Check Request Status610-994-7500

12 Criteria to Assess and Mitigate BA Management Risk

Anthony Murray and Rita Bowen explain it is crucial that healthcare organizations be detail-oriented and methodical in assessing their business associates. Furthermore, they urge organizations to conduct an assessment of the vendor’s compliance with HIPAA regulations, the integrity of the vendor’s data and its breach prevention practices. They believe it is essential that the vendor meets the 12 requirements outlined in this article.

Read More

Payer Access to EHRs: What Providers Need to Know

In a Journal of AHIMA article, MRO’s Greg Ford and Rita Bowen discuss payer access to electronic health record (EHR) systems, and how providers should recognize that they have choices about how to share this data. By carefully evaluating the benefits and risks to their organizations and patients, providers can protect themselves against inherent risks related to financial health, privacy, security, and information governance.

Read More

Eight ROI Missteps to Avoid

In a For The Record magazine article, MRO’s Danielle Wesley, Esq. and Rita Bowen, MA, RHIA, CHPS, CHPC, SSGB are quoted on how to avoid a misstep when it comes to distinguishing between patient and third-party requests. They discuss the problems with current OCR guidance, as well as strategies that can be used to help combat this issue.

Read More

HIM Leaders Identify ROI Priorities and Strategies

In a For The Record E-News Exclusive, MRO’s Angela Rose summarizes a national survey about Release of Information, conducted by Porter Research, an independent market intelligence and research group focused on HIT. The findings provide valuable perspectives for HIM departments to consider and assess as they move into the 2020 budget and planning season.

Read More

Critical Practices to Improve Business Associate Management

In an HealthData Management ‘HIT Think’ article, MRO’s Anthony Murray and Rita Bowen discuss the critical role business associates play in a provider’s privacy and security program. They describe how more provider organizations incorporate HITRUST and SOC 2 frameworks into their third-party assurance processes. Together, HITRUST and SOC 2 provide the basis for an effective BA management program that promotes communication, confidence and common ground.

Read More