ready, willing, and Volume 2 Number 12 December 1, 2015 able to answer your legal questions. Simply send your health law questions to LAB@ Healthcare Business Monthly (ISSN: 23327499) is published monthly by AAPC, 2233 South Presidents aapc.com and let the legal professionals hash out the answers. Select Q&As will be Drive, Suites F-C, Salt Lake City UT 84120-7240, for its paid members. Periodicals Postage Paid at Salt Lake City UT and at additional mailing office. POSTMASTER: Send address changes to: published in Healthcare Business Monthly. Healthcare Business Monthly c/o AAPC, 2233 South Presidents Drive, Suites F-C, Salt Lake City UT 84120-7240. 6 Healthcare Business Monthly Letter from CEO Work Worth Doing s I reflect on the past year, I am remind- Certified Inpatient Coder (CIC™) and Certi- A ed of something Theodore Roosevelt said: fied Risk Coder (CRC™) credentials and cur- “Far and away the best prize that life has to of- riculum. New online education modules help fer is the chance to work hard at work worth members of all disciplines. Look for more doing.” Events outside AAPC and your re- training and credential opportunities in 2016 quests provided many challenges and oppor- to keep current with the business of health- tunities we resolved to address. Our drive to care. serve members prompted several accomplish- Improved, Less Expensive Codebooks – ments this year, and I’m grateful to be part of AAPC responded quickly to member feed- an organization that achieved the following: back surrounding our AAPC codebooks. We 150,000th Member – We welcomed Ele- made a number of adjustments that will make na Kuklina, PhD, as our 150,000th mem- the books easier to use as coding and educa- ber this year. The Centers for Disease Control tion tools. The low priced books continue to and Prevention (CDC) health scientist and help practicing coders and students. Emory University adjunct professor joined HEALTHCON – We had record-breaking AAPC to seek training and certifications that attendance at AAPC national conference this would help her in her obstetrics and gynecol- year. We hope you enjoyed all of the new ogy research. tracks and sessions we added to better meet ICD-10 Implementation –AAPC members your needs. AAPC members and and staff were instrumental in making this AAPC continues to augment its impact as we year’s long-awaited ICD-10 implementation serve members through meaningful certifi- staff were instrumental go smoothly. AAPC members served as ed- cation, education, and service. We have com- ucators, coordinators, and leaders in the in- pleted a great deal but have a lot more hard in making this year’s dustry as the country transitioned from ICD- work worth doing. AAPC will continue to 9 to the new diagnosis code set. AAPC will serve members through meaningful certifica- long-awaited ICD-10 continue to support you with advanced train- tion, education, and service. — and that’s our ing opportunities, based on what you’ve told prize as we find ways to better serve you and implementation go us you want to learn about this new code set the organizations for which you work. and its use. Here’s to a successful 2016! smoothly. Code of Ethics – The National Advisory Board’s Ethics Committee released an updat- ed Code of Ethics to better respond to mem- Sincerely, bers’ changing work environments. Simpli- fied and meaningful, the Code of Ethics holds members to the highest standard. Adherence to these ethical standards instills public con- fidence in the integrity and professionalism of AAPC members. More Customer Service Staff – To help serve Jason J. VandenAkker you better and reduce wait times, we more CEO than doubled AAPC’s Service Center staff since the beginning of the year. We also added Online Chat as another way for you to reach an AAPC customer service professional.
Recommended publications
  • Saving the Electronic Person from Digital Assault: the Case for More Robust Protections Over Our Electronic Medical Records
    Duquesne Law Review Volume 58 Number 1 Artificial Intelligence: Thinking About Article 8 Law, Law Practice, and Legal Education 2020 Saving the Electronic Person from Digital Assault: The Case for More Robust Protections over Our Electronic Medical Records Danielle M. Mrdjenovich Follow this and additional works at: https://dsc.duq.edu/dlr Part of the Medical Jurisprudence Commons, Privacy Law Commons, and the Science and Technology Law Commons Recommended Citation Danielle M. Mrdjenovich, Saving the Electronic Person from Digital Assault: The Case for More Robust Protections over Our Electronic Medical Records, 58 Duq. L. Rev. 146 (2020). Available at: https://dsc.duq.edu/dlr/vol58/iss1/8 This Student Article is brought to you for free and open access by Duquesne Scholarship Collection. It has been accepted for inclusion in Duquesne Law Review by an authorized editor of Duquesne Scholarship Collection. Saving the Electronic Person from Digital Assault: The Case for More Robust Protections over Our Electronic Medical Records Danielle M. Mrdjenovich* 1. IN TRODU CTION .............................................................. 147 II. B A CK GROU N D ................................................................ 148 A . HIP A A ................................................................ 148 B . H ITECH A ct ...................................................... 150 C. Current Limitations to HIPAA and the HITECHAct ......................................... 151 D. Recent Cyberattacks at Large Hospitals in the United States .........................
    [Show full text]
  • Addressing the HIPAA-Potamus Sized Gap in Wearable Technology Regulation Note
    University of Minnesota Law School Scholarship Repository Minnesota Law Review 2019 Addressing the HIPAA-Potamus Sized Gap in Wearable Technology Regulation Note Paige Papandrea Follow this and additional works at: https://scholarship.law.umn.edu/mlr Part of the Law Commons Recommended Citation Papandrea, Paige, "Addressing the HIPAA-Potamus Sized Gap in Wearable Technology Regulation Note" (2019). Minnesota Law Review. 3246. https://scholarship.law.umn.edu/mlr/3246 This Article is brought to you for free and open access by the University of Minnesota Law School. It has been accepted for inclusion in Minnesota Law Review collection by an authorized administrator of the Scholarship Repository. For more information, please contact [email protected]. Note Addressing the HIPAA-potamus Sized Gap in Wearable Technology Regulation Paige Papandrea INTRODUCTION You wake up at 7:00 AM, half an hour late. You rush to get ready, first throwing on your Apple Watch1 and then showering. Your watch records your heart rate at 112 beats per minute and counts exactly seventeen steps from your bedroom to your bath- room. You run to catch the bus at 7:30 AM—your watch tracks your location as you run exactly 0.3 miles to the bus stop. Your heart rate is 155 beats per minute, you ran exactly 600 steps to get there, and burned around twenty-two calories, all tracked by your watch. You sit down, also recorded on your watch. You ar- rive at work at 8:00 AM, sprint up the three flights of stairs, and quickly sit at your desk. Your watch measures your heart rate at 169 beats per minute, updates how many flights of stairs you J.D.
    [Show full text]
  • Internet Security in Companies!
    !! SIFA Vänersborg, Sweden 2015 INTERNET SECURITY IN COMPANIES! Nowadays, many companies have suffered from cyber attacks, that’s why it is important for them to properly secure their data and protect their employees and customers information. ! Useful Words! Introduction & general overview! Malicious Code: Program which causes Introduction & general overview! Internet safety nowadays has become internal damage to a computer network.! Consumer information, employee a serious and sometimes dangerous ! records, proprietary and trade secret issue for the users and the Spear Phishing: Spear phishing is an information, and intellectual property are companies.Internet security is all about email that appears to be from an all available for the taking if trust at a distance. That is because you individual or business that you know but infrastructures are not properly protected are dealing with everyone remotely and it isn’t.! and contingency plans developed should not able to confirm identity or ! a breach occur. While many businesses authenticity in the traditional sense. WPA: The name for a number of standards may understand the potential threat they Even with secure connections, to use encryption on a Wireless LAN.! are often not prepared to deal with an encryption, and the various other ! incident, or they naively believe it will Cyber Attack: Cyber-attack is any type of authentication schemes there is always never happen to them.It is not simply a a way to spoof identity, provide forged offensive maneuver employed by individuals or whole organizations that technical issue and can impact documents or credentials, hold targets computer information systems, customers, employees business computers and servers hostage to infrastructures, computer networks, and/or associates and the public perception of “ransomware” or allow cyber-criminals to be whoever they want to be.
    [Show full text]
  • Strengthening Protection of Patient Medical Data
    REPORT SURVEILLANCE & PRIVACY Strengthening Protection of Patient Medical Data JANUARY 10, 2017 — ADAM TANNER This report is supported in part by a grant from the Open Society Foundations. PAGE 1 Americans seeking medical care expect a certain level of privacy. Indeed, the need for patient privacy is a principle dating back to antiquity, and is codified in U.S. law, most notably the Privacy Rule of the 1996 Health Insurance Portability and Accountability Act (HIPAA), which establishes standards that work toward protecting patient health information. But the world of information is rapidly changing, and in this environment, U.S. rules fall precariously short in protecting our medical data. What many patients do not know is that, today, much of their health information is routinely sold and traded—in anonymized form—to third parties in for-profit commerce unrelated to their specific treatment. After a person gets medical care, pharmacies, insurers, labs, electronic record systems, and the middlemen connecting all these entities automatically transmit patient data directly to what is, in effect, a big health data bazaar. This trade—which has nothing to do with the individual’s treatment or insurance processing—is allowed by HIPAA privacy rules only if the patient’s name is removed. The result is a blizzard of transactions hidden to the public in which companies—called data miners— buy, sell, and barter anonymized but intimate profiles of hundreds of millions of Americans. Such secondary use of patient data can have good intentions. For example, massive anonymized patient databases can help pharmaceutical companies develop and market effective drugs and treatments.
    [Show full text]
  • Apiw / Privacy Panel =
    EVERYONE’S NIGHTMARE PRIVACY AND DATA BREACH RISKS MAY 2014 EDITION This edition is updated as of May 2014. To obtain a copy of this edition by email or to be placed on the mailing list for future editions, please email [email protected]. To learn more about our firm, or our Privacy and Data Protection Practice, please visit edwardswildman.com. BOSTON ♦ CHICAGO ♦ HARTFORD ♦ HONG KONG ♦ ISTANBUL ♦ LONDON ♦ LOS ANGELES ♦ MIAMI ♦ MORRISTOWN NEW YORK ♦ ORANGE COUNTY ♦ PROVIDENCE ♦ STAMFORD ♦ TOKYO ♦ WASHINGTON DC ♦ WEST PALM BEACH This white paper is for guidance only and is not intended to be a substitute for specific legal advice. If you would like further information, please contact the Edwards Wildman Palmer LLP lawyer responsible for your matters. This white paper is published by Edwards Wildman Palmer for the benefit of clients, friends and fellow professionals on matters of interest. The information contained herein is not to be construed as legal advice or opinion. We provide such advice or opinion only after being engaged to do so with respect to particular facts and circumstances. The firm is not authorized under the UK Financial Services and Markets Act 2000 to offer UK investment services to clients. In certain circumstances, as members of the Law Society of England and Wales, we are able to provide these investment services if they are an incidental part of the professional services we have been engaged to provide. Please note that your contact details, which may have been used to provide this bulletin to you, will be used for communications with you only.
    [Show full text]
  • Exploring the Vulnerabilities of Electronic Medical Records
    From spam to medical identity theft: Exploring the vulnerabilities of Electronic Medical Records Anzu Hakone Mentor: Ming Chow December 15th 2015 Abstract As more healthcare institutions utilize electronic medical record software (EMR) to store patient records, the number of healthcare data breaches is also on the rise. In addition to the obvious threat to privacy, there are malicious ramifications to medical information cyber attacks, with medical records valued higher on the black market than credit card or Social Security Numbers (SSN). The stolen records can be used for spamming, identify fraud, prescription and service theft, billing fraud, and in its worst case, lead to death. While electronic medical record software companies need to improve their system security, the users of the software are also at fault as this vulnerability is exacerbated by the lack of training and awareness from both the hospital employees and patients. This paper will explore the causes and ramifications of healthcare information breaches as well as suggest some possible defense tactics to prevent medical information cyber attacks. 1. Introduction Every year, more healthcare providers are switching over to electronic medical records (EMR), also known as electronic health records (EHR), for managing patient data. EMRs serve as fast, compact methods of storing and transferring patient information as well as provide improved diagnoses using machine learning algorithms from the collected medical big data. In 2009, as part of the Health Information Technology for Economic and Clinical Health (HITECH) Act, the federal government even began offering monetary incentive for healthcare providers to convert to EMRs [4]. Despite the many advantages, the high value of medical information on the black market and the increase in EMR use has attracted information crackers to gain illegal access to EMRs.
    [Show full text]
  • Cyber Operational Risk Scenarios for Insurance Companies R. Egan*, S. Cartagena, R. Mohamed, V. Gosrani, J. Grewal, M. Acharyya, A
    British Actuarial Journal, Vol. 24, e6, page 1 of 34. © Institute and Faculty of Actuaries 2019. This is an Open Access article, distributed under the terms of the Creative Commons Attribution licence (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted re-use, distribution, and reproduction in any medium, provided the original work is properly cited. doi:10.1017/S1357321718000284 Cyber operational risk scenarios for insurance companies R. Egan*, S. Cartagena, R. Mohamed, V. Gosrani, J. Grewal, M. Acharyya, A. Dee, R. Bajaj, V.-J. Jaeger, D. Katz, P. Meghen, M. Silley, S. Nasser-Probert, J. Pikinska, R. Rubin and K. Ang [Presented to the Institute & Faculty of Actuaries, Institute and Faculty of Actuaries’ Cyber Risk Investigation Working Party, London, UK: October 2017] Abstract Cyber Operational Risk: Cyber risk is routinely cited as one of the most important sources of operational risks facing organisations today, in various publications and surveys. Further, in recent years, cyber risk has entered the public conscience through highly publicised events involving affected UK organisations such as TalkTalk, Morrisons and the NHS. Regulators and legislators are increasing their focus on this topic, with General Data Protection Regulation (“GDPR”) a notable example of this. Risk actuaries and other risk management professionals at insurance companies therefore need to have a robust assessment of the potential losses stemming from cyber risk that their organisations may face. They should be able to do this as part of an overall risk management framework and be able to demonstrate this to stakeholders such as regulators and shareholders. Given that cyber risks are still very much new territory for insurers and there is no commonly accepted practice, this paper describes a proposed framework in which to perform such an assess- ment.
    [Show full text]
  • St-(Eal)-Health
    ST-(EAL)-HEALTH ~Fortifying Big Data ​ Big Data In Healthcare The Healthcare system has evolved once with technology, trying to improve the quality of living and save human lives. Big data is nowadays one of the most important domains of future technology and has gained the attention of the healthcare system. Big Data refers to the abundant health data amassed from numerous sources including Electronic Health Records (EHRs), medical imaging, genomic sequencing, payor records, pharmaceutical research, wearables, and medical devices, to name a few. With its diversity in format, type, and context, it is difficult to merge big healthcare data into conventional databases, making it enormously challenging to process, and hard for industry leaders to harness its significant promise to transform the industry. We live in an age where data is used to drive business decisions. Every company has access to massive amounts of data about their customers, but successful businesses are able to turn that data into actionable intelligence to develop better and more optimized business processes. The healthcare industry is no different. In fact, the growth rate of healthcare data is projected to be greater than that of the total global data set. At 153 exabytes back in 2013, the healthcare industry is expected to generate 2,314 exabytes of data by 2020, a 48% annual growth rate. Now Big Data has both pros and cons which are as follows: Pros ❖ Consistency of Care is perhaps the easiest use of patient information, allowing different doctors, nurses, and other staff to view patient histories to ensure they are delivering consistent care, or are able to modify treatment to generate more positive outcomes if initial treatment plans aren’t having the desired effect.
    [Show full text]
  • Amended Complaint
    Case: 3:16-cv-01938-JJH Doc #: 21 Filed: 09/06/16 1 of 40. PageID #: 228 UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF OHIO WESTERN DIVISION LINDSEY WILLIAMS-DIGGINS, individually and on behalf of all others Case No.: 3:16-cv-1938 similarly situated, Plaintiff, v. JURY DEMAND MERCY HEALTH, an Ohio non-profit Hon. Jeffrey J. Helmick corporation, Defendant. FIRST AMENDED CLASS ACTION COMPLAINT Plaintiff Lindsey Williams-Diggins brings this First Amended Class Action Complaint (“Complaint”) against Defendant Mercy Health (“Mercy” or “Defendant”) to obtain relief from Defendant’s failure to protect patients’ private medical information with promised data security. Plaintiff alleges as follows upon personal knowledge as to himself and his own acts and experiences, and upon information and belief, including investigation conducted by his attorneys, as to all other matters. Case: 3:16-cv-01938-JJH Doc #: 21 Filed: 09/06/16 2 of 40. PageID #: 229 NATURE OF ACTION 1. Defendant Mercy is the largest health system in the State of Ohio, with 23 hospitals, dozens of smaller facilities, and over 1,000 physicians located through the state. In 2015 alone, Mercy generated over $4 billion in revenue. As a part of its services, Mercy creates, operates, and maintains websites where employees and patients can access patients’ medical data online. 2. Unfortunately, Defendant failed to keep its patients’ sensitive medical information secure. On August 2, 2016, Plaintiff filed a class action complaint alleging that Defendant’s computer systems suffered from a critical vulnerability in three of its internet and publicly accessible websites. The result of the vulnerability was that private medical information entrusted to Mercy by its patients had been exposed and was at great risk of further unauthorized disclosure and breach (if it hadn’t already been breached).
    [Show full text]
  • Saving Patient Ryan—Can Advanced Electronic Medical Records Make Patient Care Safer?
    Saving Patient Ryan|Can Advanced Electronic Medical Records Make Patient Care Safer? Muhammad Zia Hydari Tepper School of Business, Carnegie Mellon University, [email protected] Rahul Telang Heinz College, Carnegie Mellon University, [email protected] William M. Marella Pennsylvania Patient Safety Authority, [email protected] Patient safety is one of the foremost problems in US healthcare, affecting hundreds of thousands of patients and costing tens of billions of dollars every year. Advanced electronic medical records (EMRs) are widely expected to improve patient safety, but the evidence of advanced EMRs' impact on patient safety is inconclu- sive. A key challenge to evaluating EMRs' impact on safety has been the lack of reliable and comprehensive data. We overcome this challenge by constructing a panel of Pennsylvania hospitals over 2005{2012 using data from several sources. In particular, we source confidential patient safety data from the Pennsylvania Patient Safety Authority (PSA). Since mid-2004, Pennsylvania state law has mandated that hospitals report a broad range of patient safety events to the PSA. Using a differences-in-differences identification strategy, we find that advanced EMRs lead to a 27 percent decline in patient safety events. This overall decline is driven by declines in several important subcategories|30 percent decline in events due to medication errors and 25 percent decline in events due to complications. Our results hold against a number of robustness checks, including, but not limited to, falsification test with non-clinical IT and falsification test with a sub- category of events that is not expected to benefit from advanced EMRs. Overall, we provide evidence to policy makers, hospital administrators, and other stakeholders that hospitals' adoption of advanced EMRs improves patient safety.
    [Show full text]
  • Volume 5, Issue 11
    ISSN 1942-9673 Volume 5, Issue 11 Published and Sponsored by: Intellectbase International Consortium Editor-In-Chief Volume 5, Issue 11 Dr. Danka Radulovic, University of Belgrade, Serbia Contributing Editors Senior Advisory Board Dr. Anita King, Associate Editor Dr. Edilberto Raynes University of South Alabama, USA Tennessee State University, USA Dr. William Ebomoyi, Associate Editor Dr. Regina Schaefer Chicago State University, USA University of La Verne, USA Mrs. Karina Dyer, Managing Editor Dr. Avis Smith Intellectbase International Consortium New York City College of Technology, USA Australian Affiliate ISSN: 1942-9665 Print ISSN: 2150 -6760 Online ISSN: 1942-9673 CD-ROM Copyright ©2012 Intellectbase International Consortium (IIC). Permission to make digital or hard copies of all or part of this journal for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial use. All copies must bear this notice and full citation. Permission from the Editor is required to post to servers, redistribute to lists, or utilize in a for-profit or commercial use. Permission requests should be sent to International Journal of Social Health Information Management, 1615 7th Ave N., Nashville, TN, 37208. www.intellectb ase.org Published by Intellectbase International Consortium (IIC) 1615 7th Ave N., Nashville, TN 37208, USA Editor’s Message I am glad to present Volume 5, Issue 11 of the International Journal of Social Health Information Management (IJSHIM). The papers offer great intellectual contributions and epitomize our focus on broadening intellectual resources, understanding, development and exchange of ideas among global research professionals. The goal of the International Journal of Social Health Information Management (IJSHIM) is to provide contemporary information to the business, government, and academic communities by helping to promote the interdisciplinary exchange of ideas on a global scale.
    [Show full text]
  • Using Blockchain to Address Interoperability Concerns in Healthcare
    Supply Chain & Operations Using Blockchain to Address Interoperability Concerns in Healthcare in 2015. This oligopoly of vendors has created perverse Government and public health authorities are undertaking incentives leading to lack of innovation, collaboration, and several initiatives to boost the health IT system, which in interoperability. In addition, there are other issues, such as the turn is expected to enable high-quality and personalised absence of interoperable platforms, which create a multitude of care. The main goal is to empower and educate consumers problems. by equipping them with a real-time digital picture of their health. Electronic health record (EHR) adoption, which Issues Created Due to Absence of Interoperability is the first step in realising this goal, has already gained There are several problems created by the absence of momentum. The next step is to ensure a seamless flow of interoperability: health information across stakeholders that will make the • Restricted data sharing: The predominant EHR products on information usable and enable better decision-making. the market today restrict the free flow of patient information across various product platforms. Most vendors impose The ability of health IT systems to share information with each interfacing costs for data transfer. The healthcare system other and use that shared information is called interoperability. incurs additional costs due to clinical test duplications that According to Premier Healthcare Alliance, lack of interoperability occur because of restricted information availability. results in a loss of 150,000 lives and US$18.6 billion every year. • Non-availability of a unified patient view: The current Furthermore, the current healthcare ecosystem is shifting toward solutions offered by EHR vendors are siloed and thus fail a value-based care model, which is extremely dependent on to capture the bigger picture of a patient’s overall journey.
    [Show full text]