Click here for more sample CPC practice exam questions with Full Rationale Answers

Practice Exam

Click here for more sample CPC practice exam questions and answers with full rationale

Practice Exam

CPC Practice Exam and Study Guide Package

Practice Exam

What makes a good CPC Practice Exam? Questions and Answers with Full Rationale

CPC Exam Review Video

Laureen shows you her proprietary “Bubbling and Highlighting Technique”

Download your Free copy of my "Medical Coding From Home Ebook" at the top right corner of this page

Practice Exam

2018 CPC Practice Exam Answer Key 150 Questions With Full Rationale (HCPCS, ICD-9-CM, ICD-10, CPT Codes) Click here for more sample CPC practice exam questions with Full Rationale Answers

Practice Exam

Click here for more sample CPC practice exam questions and answers with full rationale

Briefings on HIPAA, November 2016

HIPAA enforcement

Small breaches could become a big problem

In a year of high-profile, multimillion dollar settlements for large HIPAA breaches, OCR raised the stakes in a big way?by taking a harder line on small breaches. OCR announced plans to crack down on smaller breaches?those affecting fewer than 500 individuals?in August. Although all breaches must be reported to OCR, generally only breaches affecting 500 or more individuals are regularly investigated, while small breaches are investigated only as resources permit. OCR instructed its regional offices to increase investigations of small breaches to discover the root causes. Identifying common root causes will help the agency better measure HIPAA compliance throughout the industry and address industrywide compliance gaps, OCR said. Regional offices may obtain corrective action if an investigation of a smaller breach reveals noncompliance.

Regional offices were instructed to take several factors into consideration when investigating smaller breaches and determining potential corrective action. These are:

  • The size of the breach
  • Whether a single entity reports multiple small breaches with a similar root cause
  • Whether the breach involves theft or improper disposal of PHI or hacking

 

A closer look

OCR has come under fire for its handling of small breaches. In late 2015, a joint Pro Publica/NPR investigation analyzed federal data on HIPAA complaints and requested documents from OCR, including letters sent to entities that were the subject of HIPAA complaints (www.propublica.org/article/few-consequences-for-health-privacy-law-repeat-offenders). The investigation identified the top serial HIPAA violators, including the Department of Veterans Affairs and CVS. OCR generally responded to these complaints by sending letters reminding the entity of its obligation to protect patient privacy and follow HIPAA, and warned that if OCR received another complaint it may take more serious action. However, OCR rarely took any further or more serious action.

One reason could be that many of these breaches affect fewer than 500 individuals. Both large and small breaches must be reported through OCR’s web portal (www.hhs.gov/hipaa/for-professionals/breach-notification/breach-reporting/index.html) but there are different deadlines for reporting each and, previously, they were not equally prioritized by OCR.

But that asymmetric enforcement policy left many frustrated and means that OCR may be missing data vital to creating an overall picture of HIPAA compliance and effectiveness. An NPR report released in conjunction with Pro Publica’s investigation revealed the lasting and personal harm done by small breaches (www.npr.org/sections/health-shots/2015/12/10/459091273/small-violations-of-medical-privacy-can-hurt-patients-and-corrode-trust).

Massive breaches caused by hackers will put patients at risk for medical and financial identity theft, but, considering the amount of personal data stored by entities across all industries and the sheer number of data breaches, it’s difficult to tie a specific breach to identity theft (see the July and August issues of BOH for more information on breaches and medical identity theft). Small breaches, however, often expose PHI to people in the community the patient lives and works in, leaving the patient at risk for far more personal harm.

But OCR hasn’t ignored all small breaches. In July, the agency reached a $ 650,000 HIPAA settlement with Catholic Health Care Services of the Archdiocese of Philadelphia (CHCS), a business associate (BA), for a 2014 breach affecting 412 individuals after an unencrypted mobile device was stolen (www.medicarecompliancewatch.com/news-analysis/business-associate-agrees-650000-hipaa-fine).

The agency’s strong action may have been spurred by CHCS’ long-standing organizationwide HIPAA noncompliance. CHCS hadn’t conducted a risk analysis since September 23, 2013, the compliance date of the Security Rule for BAs, and therefore had no risk management plan. CHCS also lacked any policies regarding the removal of mobile devices from its facility. OCR suggested that, due to CHCS’ widespread neglect of basic security measures, the fine could have been even higher and only a consideration of the role CHCS plays in delivering care to at-risk populations, including the elderly, disabled individuals, and individuals living with HIV/AIDS, tempered its decision.

Getting perspective

Implementing OCR’s directive may be a tall order for resource-strapped regional offices and it’s difficult to predict what the outcome will be, Kate Borten, CISSP, CISM, HCISSP, founder of The Marblehead Group in Marblehead, Massachusetts, says.

"I’m not sure it’s actually going to make a huge difference, but I think, from the beginning, those of us who were watching HIPAA enforcement were concerned that, while HHS had good intentions, they just didn’t have the resources," she says.

That’s not surprising: HHS is a huge department with many major priorities, including CMS. But, given that HHS and OCR work with limited resources, the new focus on small breaches could be a significant sign of things to come, Borten says. The agency likely recognizes that small breaches are a huge unknown: There’s no "Wall of Shame" for small breaches and little in the way of accountable reporting.

"I just have the sense that there’s an enormous volume of under 500 breaches that get reported that we don’t hear much about," she says. "So I think it’s very important that they take this step."

Some organizations may have been inclined to brush off small breaches: 499 patients is still shy of the 500 mark, she points out, and an organization could easily add it to the end of the year small breach report and forget about it. Those organizations are the ones that will be in for the biggest wake-up call. "Hopefully they’ll hear this and they’ll think again," she says.

Large breaches often grab the headlines, and with good reason. But massive incidents like the Anthem breach may not provide the most useful data for either OCR or other covered entities (CE) and BAs. Massive breaches are statistically unlikely, according to a June 2015 report by researchers at the University of New Mexico and the Lawrence Berkeley National Laboratory (www.econinfosec.org/archive/weis2015/papers/WEIS_2015_edwards.pdf).

"Certainly, you could get hit by one of those big ones," Borten says. "But it’s much more likely, far more likely, you’re going to suffer smaller breaches."

Big breaches come with the risk of big settlements. OCR makes a point of publicizing HIPAA breach settlements and putting the dollar signs front and center. This year alone the agency has levied millions of dollars in HIPAA settlements fines for large breaches. But even as HIPAA breach settlement fines are getting bigger, the numbers don’t stack up against the amount of breaches that are reported each year. Many more organizations get away with little more than a strongly worded letter from OCR. A multimillion dollar fine may be significant for most organizations, but the odds are currently in their favor, Rick Kam, CIPP/US, president and co-founder of ID Experts, says.

"The likelihood that an organization will get fined is so low," he says. "They only catch the big ones, but there are millions of others that are losing data everywhere because nobody’s looking at them."

Too often, organizations assume that if the volume of patients affected by a breach is low, the impact is also low, Borten says, and that’s simply not true. Even a breach involving a single individual’s record can have serious consequences.

As physician practices and local hospitals are absorbed into large corporate health systems, executive perspective on small breaches can become even more skewed, Borten cautions. Executive officers overseeing multiple hospitals, clinics, and physician practices may be more interested in overall numbers and the big picture. A clinical summary handed to the wrong patient at a physician office across the state may simply not register and the impact on the patient will be invisible.

But it’s the duty of privacy and security officers to avoid making that same mistake, she says. "They should be wiser than to fall into that thinking. It falls to them to take a case to the senior leadership or the board of directors and make them recognize that it isn’t just the big breaches," she says. "We worry about the little ones, too."

Privacy and security officers should help provide C-suite the perspective to recognize small breaches and give them the proper weight. A small breach can be just as serious as a large one, Borten says. If an employee posts a patient’s PHI on a social media site, for example, the organization could find itself fighting a lawsuit; even if the case is dismissed, direct legal expenses and time and resources spent preparing documents add up fast. And, as the NPR report showed, it’s not only the patient’s reputation in the community that may suffer; an organization can easily earn a reputation as careless and unconcerned with its patients’ well-being after a small breach.

Small breaches, little data

Because small breaches aren’t investigated to the same standards as large breaches, it’s difficult to measure just how HIPAA-compliant most organizations are and what the real HIPAA pain points are. Another problem is the underreporting of small breaches, Borten says. In 2013 when the HIPAA omnibus rule was released, HHS strengthened the language describing what constitutes a reportable breach. However, HHS also commented at the time that it was concerned there was a significant amount of underreporting. Borten says her experience working with CEs and BAs proves HHS was right to be concerned.

"I think there’s a tendency for underreporting to be more common when there are just one or two patients involved," she says.

In the early days of HIPAA breach notification, some may have been under the impression that CEs and BAs were not required to report breaches affecting fewer than 500 individuals at all, she adds. But that’s never been the case. Although large and small breaches are reported to OCR according to different systems and time frames, organizations are required to treat any breach the same regarding notification to patients.

 

Adding up

Small breaches are likely more typical than large ones, Kam says. Since 2009, roughly 230,000 breaches have been reported to OCR. But only approximately 1,000 have been breaches affecting over 500 individuals and subject to the more stringent investigation procedure. Investigating all HIPAA breaches would be a daunting task for any agency, but by almost exclusively looking at large breaches, OCR left the door open for repeat HIPAA offenders. Small breaches are reported to the agency at the end of the year, but each breach is counted separately, meaning an organization could experience multiple small breaches that add up to well over 500 individuals affected?yet still not be investigated because no single breach hit the 500 mark.

"It turns out that for breaches in healthcare, most of the time, the record count is under 500 records," Kam says. "So you have these organizations that are breaching multiple times and not really correcting the situation because it doesn’t get highlighted or investigated."

OCR’s instructions to its regional offices appear aimed to close that loophole. Along with phase two of the HIPAA audit program, this could be a sign that OCR is getting serious about collecting facts on HIPAA compliance in the real world and improving education and enforcement. The agency might be realizing that it’s time to change if it expects organizations to take HIPAA compliance seriously.

"If you’re seeing the same problem over and over, you’ve got to do something to change," Kam says. "So far, nobody’s listening."

 

Data breaches

The cost of a data breach

Complicated Medicare, Medicaid, and private insurer reimbursement rules can easily throw a hospital for a loop and leave it running dangerously low on revenue. An organization’s leaders know they must work better and smarter and make strategic investments that will pay off in savings, while privacy and security officers may sometimes struggle to make the connection between their concerns and those of leadership.

But sound information security programs act as a kind of insurance: money spent up front to protect against an even greater financial loss down the road. Getting that message across can be challenging, but may transform the way an organization approaches information security.

Getting the numbers

Prevention is better than a cure, but privacy and security officers will be expected to back up conventional wisdom with hard numbers. So just how much does a data breach cost on average? The answer depends on the industry, according to the Ponemon Institute’s 2016 Cost of Data Breach Study: Global Analysis (www-03.ibm.com/security/data-breach). The study, sponsored by IBM Security, tracks and analyzes data breach costs and mitigation factors in industries around the world. The average per record cost of a data breach is $ 158 in the U.S., but in the healthcare industry that cost is more than double that at $ 355 per record. That can add up quickly if an organization experiences multiple breaches a year.

Several factors play into the higher costs seen in the healthcare industry, Diana Kelley, executive security advisor at IBM Security, says. Highly regulated industries such as healthcare typically see higher costs for breaches in a combination of fines and administrative costs.

"Whenever there’s a fine coming into play, that could lift up the total cost of recovery post-breach because in addition to all of the work you have to do to eradicate the threat, help your customers, and deal with the cleanup and recovery, you have to pay these fines," she says.

A surprising factor driving breach costs is the cost of breach notification. At more than half a million dollars, the U.S. has higher breach notification costs than any of the other countries in the 2016 Ponemon survey. The U.S. has strong data breach notification laws, Kelley says, and there are both federal and state breach notification laws that organizations must comply with.

What drives that cost? Simply the price of first class postage can quickly add up when breach notification letters must be mailed to hundreds or even thousands of affected patients, Kate Borten, CISSP, CISM, HCISSP, founder of The Marblehead Group in Marblehead, Massachusetts, says. In fact, the rising cost of postage is one way state and federal governments hope to encourage organizations to spend money on prevention rather than remediation.

"The threat of such costs is intended to be a deterrent to lax security and to spur healthcare organizations to do their best to avoid breaches," Borten says. "Some breaches are not avoidable, but many or most are with better, yet still reasonable, security."

Some organizations may only look at fines when calculating how much a breach could cost, but by overlooking the seemingly smaller costs of a breach they may be missing the bigger picture. Breach notification is only one of the smaller individual and indirect costs of a breach that can add up to significant losses. Legal fees, security forensics, and any necessary security replacements or upgrades are only some of the indirect costs. Indirect costs may not be immediately apparent but they hit an organization’s bottom line all the same, Borten says.

"The indirect costs of a breach are probably not well understood by many healthcare organizations, especially smaller organizations that don’t have a good grasp of the Breach Notification Rule and a comprehensive incident response program," she says.

 

The value of a medical record

Information security may not be a traditionally strong point for some healthcare organizations. Previously, financial and retail organizations were hot targets for hackers after identity and financial information, but healthcare is quickly overtaking those industries. In comparison to the financial industry, healthcare isn’t known for strong security, Borten says.

"One reason is that organizations have been slow to recognize the value of their data. After all, it’s not like money in a bank account or credit card details that can be used for financial identity theft," she says. "Ironically, healthcare data now has a much higher street value than credit card information."

Healthcare organizations are in a unique position because of the amount of data they hold. A retail organization like Target, which experienced a massive data breach in 2013, likely only stores payment card information and mailing addresses, but most healthcare organizations also store insurance information along with sensitive details of an individual’s health. A 2015 survey by the Ponemon Institute and the Medical Identity Fraud Alliance (MIFA), the Fifth Annual Study on Medical Identity Theft, found that more than two million adults were the victim of medical identity theft and fraud in 2014 and according to Ann Patterson, senior vice president and program director of MIFA, that number will only go up.

That prediction may be supported by some of the biggest breaches this year. In July, a hacker offered millions of patient records for sale and posted samples of the records, showing names, contact information, and Social Security numbers, so interested buyers could verify the records. Other incidents this year have seen hackers offering similar teasers. Some of that data is bound to fall into the wrong hands and be used for financial and medical identity theft. Medical identity theft can cost an individual more than $ 13,000 on average, according to the 2015 MIFA/Ponemon survey, but healthcare organizations inevitably wind up absorbing some of the cost in bad debt. (For more on medical identity theft, see the July and August issues of BOH.)

 

Timing and teamwork saves money

The 2016 Ponemon study drew a link between the cost of a data breach and the time and manner in which an organization responds to the breach. The longer it takes an organization to detect a breach, the more it costs?approximately $ 1 million more per incident, the survey shows. The average overall cost of a breach that took a mean time to identify of less than 100 days was $ 3.2 million, while those that took more than 100 days to be identified cost an average of $ 4.38 million. The time it takes an organization to contain a breach also impacts the overall cost, according to the study.

Having a security incident response team in place lowered the costs. An organized, planned team can act quickly to identify, contain, and remediate breaches, key factors in keeping breach costs down, Kelley says. And that can give a clear picture of the actual return on investment for security in terms that the C-suite will easily understand. "If you’re trying to argue for incident response and building out the incident response plan or growing that team, here’s some real dollar value that you could tie to what the return on investment could be," she says.

Participation in threat sharing also showed a clear win for organizations. Threat sharing can give organizations a heads up on the latest and most common threats and help them make smart security investments and strategic threat reduction measures.

"This is becoming very important in healthcare as it is in all industries," Kelley says. "The attackers are very organized and collaborative: they’re sharing data, they’re sharing their tips and tricks with each other so they can get data more effectively."

If information sharing is winning for the bad guys, it can do the same for the good guys, she adds. Cyber threats shift quickly, making real-time or near-real-time information crucial. Organizations can share information on threats, like suspicious websites and server addresses that launch phishing attacks, and tips on shutting them down. But some may hesitate to engage in information sharing out of concern that it may expose sensitive business and security information.

An IBM study released in February looked at the C-suite’s attitudes and actions on cybersecurity (www-03.ibm.com/press/us/en/pressrelease/49100.wss). More than half (53%) of respondents agreed that information sharing between organizations is important for cybersecurity, yet 68% said they were unwilling to do so. It’s not surprising that chief executive officers would be uncomfortable sharing information with rival organizations but it can be done without disclosing sensitive data, Kelley says.

"Nobody wants to give away the keys to the kingdom, and if you’ve been breached you don’t want to show everybody where you went wrong and how you went wrong," she says. "That’s not the kind of information sharing that we need to do to succeed. What we really need to share is what the bad guys are doing."

An organization doesn’t need to discuss its intellectual property, specific security controls, or other corporate secrets. The information an organization should share could be the general content of a phishing email, the IP address it was sent from, and the type of malware attached. This allows cybersecurity researchers and experts to create protections and update anti-malware and anti-virus software.

And as stakeholders and the Office of the National Coordinator of Health IT continue to push for interoperability, doing your part to ensure other organizations steer clear of hackers and malware could become even more important. "I think the more we tie systems together and we share with our partners, there are a couple things we can do. One of those is sharing information about threats," Kelley says.

 

Customer cost

No one likes to hear that their personal data has been breached, but how that dissatisfaction plays into the cost of a breach isn’t clear. According to the 2016 Ponemon study, the healthcare industry is the second most vulnerable to what it calls "churn"?a sharp drop in customers following a data breach. This may surprise those who assume healthcare is relatively immune to consumer pressure, but it’s supported by other trends that see healthcare becoming consumer-driven. It might also offer a clue as to how strongly some patients feel about breaches of PHI. It’s relatively simple to change banks, but changing healthcare insurers or providers is a more complicated process that takes more motivation, Kelley says.

"What’s it cost you to go from one bank to another bank if you don’t like their practices or they suffered a major breach?" she says. "Healthcare, it’s a little bit more difficult, but there’s still a level of choice and healthcare is very personal for people."

But privacy and security officers might want to rely on something other than consumer pressure to make the case for better security, Borten says. Often, patients simply have no better alternative and can’t switch providers or insurers if they’re unhappy over a data breach. And those who do switch may find themselves back in the same system after a few years.

"The reality is more complicated," she says. "As seen in some of the big retail breaches, after some initial falloff, customers come back in full force. In healthcare, some patients may not have other options: they may be locked in to a given provider by their health plan, or they may stay with an organization after a breach because they have long-established relationships they do not want to give up."

 

Cost conscious

Another recent study on the cost of data breaches by RAND raises questions about how the cost of a breach measures up against other financial risks organizations face. The RAND study, published in the Journal of Cybersecurity (http://cybersecurity.oxfordjournals.org/content/early/2016/08/08/cybsec.tyw001), found that the average cost of a data breach is roughly equal to an organization’s average IT budget, which is itself only 0.04% of an organization’s estimated revenue. The study authors suggest that public concerns about data breaches don’t match up with the relatively modest financial impact on organizations. Organizations, like individuals, are often motivated by self-interest and will not spend on risks that don’t have a significant impact on them; expecting them to act otherwise is not realistic, the study argues.

While that may in fact be the attitude of some executives when faced with competing demands and costs, the study leaves some significant questions unanswered. Bad debt is identified by the RAND study as the top financial risk for healthcare organizations, but data breaches can add to that cost. Victims of medical identity theft may be hit with thousands of dollars in medical expenses someone else racked up under their name. These fraudulent bills often wind up adding to an organization’s bad debt. Bad debt may often be a problem an organization can’t control, but by reducing data breaches, an organization can cut its risk of bad debt caused by medical identity theft.

 

 

HCPro.com – Briefings on HIPAA

Briefings on Coding Compliance Strategies, October 2016

Ready CDI teams for CMS’ proposed expansion of mandatory ortho episode payment models

by Shannon Newell, RHIA, CCS, AHIMA-approved ICD-10-CM/PCS trainer

If your hospital resides in one of the 67 metropolitan statistical areas (MSA) required to participate in the Comprehensive Joint Replacement Model (CJR), you will also be required to participate in a new orthopedic payment model called SHFFT (surgical hip and femur fracture treatment) if an August 2 proposed rule is finalized. The impact? The following assigned MS-DRGs will no longer define hospital reimbursement:

  • Major Joint Replacement or Reattachment of Lower Extremity (MS-DRGs 469, 470)
  • Hip and Femur Procedures Except Major Joint (MS-DRGs 480, 481, 482)

 

MS-DRGs 469 and 470 are included in the CJR, which we have discussed in prior articles. Let’s take a look at the proposed SHFFT episode payment model (EPM), which involves the other three MS-DRGs, and see what role the CDI program can play as reimbursement shifts to episode-based payments.

Model overview

The episode of care defined for the SHFFT EPM begins with an admission to a participating hospital of a fee-for-service Medicare patient assigned MS-DRGs 480?482. This admission is referred to as the anchor hospitalization. The episode continues 90 days post-discharge from the hospital, and payments for all related Part A and Part B services are included in the episode payment bundle. CMS holds the hospital accountable for defined cost and quality outcomes during the episode and links reimbursement?which may consist of payment penalties and/or financial incentives?to outcome performance.

This is a mandatory EPM for hospitals already impacted by the CJR; the SHFFT model will apply to the same 67 geographic MSAs. The EPM is proposed to begin July 1, 2017, and will last for five years, ending in December 2021.

Cost outcomes

CMS will initially pay the hospital and all providers who bill for services during the episode using the usual fee-for-service models. Thus, the SHFFT EPM will not impact the revenue cycle at first. However, at the end of each performance period, which typically represents 12 months (January through December), CMS will compare or reconcile the actual costs with a preestablished "target price."

CMS will set target prices using an approach that will phase in a blended rate of hospital to regional costs. In recognition of the higher costs associated with discharges in MS-DRGs with an MCC or CC, CMS has developed an algorithm to adjust the target price for this subset of the patient population.

If the reconciliation process indicates that the costs to deliver services for the episode were higher than the target price, CMS will require repayment from the hospital. If, however, the costs to deliver care for the episode were lower than the target price, CMS will provide additional payments to the hospital for the provided services. To receive additional payments, however, performance for defined quality outcomes must meet or exceed established standards.

 

Quality-adjusted target price

To receive any earned financial incentives, the hospital must meet or exceed performance standards for established quality outcomes. CMS therefore adjusts the target price based on quality performance, referred to as the quality-adjusted target price.

The SHFFT EPM uses the exact same quality outcomes as those defined for the CJR:

  • Patient experience. This is the HCAHPS measure also used in the Hospital Value-Based Purchasing Program (HVBP). The source of information for this measures is the HCAHPS survey.
  • Patient-reported outcome data. As with the CJR, the hospital can collect and submit patient-reported data elements and at present will earn quality composite points for submitting the data. These data elements are collected both before and after the procedure and will be used by CMS to create a functional status measurement tool.
  • THA/TKA complication rates. This is the Hospital-Level Risk Standardized Complication Rate (RSCR) following the THA/TKA measure. This measure already impacts financial performance under the HVBP. Like the CJR, performance for this measure is weighted the heaviest in the quality composite comprising 50% of the composite score.

 

Hospital (accountable party), collaborators, and Advanced Payment Models

The hospital is held accountable for episode cost and quality outcomes and all associated financial risks/rewards, even though a variety of providers deliver services and impact performance. As with the CJR, the hospital has been designated as the accountable party because CMS believes the hospital is best positioned to influence coordinated, efficient delivery of services from the patient’s initial hospitalization through recovery.

CMS permits the hospital to enter into collaborative arrangements with physicians and other providers to support and redesign care delivery across the episode and to share financial gains and/or losses. The proposed rule expands the list of collaborators defined in the previous CJR final rule to include other hospitals and Medicare Shared Savings Program accountable care organizations.

The proposed rule also provides an Advanced Payment Model (APM) track for the EPMs, an important step that will further incentivize collaborator participation.

 

CDI program opportunities

There are five key ways that clinical documentation and reported codes across the continuum impact SHFFT performance:

  • Identification of patients included in the EPM. The assigned MS-DRG impacts which discharges are included in the cohort. As one example, consider a patient who would fall into the EPM (MS-DRGs 480?482) unless he or she has a bone biopsy. If reported, the bone biopsy would result in assignment of different MS-DRGs (477?479) and the discharge would not be included in the EPM.
  • Establishment of target costs. The capture of the MCC and/or CC impacts establishment of the episode target price.
  • Determination of related costs. The costs for hospital readmissions within the episode are included in episode costs if the readmissions are related. The assigned MS-DRG for the readmission determines whether the readmission is related.

The costs associated with Part B claims are included in episode costs if the services are related. The primary diagnosis for each visit determines whether the visit is related.

  • Reported complications. Assignment of ICD codes for the following conditions are counted as complications when those conditions result in inpatient readmission:
  • Complication risk adjustment. As with other hospital-centric measures such as risk-adjusted readmission and mortality rates, comorbidities reported for the 12 months prior to the anchor hospitalization are used to assess case-mix complexity. The CMS risk adjustment module uses defined comorbidity categories to identify conditions that impacted predicted rates of complications for the THA/TKA cohort.

The capture of at least one condition for each of the 28 comorbid categories over the 12-month period will strengthen risk adjustment and RSCR performance. RSCR performance contributes to 50% of the quality composite score, which, in turn, impacts the quality-adjusted target price.

 

Summary

Together the CJR and SHFFT models cover all surgical treatment options (hip arthroplasty and fixation) for Medicare beneficiaries with hip fractures. These MS-DRGs typically represent one of the largest inpatient surgical volumes for most short-term acute care hospitals.

As hospitals and collaborators assess and refine the management of patients to achieve or exceed the quality-adjusted target price, the data we submit on claims will be used to assess our performance. The CDI program in the inpatient and ambulatory setting must be positioned to promote and support the capture and reporting of impactful documentation.

Additional information on the proposed rule can be located at https://innovation.cms.gov/initiatives/epm.

 

Editor’s note

Newell is the director of CDI quality initiatives for Enjoin. Her team provides CDI programs with education, infrastructure design, and audits to successfully and sustainably address the transition to value-based payments. She has extensive operational and consulting expertise in coding and clinical documentation improvement, case management, and health information management. You can reach Newell at 704-931-8537 or [email protected].

 

Computer-assisted coding: Where are we today?

by Lori-Lynne A. Webb, CPC, CCS-P, CCP, CHDA, COBGC, CDIP

In our computer-savvy tech world, the medical field has been notoriously slow to respond to newer technologies and applications of computer-assisted enhancements. However, in the HIM market, computer-assisted coding (CAC) has been touted to boost coding accuracy and productivity, in addition to being an important tool for the remote inpatient coder. 

 

Background

The term CAC denotes technology that automatically assigns codes from clinical documentation for a human to review, analyze, and use, according to the Journal of AHIMA.

Currently, there are a variety of methodologies, software, and integration interface applications that enable a CAC application to read text and assign codes. This type of software reads the information in a similar way to how a spell-check application works on a traditional computer. According to some users, data-driven documentation (e.g., documentation that is dictated or typed) is more accurately processed by the CAC software than documents that are scanned into the system for the software to use.  

CAC software works through recognition; it learns words and phrases, as well as learning the areas within a specific document where standardized words and phrases appear. CAC software also has the ability to discern the context or meaning of those words and phrases. The program then analyzes and predicts what the appropriate ICD-10-CM/PCS codes should be for the documented diagnoses and procedures it finds within the specified documents.

Software providing CAC functionality has been available for over 10 years, but it has come to the forefront of inpatient coding with the implementation of ICD-10-CM/PCS. CAC has allowed hospitals to reduce lag times and enhance DRGs while also finding missed MCC/CC diagnoses. The usage and integration of an electronic health record (EHR) has also played a role in better code assignment and usage for data analysis and outcomes.

It is yet to be shown whether CAC actually enhances a coder’s productivity rate. On the upside, CAC does give the coder a great place to start when working on a difficult inpatient record. CAC is now where we were more than 20 years ago when encoders were first introduced into the inpatient hospital marketplace for coding, abstracting, and data analysis.

 

Pros and cons of CAC

Due to the complexity of inpatient care records, clinical documentation, and the complexity of medical terms and abbreviations, many hospitals only use CAC together with intervention by human coders. However, the latest CAC software technology employs a type of natural language and syntax processing to compare, contrast, and extract specific medical terms from electronic data or typed text?so CAC stand-alone technology does exist. In studies conducted by AHIMA, though, the combination of a CAC with a coder/auditor has been proven to be just as good, or better than, a coder or CAC alone.

The biggest challenge CAC poses might be getting buy-in from the hospital coding and HIM staff. The HIM, coding, and clinical staff must all be a part of the changes and be on board with learning how to use this technology enhancement. In the past, there has been some uncertainty and fear related to CAC eliminating coders’ jobs. However, a good CAC solution in conjunction with HIM management allows coders to apply their critical thinking and analytical skills to create well-coded documentation of patients’ care. This, in turn, results in more accurate DRG assignment and reimbursement for the facility.

HIM and coding staff’s responsibility and role in the fiscal revenue stream will change as a result of CAC and similar technology. With this change must comes the acceptance that it takes both a human and a computer to successfully transform a CAC product into good financial outcomes and even better documentation.  

As coders will surely agree, the final code selection for inpatient records should be based upon coders’ knowledge of coding guidelines, clinical concepts, and compliance regulations. When working with CAC, the coder has the ability to agree with or to override codes that the software determines.  

Coders have the education to understand why a diagnosis or procedure should or should not be coded in a specific situation, and by using CAC, they can help the software learn to identify the importance of specific documentation and its relation to ICD-10-CM/PCS codes.

Many CAC vendors will try and sell their product based on the following list of features and benefits:

  • Better medical coding accuracy
  • Faster medical billing
  • Greater coder satisfaction
  • Identification of clinical documentation gaps
  • Increased coder productivity
  • More revenue from more detailed bills
  • Return on investment?the CAC system quickly pays for itself

 

As we’ve said, it hasn’t been shown that CAC actually increases coders’ productivity. In reality, their productivity will probably stay the same, as a coder will still have to audit the information to determine whether the code generated by the software is correct. But in regard to the other CAC benefits on the above list, coder satisfaction should not be overlooked.

During AHIMA’s pilot testing of CAC software, the organization weighed in on some of the potential issues with using CAC software alone (with no human intervention). AHIMA noted that within specific areas of the pilot CAC testing in ICD-10, the coders did not accept 75% of the diagnosis codes presented, and they did not accept 90% of the procedure codes presented within the code sets. However, the information that the CAC software presented did give the coders a good starting reference to drill down to a more comprehensive diagnosis or procedure code.

Coders and CDI personnel will still need to be in charge of the following:

  • Ensuring clinical documentation is complete and querying when appropriate
  • Ensuring complete coding (e.g., for specificity)
  • Ensuring correct sequencing of diagnosis and procedures
  • Reviewing CCs/MCCs and DRG assignments with case complexity and severity

 

CAC, clinical documentation, EHR, and providers

Integration of clinical documentation from providers and physicians has always been a challenge, and combined with the implementation of ICD-10, it has presented a huge impetus for the adoption of CAC technology in hospital- and facility-based organizations.

Unfortunately, physicians still don’t provide thorough documentation, instead relying on CDI and coding staff to guide them. There has always been a disconnect in the language spoken by providers and the language spoken by coders. Physicians document in their comfort zone and fall back on terms such as "pneumonia," whereas a coder is looking for much more specificity. The integration of an EHR-based program and CAC for providers can lead to a good team relationship for both parties.Many CAC programs integrate well with hospital-based CDI programs and EHRs. These combination interfaces allow more real-time processing of possible code selection prior to the coder’s audit and review of the final code selection.

When the CAC software identifies these possibilities, there is an opportunity to identify and improve the DRGs with MCCs and CCs, as well as more quickly address areas for query and missed procedures or diagnoses.

Wrapping it all up

It is evident that coders and HIM professionals need to make a commitment to embrace change, which includes new technologies and integration of learning processes and opportunities. A hospital’s success depends on the coder acting as part of a team that will strive for successful outcomes for both the patient and the hospital.

 

Editor’s note

Webb is an E/M and procedure-based coding, compliance, data charge entry, and HIPAA privacy specialist with more than 20 years of experience. Her coding specialty is OB/GYN office/hospitalist services, maternal fetal medicine, OB/GYN oncology, urology, and general surgical coding. She can be reached via email at [email protected], and you can find current coding information on her blog at http://lori-lynnescodingcoachblog.blogspot.com. This article originally appeared on JustCoding, and opinions expressed are those of the author and do not represent HCPro or ACDIS.

 

Key attributes for coders moving forward amidst the 2017 coding guideline changes

by Laura Legg, RHIT, CCS, CDIP, AHIMA-approved ICD-10-CM/PCS trainer

Resiliency is the ability to spring back or rebound. In sports, it’s one of the mental attributes a player must have. Coders are resilient: bouncing back from one change after another, deciding to code smarter and faster, and having the patience to do whatever is expected?even amid closing grace periods and guideline controversies.

The change to ICD-10 in October 2015, was a solid transition, and no one in healthcare was affected by it more than coders. The changes didn’t stop there. The coming months will again prove to be challenging for coders because of the new ICD-10 codes for both CM and PCS beginning October 1, 2016. Along with that, we’ll see the end of the CMS grace period on code specificity for Part B, and updated ICD-10-CM Official Coding Guidelines. Coders have a lot to learn this fall.

The Centers for Disease Control and Prevention published guidelines for discharges effective October 1, 2016, that have been approved by the four organizations that make up the Cooperating Parties for ICD-10-CM: the American Hospital Association, the American Health Information Management Association, CMS, and the National Center for Health Statistics.

The guidelines are available at www.cdc.gov/nchs/data/icd/10cmguidelines_2017_final.pdf. In the linked document, the changes are indicated in bold type for easy identification. Below are some of the highlighted changes.

 

Excludes1

This guideline supports the interim advice published last fall. Here, the Cooperating Parties have given instructions that two conditions unrelated to each other represents an exception to the Excludes1 definition. If it is not clear whether the two conditions are related, coders must query the provider.

 

With

Under Section I.B.7 of the guidelines, "multiple coding for a single condition" clarification has been added for interpretation of the word "with."

The word "with" should be interpreted to mean "associated with" or "due to" when it appears in a code title, the Alphabetic Index, or an instructional note in the Tabular List. The classification presumes a causal relationship between the two conditions linked by these terms.

These conditions should be coded as related even in the absence of provider documentation explicitly linking them, unless the documentation clearly states the conditions are unrelated. For conditions not specifically linked by this term in the classification, provider documentation must link the conditions in order to code them as related.

 

Code assignment and clinical criteria

Also under Section I, the Official Guidelines for Coding and Reporting tell us that the assignment of a diagnosis code is based on the provider’s diagnostic statement that the condition exists. The provider’s statement that the patient has a particular condition is sufficient. Code assignment is not based on clinical criteria used by the provider to establish the diagnosis.

Coders are instructed to assign a diagnosis or procedure code according to physician documentation. Coders have been told in the past not to question the physician’s clinical judgment. This appears to be pretty simple until audits from outside the organization place more emphasis on the use of clinical criteria. This use of clinical criteria to assign reported codes is known as "clinical validation." When coders follow the official coding guideline instructing them that a code assignment is not based on clinical criteria used by the provider to establish the diagnosis, they will be caught between following the guideline as instructed and being presented with a claim denial based on the absence of clinical validation.

In today’s healthcare environment, it is essential that organizations face this issue head on and provide coders with guidance on how to solve the dilemma of a record that contains physician documentation but does not contain clinical validation. Clinical documentation improvement efforts to improve upon complex clinical condition documentation must continue to bring the coding and medical records together to allow coders to code correctly and avoid payer denials.

CMS must clarify the reason the Recovery Auditors are allowed to deny claims, whether auditors will bypass this official coding guideline, and how organizations can reconcile the discrepancy.

 

Laterality coding

This update clarifies that when a patient with a bilateral condition has surgical correction on both sides, the first side corrected is coded with the bilateral code. The second site is not coded using the bilateral code because the condition no longer exists on the corrected side. If the treatment on the first side did not completely resolve the condition, then the bilateral code is used.

Documentation for BMI, non-pressure ulcers, and pressure ulcer stages

Section I.B.14 says for body mass index (BMI), depth of non-pressure chronic ulcers, pressure ulcer stage, coma scale, and NIH Stroke Scale (NIHSS) codes, code assignment may be based on medical record documentation from clinicians who are not the patient’s provider. Dietitians often document the BMI, nurses often document pressure ulcer stages, and an emergency medical technician often documents the coma scale. Keep in mind the associated diagnosis must be documented by the patient’s provider. A query should be used to clarify any conflicting medical record documentation.

This guideline shows the addition of the coma scale and NIHSS to conditions where code assignment can be determined from clinicians who are not the patient’s provider. Many coders may not be familiar with the ­NIHSS?it is a 15-item neurologic examination used to evaluate the effect of acute cerebral infarction. The NIHSS evaluates:

  • Levels of consciousness
  • Language
  • Neglect
  • Visual field loss
  • Extraocular movement
  • Motor strength
  • Ataxia
  • Dysarthria
  • Sensory loss

 

The NIHSS evaluation is often done by nursing staff and can help physicians quantify the severity of a stroke in the acute setting.

 

Zika virus infection

The official guidelines instruct coders to code only confirmed cases of the Zika virus with code A92.5 as documented by the provider. Note that this is an exception to the hospital inpatient guidelines. "Confirmation" does not require documentation of the type of test performed; the physician’s diagnostic statement that the condition is confirmed is sufficient. Documentation of "suspected," "possible," or "probable" Zika is not assigned to code A92.5.

 

Hypertensive crisis

A coding guideline has been added to instruct coders to assign a code from category I16 for hypertensive urgency, hypertensive emergency, or unspecified hypertensive crisis. This may call for some physician documentation education to make physicians aware that these more specific codes are available and can be used instead of documentation of hypertension without any further description.

 

Coma scale

In addition to using the coma scale codes (R40.2-) for traumatic brain injury codes, acute cerebrovascular disease codes, or sequelae of cerebrovascular disease codes, the coma scale may be used to assess the status of the central nervous system for other non-trauma conditions. Examples include monitoring patients in the ICU regardless of their medical condition.

 

Observation

One observation Z code category has been added for use when a newborn patient is being observed for a suspected condition that is ruled out. The new code category is Z05: encounter for observation and evaluation of newborn for suspected diseases and conditions ruled out.

 

Newly added ICD-10 codes

CMS will implement an unprecedented number of new code changes October 1. A partial code freeze prevented regular updates for the last five years, resulting in the release of over 5,000 ICD-10 revisions on that date. The newest coding updates can be found at https://www.cms.gov/Medicare/Coding/ICD10/Latest_News.html.

The new ICD-10 codes come as we thaw out from the code freeze that has been in effect since October 1, 2011. Since that time, we have received only limited code updates to both the ICD-9 and ICD-10-CM/PCS code sets. Now, the long delay is over. ICD-10-CM changes include 1,928 diagnosis code changes with expanded code choices for atrial fibrillation, heart failure, diabetes mellitus Type 2, disorders of the breast, and pulmonary hypertension.

Extensive PCS updates are also being implemented. There are 3,651 new PCS codes, revised code titles, and a grand total of 75,625 valid codes with this update. It is important to note that 87% of the PCS code updates are in the cardiovascular system.

Following adoption of the new codes, review of coding accuracy will be needed. Any misconceptions or incorrect rationale should be recognized and communicated early to prevent ongoing or costly patterns from developing. Remember to ensure software updates are also in place and scheduled on time.

The new cardiovascular PCS codes include:

  • Unique codes for unicondylar knee replacement
  • Codes involving placement of an intravascular neurostimulator
  • Expanded body part detail for the root operations Removal and Revision
  • New codes in lower joint body system
  • New codes for intracranial administration of substances such as Gliadel chemotherapy wafer using an open approach
  • Addition of bifurcation qualifier to multiple root operation tables for all artery body part values
  • Specific body part values for the thoracic aorta
  • Specific table values to capture congenital cardiac procedures
  • Unique device values for multiple intraluminal devices

 

Other PCS changes include:

  • Donor organ perfusion
  • Face transplant
  • Hand transplant

 

The impact of the new codes will depend on what you do, so it’s important for hospitals to assess how the changes will affect them specifically. If you don’t deal with the areas where the codes have changed, the updates will be much easier than if your facility uses all the affected codes. Make sure the applicable codes are integrated into your internal applications and processes, while verifying that vendor products support the new codes. You don’t want to have claims rejected because not all of the new codes were incorporated.

Overall, there are moderate changes to the Official Guidelines for Coding and Reporting. The 2017 coding updates, however, are extensive and may seem overwhelming to some coders. The addition of over 10,000 codes after only one year of using ICD-10 will require coder resiliency to learn them all and understand how to apply them.

HCPro.com – Briefings on Coding Compliance Strategies