Click here for more sample CPC practice exam questions with Full Rationale Answers

Practice Exam

Click here for more sample CPC practice exam questions and answers with full rationale

Practice Exam

CPC Practice Exam and Study Guide Package

Practice Exam

What makes a good CPC Practice Exam? Questions and Answers with Full Rationale

CPC Exam Review Video

Laureen shows you her proprietary “Bubbling and Highlighting Technique”

Download your Free copy of my "Medical Coding From Home Ebook" at the top right corner of this page

Practice Exam

2018 CPC Practice Exam Answer Key 150 Questions With Full Rationale (HCPCS, ICD-9-CM, ICD-10, CPT Codes) Click here for more sample CPC practice exam questions with Full Rationale Answers

Practice Exam

Click here for more sample CPC practice exam questions and answers with full rationale

Avoid HIPAA breaches from ransomware attacks

 

Avoid HIPAA breaches from ransomware attacks

Although ransomware is not a new phenomenon, a recent increase in reported attacks along with several well-publicized cases have raised the public’s awareness of the threat it poses. Ransomware, a variety of malware, can be incredibly damaging because it is designed to infect a system, find and encrypt the system’s data, and lock out users until they pay a ransom–typically in an anonymous electronic currency like bitcoin–to regain access through a decryption key.

According to a U.S. government interagency report, there have been approximately 4,000 ransomware attacks each day since the beginning of the year, up from the 1,000 daily attacks reported last year. Further, a recent analysis by managed security services provider Solutionary found that 88% of ransomware attacks during the second quarter of this year targeted healthcare entities.

"Hospitals rely on data systems not only for the survival of their business, but the survival of their patients. Because of this, the perceived value of the data becomes much greater, meaning the criminals can charge premium ransoms against their victims," says Travis Smith, senior security research engineer at Tripwire, a Portland, Oregon-based cybersecurity firm.

The variants of ransomware that exist can complicate a hospital or other healthcare provider’s response, says Doron S. Goldstein, partner and co-head of privacy, data, and cybersecurity practice at Katten Muchin Rosenman, LLP, in New York City. In addition to the typical form of ransomware that infiltrates systems and locks users out of their data unless they make some form of payment, some types can also exfiltrate a copy of the locked data to the hacker, or delete the data but make it seem as though it’s encrypted and still present-tricking the user into paying for data that is actually gone.

"In each scenario, you don’t know if there is intention to release the data if you pay or not. You may pay and still get nothing. Or you may get it back. There is no certainty to it. Some victims have gotten access back; others have not," says Goldstein, a former software developer and network administrator. "The general guidance from law enforcement, such as the FBI, is not to pay ransom. But if everything you have is locked out, you may not feel like you have a choice."

HHS guidance

In light of the increased prevalence of ransomware threats, the U.S. Department of Health and Human Services (HHS) recently released guidance to help covered entities understand the risks associated with these types of attacks and how complying with HIPAA can help identify, prevent, and recover from ransomware.

"The HHS is just reacting to what is happening in the marketplace. The sustained increase in the number of successful ransomware attacks is proof that the ransomware problem is going to get worse before it gets better. Issuing guidance is raising awareness of the issue at hand," Smith says.

The HHS guidance states that healthcare entities can better protect against ransomware by implementing security measures required by the HIPAA Security Rule. According to the guidance, these measures include limiting access to electronic protected health information (PHI) to personnel and software that require it; and conducting risk analyses to identify threats and vulnerabilities to PHI.

"You have to do the risk analysis. Ransomware is just another form of malware; it’s particularly insidious, but they all require doing the risk analysis," says Goldstein.

A big takeaway from the HHS guidance is the importance of taking appropriate actions beforehand to mitigate the potential of damage caused by ransomware, he adds. Unlike malware that simply transfers PHI without authorization, ransomware makes the PHI unavailable or destroys it altogether.

"For a healthcare provider in particular, having data exfiltrated means there’s damage to the patients, but likely not to their immediate health. Being locked out of your health data or your patients’ health data is a potential threat to the life and health of patients," he says.

 

HIPAA breaches

The guidance provides clarification on whether a ransomware infection constitutes a HIPAA breach. A breach under HIPAA is any acquisition, access, use, or disclosure of PHI in a manner that is not permitted under the HIPAA Privacy Rule and that compromises the PHI’s security or privacy.

Prior to the release of the HHS guidance, instances of data exposure that revealed individuals’ PHI would be considered a HIPAA breach, says Justin Jett, director of compliance and auditing at Plixer International, a Kennebunk, Maine-based security analytics company. ­However, at that point, one could have made the argument that ransomware wouldn’t technically be considered a breach since it encrypts data rather than exposing it.

Now, according to the new guidance, if a ransomware infection encrypts electronic PHI that was not encrypted prior to the incident, a breach has occurred. The guidance reasons that the PHI has been "acquired" because hackers have taken control or possession of it. In these cases, the hospital must then undertake a risk analysis and, when applicable, comply with the breach notification requirements and notify individuals affected, HHS, and the media.

However, if the hospital had previously (prior to the ransomware attack) encrypted the PHI in a manner that would render it unusable, unreadable, or undecipherable to an unauthorized individual, there is a possibility the ransomware attack wouldn’t be considered a breach.

"I interpret this guidance as removing the loophole of ransomware not actually looking at the data. Since malware changes over time, it’s within the realm of possibility that ransomware will target [PHI] and exfiltrate the data once found. The new guidance states that if the ransomware is unable to actually see the protected healthcare information in cleartext (not encrypted), then it is not a reportable breach," Smith says.

Even in these cases, the guidance says additional analysis would be required to determine if the PHI was sufficiently encrypted prior to the attack. Goldstein says this emphasizes the need for a risk analysis whenever there is a security incident. He further noted that HHS may have included this guidance so covered entities could not view the ransomware’s own encryption of the data as protection against that data being compromised.

"In those cases, the data is technically encrypted by virtue of the ransomware, but it’s not encrypted by the covered entity; it’s encrypted by someone else who controls that encryption. It shouldn’t be viewed as encryption for the purposes of your risk analysis," Goldstein says."

 

Prevention and recovery

To better prevent ransomware, Jett says all staff should be appropriately trained on email and web security as most malware and ransomware comes from those sources. Additionally, companies should invest in heightened email security solutions, like anti-spam firewalls, which will help prevent the most obvious attacks from getting to employees’ inboxes.

The HHS guidance suggests that since HIPAA requires the workforces of covered entities to receive security training on detecting and reporting malware, employees can assist with early detection of ransomware by spotting indicators of an attack. These warning signs could include unusually high activity in a computer’s CPU as the ransomware encrypts and removes files, or an inability to access files that have been encrypted, deleted, or relocated.

Even if hospitals are vigilant, ransomware attacks may still occur. Again, the guidance suggests that HIPAA compliance may help hospitals recover from ransomware attacks due to HIPAA’s mandate for frequent backups of data.

Goldstein warns, however, that some variants of ransomware can lie dormant for a period of time in order to migrate across systems, including into data backups. Many hospitals and companies keep hot backups as part of their disaster recovery plan. These backups can be automatically or manually switched on if a system goes down. If ransomware has infiltrated a backup, the backup’s data could also become compromised and encrypted by the ransomware as soon as it’s activated.

"The important thing about dealing with the impact of ransomware is that it may require additional or different protections compared to what other malware requires to avoid or mitigate its ill effects," he says.

 

Recent ransomware attacks

All types of malicious software attacks are on the rise,but ransomware has recently received more high-profile media coverage, says Doron S. Goldstein, partner and co-head of privacy, data, and cybersecurity practice at Katten Muchin Rosenman, LLP, in New York City. "Ransomware has certainly gotten more coverage lately because of the potential damage, and the sophistication of some of these attacks has increased," he says.

The following are a few of the recent ransomware attacks that made headlines:

Hollywood Presbyterian Medical Center: In February, this Los Angeles hospital paid hackers the equivalent of $ 17,000 in bitcoins to regain access to its computer system, according to the Los Angeles Times. The malware prevented hospital staff from accessing their system for 10 days by encrypting its files; once the hospital paid the ransom, it was given a decryption key to unlock the files. In a statement, CEO Allen Stefanek said paying the ransom was the quickest way to restore the hospital’s systems.

Chino Valley Medical Center and Desert Valley Hospital: In March, hackers targeted these southern California hospitals by infiltrating their computer systems with ransomware. A spokesman for the two hospitals, which are part of Prime Healthcare Services, Inc., said technology specialists were able to limit the attacks so both hospitals remained operational, no data was compromised, and no ransom was paid.

MedStar Health: Also in March, this Columbia, Maryland-based system was targeted with ransomware that encrypted the system’s data. According to the Baltimore Sun, the hackers demanded that MedStar pay three bitcoins, worth approximately $ 1,250, to unlock a single computer, or 45 bitcoins, the equivalent of about $ 18,500, to unlock all of its computers. MedStar refused to pay the ransom, and staff at its 10 hospitals and more than 250 outpatient centers resorted to using paper records while system access was restored.

Kansas Heart Hospital: In May, hackers infected the network system of this Wichita hospital with ransomware. According to local CBS affiliate KWCH12, the hospital paid an undisclosed portion of the ransom demanded but the hackers refused to return full access and demanded a second payment. The hospital announced that it had refused to make the second payment and would work with its IT team and external security experts to restore access to the rest of the system.

HCPro.com – Credentialing and Peer Review Legal Insider

Avoid the Top 3 Compliance and Auditing Mistakes

Dodging them means your practice will better serve patients, decrease risks, and improve cash flow. In today’s environment of increasing regulatory oversight and ever-changing reimbursement policies, compliance requires concerted effort and plan. Although healthcare organizations are not federally mandated to implement a compliance and auditing program, it’s foolish not to. Done right, a compliance and […]

The post Avoid the Top 3 Compliance and Auditing Mistakes appeared first on AAPC Knowledge Center.

AAPC Knowledge Center

Avoid Overpayments for Intensity Modulated Radiation Therapy

Maintain appropriate documentation and reporting for this valuable tumor treatment option. A recent Office of Inspector General (OIG) review found $ 25.8 million in hospital overpayments for intensity modulated radiation therapy (IMRT) planning, which suggests a need for greater education around reporting of these services. This article will provide insight into what IMRT is, its uses, […]

The post Avoid Overpayments for Intensity Modulated Radiation Therapy appeared first on AAPC Knowledge Center.

AAPC Knowledge Center

How To Avoid Medical Malpractice Ny?

As you all know that New York is a place where talented and experienced medical professionals are residing to treat the patients but in spite of that there are lots of patients becoming the victim of medical malpractice NY acts every day. If you want to avoid such acts then you must approach a medical professional who has already treated one of your family members and known ones so that you can trust him easily for your treatment. Besides that incase of any surgery you must take the opinion of at least two doctors so that chances of committing errors get reduced to some extent. It is the responsibility of a medical professional to provide best treatment to his patients irrespective of their status but now many doctors are prone to do mistakes quite often. The mere ignorance of medical professionals leads to the occurrence of medical malpractice NY acts at a large scale.

There are several cases occurred of medical malpractice NY every day but only few of the victims raise their voice against this ill practice. Some people do not even know how to react in such circumstances and some are unaware of their rights in this regard. If you come across any victim of the ignorance of medical professionals then you must guide him/her to the right path. The most convenient way of taking any action against these professionals is to hire an efficient lawyer who is experienced enough to tackle with the complexities of such issues. There are certain doctors who have committed the act of medical malpractice NY and are ready to bribe the patient for not taking any legal action against them. Doctors generally prefer out of court settlement because they want to retain their positive image in the mind of patients, colleagues and the society. As you all know that if the reputation of a doctor is being spoiled for handling the case with wrong method then no body would want to approach him for their treatment.

You must know that all the errors committed by medical professionals can not be counted under the acts of medical malpractice NY so to enquire about it in detail you must log on to the websites which contains desired information. You can also consult an expert online to retrieve information about the acts which can be considered as medical malpractice acts so that you can file a lawsuit against the responsible party. There are certain mistakes which lead to these acts such as wrong diagnosis by doctors, delay in diagnosis, wrong surgical methods and delay in surgery. When a patient is being wrongly diagnosed by a medical professional then the treatment would definitely followed by wrong medication process.

So, from the above details you can easily make out that it is essential to enquire about the methods through which you can avoid the occurrence of medical malpractice NY. If you have become the victim to this ill practice then you must consult a lawyer to fight against it legally.

George Turner gives advice to clients who are looking for attorneys to handle injury related cases. To know more about the services of medical malpractice NY, New York Mesothelioma lawyer NY, medical malpractice lawyer new York, medical malpractice lawyers new York, medical malpractice law firm, visit http://www.nbrlawfirm.com

Related Medical Coding Articles

Three Pointers To Help You Avoid Common Stent Coding Mistakes

When your urologist places a stent after a ureteroscopic procedure (say for instance stone removal, the coding is not always cut and dry. You will need to dig into the documentation details to ensure you select the proper code for the clinical circumstances.

Here are three pointers which will help you stay away from the most common stent coding mistakes.

Get to know when the stent is not really a stent

Not each and every mention of stent’ in your urologist’s documentation means you can report a stent code such as 52332 (Cystourethroscopy, with insertion of indwelling ureteral stent [e.g., Gibbons or double-J type]).

Here’s the reason: There are two types of stents your urologist will make use of temporary and permanent and the first one is not really a true stent. A temporary stent is in actuality a ureteral catheter, placed at surgery to assist during surgery. The urologist then removes the catheter post surgery before the patient leaves the operating room. In this situation, you should not report stent code 52332. Instead, use 52005 (Cystourethroscopy, with ureteral catheterization, with or without irrigation, instillation, or ureteropyelography, exclusive of radiological service).

For postoperative drainage stents, stick with 52332

The second type of stent is a permanent stent. These types of stents are placed after surgery for drainage, and are indwelling and self retaining. The patient goes away from the operative room with the stent in place, and the stent will be removed at a later date.

Whereas temporary stents that are often placed as part of an endoscopic procedure (52320-52355) can’t be reported in addition to the primary procedure, an indwelling stent, which is placed during the procedure to keep the ureter open and to aid recovery after the procedure can be billed separately.

Here’s how: When your urologist documents that he placed a double-J stent for postoperative drainage, you should use 52332.

Bilateral coding: If your urologist places bilateral double-J stents for postop drainage, your exact coding will depend on the payer. For Medicare, use 52332 with modifier 50 (Bilateral procedure) appended. Private payers may also want 52332-50 or they may request you use 52332-LT (Left side) and 52332-50-RT (Right side) on two lines.

In many instances, report stent placement separately

If your urologist places a stent during the same session in which he also carries out another ureteroscopic procedure, most likely you can report both procedures.

When the patient has a large ureteral stone which the urologist removes ureteroscopically, there may follow a significant amount of ureteral swelling. In order to avoid complete ureteral obstruction, an indwelling ureteral stent may be placed to keep the ureter open.”

In this situation, bill the ureteroscopy code (52352, Cystourethroscopy, with ureteroscopy and/or pyeloscopy; with removal or manipulation of calculus [ureteral catheterization is included]) and 52332. For some payers you may need to add modifier 51 (multiple procedures) to 52332 to indicate that you have carried out a secondary procedure. You don’t need to add modifier 59 (Distinct procedural service) as because 52332 is no longer bundled with 52320-52355.

For more on this and for other specialty-specific articles to assist your urology coding, sign up for a good Medical coding resource like Coding Institute.

The Coding Institute is dedicated to offering quality products and services to help healthcare organizations succeed. We are primarily focused on providing specialty-specific content, codesets, continuing education opportunities, consulting services, and a supportive community of healthcare professionals and experts.

Related Medical Coding Articles

Avoid Being the Next Kickback and False Claims Defendant

Let a case show you why it’s important for your healthcare system to Implement effective compliance programs. By Ann M. Bittinger, Esq. United States of America ex rel. Baklid-Kunz v. Halifax Hospital Medical Center is one case in a recent series in which U.S. attorneys sued health systems for paying kickbacks to their employed physicians, […]
AAPC Blog

The Top 3 Reasons for Radiology Claims Denials and How to Avoid Them

The goal of a well-managed radiology billing operation is to submit claims for services promptly and receive reimbursement as quickly as possible. Timely submission and prompt payment enhance the practice’s cash flow and keep the overall cost of billing at a minimum.  All too often, however, payment is delayed because the payer denies the claim for some reason. 


Medical Billing and Coding Blog

How to Avoid Radiology Claims Denials – Eligibility Problems

Claims for reimbursement of radiology services are most often denied by the payer, whether it is Medicare or a commercial insurance company, because they contain inaccurate information about the patient’s eligibility for coverage. This can occur for many reasons, some of which may not be within the control of the radiology practice, but it usually can be corrected by improving the process of recording data at the time of patient registration. In this new healthcare economy where radiology practices are under pressure to add value to the patient care delivery system, effective management of claims denials can strengthen the relationship between the practice or imaging center and the hospitals they serve.


Medical Billing and Coding Blog