Remove Download Remove Fraud Remove Malpractice
article thumbnail

How To Prepare for an OIG Inspection

MedTrainer

Earlier this year, an in-depth OIG investigation resulted in a six-day trial of a former Louisiana health clinic CEO , who was ultimately convicted of Medicaid fraud and sentenced to 82 months in federal prison. Download “Compliance Reports You Can’t Live Without” for OIG reporting templates and tips. What Prompts an OIG Inspection?

Fraud 98
article thumbnail

Medical Compliance Plans Limit Healthcare Liability

MedTrainer

Here’s how these plans help limit liability: Prevent Fraud and Abuse: Compliance plans include measures to prevent fraud and abuse within the healthcare organization. Reduce Medical Malpractice Risk: Ensuring patient safety is a fundamental component of compliance plans.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Privileges and Credentialing Aren’t the Same

MedTrainer

Additionally, the credentialing specialist may request a record of any pending and past medical malpractice cases and disciplinary actions from the appropriate authority. Download Now What are Provider Privileges? Maintaining compliance helps protect against fraud, waste, and abuse.

article thumbnail

The Importance of Primary Source Verification for Practitioner Credentials

Verisys

The policy issuer for malpractice insurance verifies insurance coverage. Delivery of data ranges from a print-out sent by mail, a spreadsheet sent through email, a CSV download from a secure server, or an online searchable database. The Primary Source Organizations. Some organizations compile and publish data monthly. Unpublished Data.

article thumbnail

HIPAA Compliance Helps Prevent Small Practice Cybercrime

Compliancy Group

The most common “download and start” version used by so many people is not HIPAA compliant. This does not include the potential cost of damage to the practice’s reputation if those ransomed records containing PHI were sold for use in payment fraud or identity theft. The video-calling application Zoom is a prime example.

HIPAA 52
article thumbnail

The Importance of Primary Source Verification for Practitioner Credentials

Verisys

The policy issuer for malpractice insurance verifies insurance coverage. Delivery of data ranges from a print-out sent by mail, a spreadsheet sent through email, a CSV download from a secure server, or an online searchable database. The Primary Source Organizations. Some organizations compile and publish data monthly. Unpublished Data.