Cape Fear Valley Health System Corporate Compliance, HIPAA, and ACO Module Annual Required Education
|
|
- Lorena King
- 6 years ago
- Views:
Transcription
1 Cape Fear Valley Health System Corporate Compliance, HIPAA, and ACO Module Annual Required Education If you have any questions, please contact: Iris Murphy Corporate Compliance Officer (910) Sherri Roberts Privacy Officer (910) Last Updated:
2 Introduction This self-guided training will provide education on the: I. Corporate Compliance Program and Code of Conduct Policy; II. Health Insurance Portability and Accountability Act (HIPAA) Program; and III. Accountable Care Organization. There is a certification statement at the end of this training that you will be required to answer. By agreeing with this statement, you are giving your word that you have read, understand, and agree to abide by all of the information included in this training.
3 Part I: Corporate Compliance Program, Code of Conduct, and Related Policies
4 Objectives The objectives for Part I are to: Provide an overview of the Corporate Compliance Program; and Identify core compliance policies.
5 What is the Corporate Compliance Program? The Corporate Compliance Program ( Compliance Program ) was established in 1997 by a resolution of the Board of Trustees to show Cape Fear Valley Health System s ( Cape Fear Valley ) commitment to honest and responsible corporate conduct. The Compliance Program provides education related to the Code of Conduct and other compliance related policies, conducts investigations into alleged wrongdoing, and performs monitoring activities (such as audits and reviews) to assess areas of risk within the organization.
6 What does compliance mean? In the healthcare setting, compliance means following the rules, regulations, policies, and laws created by the government, insurance programs, and payers. It also means following the Health System s policies and procedures.
7 What department administers the Corporate Compliance Program? The Corporate Compliance, Internal Audit, and HIPAA department administers the Corporate Compliance Program. Under the direction of Iris Murphy, the department carries out the tasks required under an effective compliance program such as: Education and training Audits Investigations of wrong-doing
8 Who is the Corporate Compliance Officer? Iris Murphy, Corporate Director of Compliance, Internal Audit, and HIPAA, has been designated the Corporate Compliance Officer. Ms. Murphy reports directly to the Chief Executive Officer and to the Ethics and Compliance Committee of the Board of Trustees.
9 Compliance Program Basics Cape Fear Valley s Compliance Program includes seven fundamental elements as defined by the U.S. Federal Sentencing Guidelines: 1. Written standards of conduct and policies and procedures. 2. Designation of a Chief Compliance Officer with direct access to the Board of Trustees. 3. Education and training for all new hires, with annual training for all staff. 4. Processes to receive anonymous complaints without fear of retaliation. 5. Processes and procedures to respond to allegations of wrongdoing. 6. Audits to identify potential problem areas. 7. Effective means to take corrective action to remedy any weaknesses.
10 Core Compliance Policies Cape Fear Valley has two core policies that make up the Compliance Program 1. Corporate Compliance Policy: This policy explains the structure of the Compliance Program. 2. Code of Conduct Policy: The code defines work rules and behaviors for those who work at Cape Fear Valley Health System.
11 Corporate Compliance Policy The general principles of the Corporate Compliance Policy are that: It is the policy of Cape Fear Valley to comply with applicable Federal, State, and local laws and regulations - both civil and criminal; Cape Fear Valley s workforce has a duty to obey all laws and regulations that govern the Health System; and Cape Fear Valley, in turn, has a duty to follow-up on any questions that have been asked in a confidential manner without any retaliation towards the workforce member. Corporate Compliance Policy
12 How does Cape Fear Valley inform its workforce of its commitment to ethical and legal conduct? Cape Fear Valley s Code of Conduct ( Code ) provides guidance to workforce members. The Code is available in Policytech. New employees receive a copy of the Code during New Employee Orientation. Vendors, medical staff members, and the Board of Trustees also receive a copy of the Code. The Code defines the standards of behavior at Cape Fear Valley. Code of Conduct Policy
13 Who is responsible for compliance? All workforce members are required to follow the Code of Conduct, Corporate Compliance Policy, Health System policies, and laws and regulations that govern Cape Fear Valley. Employees are obligated to report violations of the Code of Conduct and other policies. Every member of Cape Fear Valley s workforce is required to promptly report any suspected violation.
14 What is Fraud, Waste, and Abuse? Fraud includes obtaining something of value through intentional misrepresentation or concealment of material facts. Waste includes incurring unnecessary costs as a result of deficient management, practices, or controls. Abuse includes excessively or improperly using government resources.
15 Examples of Healthcare Fraud and Abuse Examples of healthcare fraud and/or abuse include, but are not limited to, Billing for services or supplies that were not provided; Billing for services that are not medically necessary; Providing false information on records; Offering incentives, bribes, or payment in exchange for healthcare referrals; Billing Medicare as primary when it is secondary; Charging excessively for supplies or services; Providing services that do not meet professional standards.
16 Fraud and Abuse Laws There are numerous laws and regulations that apply to healthcare organizations. The five Federal fraud and abuse laws that are most relevant to physicians and other workforce members are: 1. The False Claims Act 2. The Anti-Kickback Statute 3. The Physician Self-Referral Statute 4. The Exclusion Authorities 5. The Civil Monetary Penalties Law
17 What is the False Claims Act? The False Claims Act makes it illegal to submit false or fraudulent claims for payment to Medicare or Medicaid. Claims may be false if the service is: Not actually rendered to the patient; Provided, but already covered under another claim; Miscoded; Not supported by documentation in the medical record.
18 How does Cape Fear Valley Avoid Violations of the False Claims Act? Cape Fear Valley has policies and procedures that reinforce its commitment to the highest ethical standards when submitting claims for payment. These policies and procedures are located in PolicyTech and are summarized in the Code of Conduct and Corporate Compliance policies. Workforce members are obligated to report improper conduct. Cape Fear Valley has a no retaliation policy for good faith reporting.
19 How Can Fraud and Abuse Be Prevented? Fraud and abuse can be prevented by ensuring that the workforce is appropriately trained. All departments are responsible for having processes and procedures in place to help ensure that staff is appropriately trained. The Financial Standard Operating Procedures (Charging) Policy, establishes guidelines to be used by each department entering orders or charges to include Charge Description Master ( CDM ) maintenance, training, and verification of patient orders, charges, and billing. Financial Standard Operating Procedures (Charging) Policy
20 What is the Anti-Kickback Statute? The Anti-Kickback Statute prohibits asking for or receiving anything of value in exchange for referrals of Federal health care program business. Kickbacks are illegal because they can lead to overutilization of items or services, Increased costs, corruption of medical decision making, patient steering, and unfair competition. Prohibited kickbacks include: Cash for referrals Free rent for medical offices Excessive compensation for medical directorships
21 What is the Physician Self-Referral Statute? The Physician Self-Referral Statute (aka Stark law) prohibits physicians from referring Medicare or Medicaid patients for designated health services (i.e. labs, physical therapy, home health) to entities with which they have a financial relationship, unless an exception applies. Consequences of violating the Physician Self-Referral Statute are: Payment denial Monetary penalties Exclusion from participation in the Federal health care programs
22 Exclusion Authorities Under the Exclusion Authorities, the Office of Inspector General (OIG) may exclude providers from participation in Medicare and Medicaid. Excluded providers may not bill for treating Medicare and Medicaid patients. Cape Fear Valley screens employees, vendors, and others to help ensure that they have not been excluded from participation in a Federal health care program. Those who have been excluded are Ineligible Persons. Cape Fear Valley does not hire or do business with Ineligible Persons.
23 Civil Monetary Penalties Law The Office of Inspector General has the authority to seek civil monetary penalties for a wide variety of abusive conduct, including: Presenting a claim that is false or fraudulent because it is for a medically unnecessary procedure; Overcharging or double billing Medicare patients.
24 Under no circumstance is a supervisor, manager, director, or any other member of management or Cape Fear Valley s workforce to instruct any workforce member not to report information to or to withhold information from the Corporate Compliance Officer. Who can help with difficult decisions? There are many resources available to the workforce at Cape Fear Valley to help decide if there is a policy, law, regulation, or standard that applies to a specific circumstance. Options include: Asking one s manager for guidance; Contacting Legal Services; Contacting the Compliance Department; Calling the Confidential Message Line.
25 What is the Confidential Message Line? The Confidential Message Line is another way to report suspected violations. It is the right of all individuals when faced with a compliance issue that they do not wish to report to their supervisor or others in the chain of command, to report the concern by calling the Confidential Message Line at (910) A Confidential Message Line flyer is displayed in a prominent location in each department throughout the Health System, including all locations not on the main campus. Individuals will not be retaliated against by Cape Fear Valley for good faith reporting of compliance concerns.
26 What is a Conflict of Interest? A conflict of interest exists when a workforce member s judgment could be affected because of a personal interest in the outcome of a decision over which he/she has influence or control. Examples of a conflict of interest include, but are not limited to: Employees requisitioning or approving items or services from a vendor to whom they are related (e.g., parents, siblings, spouse, in-laws); Accepting dinner invitations, tickets to sporting events, and lavish gifts of items or services from vendors; Influencing the selection of vendors who are household members.
27 Declaration of Potential Conflicts All employees are expected to complete a Conflict of Interest Questionnaire declaring any potential conflicts and any outside employment. A new questionnaire is to be completed each year or when a change occurs (e.g., department transfer). Anytime during the year if a potential or perceived conflict arises, the employee is expected to immediately contact his/her manager for an interpretation of policy prior to making any commitment.
28 Declaration of Potential Conflicts The Conflict of Interest Policy is located in PolicyTech and the Questionnaire is located on the Human Resources web page. Conflict of Interest Policy
29 Can Workforce Members Accept Gifts or Charitable Contributions from Vendors? All offers for charitable contributions must go directly to the Cape Fear Valley Health Foundation for the benefit of a Cape Fear Valley entity. Workforce members are prohibited from soliciting or accepting gifts, favors, invitations, etc., from persons or entities who are seeking to retain or obtain business from Cape Fear Valley.
30 Can Workforce Members Accept Gifts or Charitable Contributions from Vendors? The Gifts or Other Items of Value from Vendors, Contractors, or Suppliers policy explains the limits on the acceptance of gifts or other items of value. Gifts or Other Items of Value from Vendors, Contractors, or Suppliers Policy
31 Deficit Reduction Act (DRA) The DRA includes provisions that target Medicaid program integrity and fraud and abuse, including: Entities that receive/make payments to the State Medicaid Program of at least $5,000,000 annually must provide Federal False Claims Act education to their employees. The CMS Medicaid Integrity Program was established to provide more resources for CMS to fight Medicaid fraud, waste, and abuse. The CFV Compliance Program includes written policies and procedures addressing the False Claims Act, whistleblower protections, and the detection and prevention of fraud and abuse, as well as training and education regarding the Act for its employees.
32 Responsibilities CFVHS views participation in Federal and State medical assistance programs to be an integral part of its mission of the promotion of health to the community. Employees are expected to participate in education classes to ensure correct billing of patient claims, as well as to report any known or suspected violations of Medicare/Medicaid billing rules or regulations to the Corporate Compliance Officer. CFVHS protects the confidentiality of any employee who makes such a report, and no employee should experience retribution by the Health System for good-faith reporting.
33 Duty to Report Violations It is the duty of each CFVHS employee/agent to report any suspected violation of these standards to the Corporate Compliance Officer. Employees may raise concerns and report actual or suspected compliance violations through the CFVHS Confidential Message Line at (910) Callers are assured that their anonymity will be protected and they will not suffer retaliation as a result of the disclosure. Alternatively, suspected violations of these standards may be reported to CFVHS s Chief Executive Officer ( CEO ) or Chief Financial Officer ( CFO ).
34 Corporate Compliance is Everyone s Responsibility It is everyone s responsibility to do the right thing by: Asking questions Requesting additional education when needed Reporting concerns and suspected or known violations The Compliance Department is here to assist you - please report any violations.
35 Part II: Health Insurance Portability and Accountability Act of 1996 (HIPAA), HITECH Breach Reporting, and Identity Theft Prevention Program If you have any questions, please contact: Sherri Roberts Privacy Officer (910)
36 Objectives The objectives for Part II are to: Provide an overview of HIPAA Privacy and Security Rules. Explain HITECH Breach Reporting requirements. Provide an overview of Cape Fear Valley s Identity Theft Prevention Program and Policy.
37 What is HIPAA? Health Insurance Portability and Accountability Act of 1996 ( HIPAA ) regulations are Federal laws that require covered entities to keep patient information private and secure. Covered entities - such as hospitals, physician and dental offices, pharmacies, and health plans - may not use or disclose protected health information ( PHI ) except as permitted or required by HIPAA.
38 Accessing Patient Information Covered entities must make reasonable efforts to limit the use or disclosure of, and requests for, protected health information ( PHI ) to the minimum amount necessary to accomplish the intended purpose. Access to patient information is based on a Need To Know. This need to know must be for job related duties to carry out essential health care functions - e.g., treatment, payment, and health care operations. The need to know includes the patient s personal information. There are serious consequences for looking at someone s PHI without a need to know.
39 What is the Purpose of the Confidentiality and Information Access Policy? The purpose of the Confidentiality and Information Access policy is to safeguard the integrity and reasonable access of CFVHS data and information and to protect and safeguard confidential and proprietary information pertaining to patients, caregivers, employees, and CFVHS operations. CFVHS has the right to audit any aspect of the computer system - including employee - to monitor compliance with this policy. Employees do not have the expectation of privacy in anything they create, send, or receive on the computer. Confidentiality and Information Access Policy
40 Confidentiality Agreement Employees and other workforce members sign the Confidentiality and Information Access Agreement ( Agreement ) before receiving access, and annually thereafter. Physicians and Allied Health Practitioners sign the Agreement as part of the credentialing process and each time they are re-credentialed.
41 Confidentiality Agreement Contractors who have a Business Associate Agreement and who access computer systems from outside CFVHS may be waived from signing the Agreement. Entities who need access to the computer system, but with whom CFVHS does not have a contractual agreement, sign a Non-Disclosure Statement and other documents requested by Information Services and Technology ( IST ).
42 Users are to utilize the same care in drafting and other electronic documents as they would for any other written communication. Anything created on the computer may be reviewed by others. that is sent to a non-cape Fear Valley account may be scanned for PHI that is not encrypted or password protected.
43 s containing patient information or other sensitive information that are sent outside of Cape Fear Valley are to be sent secure, with the tag [SendSecure] at the beginning of the Subject line. When sending Group s (e.g., to all Department Managers) it is important to ensure that all individuals included in the group have a need to know the information that is being sent to them.
44 The person visiting may be someone the patient does not want to know his or her personal business. Discussing Patient Information Before discussing PHI, make sure you are in an area where others cannot overhear your conversation. Dad won t tell me anything. What s wrong with him? I understand your concern, but I can t discuss his health care without his consent. HIPAA tells us we may discuss a patient s care with people who are involved in their care if the patient does not object. Before discussing the care of a patient in front of visitors, ask the patient if he or she wants the visitors to be involved in the discussion.
45 Disclosure of Patient s Location in the Health System If the patient is asked for by name, then the patient s location and general condition may be given without the patient s permission. However, there is a patient Opt Out exception to the rule that a patient s location and general condition may be disclosed. When a patient makes the opt-out election, the patient s location and condition status is protected and confidential, and may not be disclosed. If you do not know the Opt Out status of a patient, contact the Operator to determine the Opt Out status.
46 Faxing Misdirected faxes are the most common HIPAA Breach. To prevent errors, verify that you have selected the correct provider when entering orders. Verify all fax numbers before faxing. If a document is misdirected, ask the recipient to return the document. You can arrange to pick up the document or ask that the document be shredded if it cannot be returned. Report misdirected faxes to the Privacy Officer.
47 Computer Infrastructure Security Cape Fear Valley depends on its workforce to use the computer system as a tool in caring for patients and in daily business activities. Cape Fear Valley s security policies address various areas to include social networking, cell phone usage, , passwords, virus protection, downloading, and audits.
48 Computer Infrastructure Security Access to information on the computer system is continually audited. Audit trails record information such as the workforce member, the information accessed, and the date and time of the access. These audit trails are used to verify that workforce members have accessed information based on the need to know criterion.
49 Passwords Workforce members with access to Cape Fear Valley s computer system are to use their own user ID and password. The use of another person s User ID and password is prohibited.
50 Social Networking Information about Cape Fear Valley s patients (even if they are not mentioned by name) or business matters are not to be discussed on social networking sites such as Facebook, MySpace, Twitter, Instagram, etc. Any information that may point to a particular patient is considered a violation of the HIPAA Privacy laws.
51 Investigation of Breaches of Privacy Policy Cape Fear Valley Health System takes reasonable action to investigate reported breaches and mitigate alleged harmful effects resulting from the unauthorized use or disclosure of PHI by CFVHS or its business associates. In the event of an identified threat of harm (e.g., the potential for identity theft), CFVHS shall undertake appropriate mitigation measures. The purpose of this policy is to assist CFVHS to comply with the HIPAA Privacy and Security Rules and to minimize harm to the individual as a result of unauthorized use or disclosure of PHI by CFVHS or its business associates. Investigation of Breaches of Privacy Policies and Procedures Policy
52 Office for Civil Rights The Office for Civil Rights ( OCR ) enforces the HIPAA Privacy Rule and the HIPAA Security Rule. The HIPAA Privacy Rule protects the privacy of individually identifiable health information. The HIPAA Security Rule sets national standards for the security of electronic protected health information.
53 Definitions Breach: The unauthorized access, disclosure, or use of PHI in any form, to include electronic and hardcopy. This may be internal or external, and may or may not have a harmful effect. Privacy breaches: Incidents deemed as breaches of patient privacy include, but are not limited to, discussing patient information in public areas, accessing patient information without a need to know, and misuse of PHI. Accessing PHI belonging to one s family members or friends or others is classified as a privacy breach.
54 Definitions Security breaches: Incidents deemed security-related include, but are not limited to, misuse of passwords, unauthorized individuals in an area, failure to lock screens when leaving workstations, ing patient information outside CFVHS that is not password-protected or encrypted, and mis-faxing documents.
55 Definitions Initial Reporting: Members of the workforce have individual responsibility to report suspected privacy and security breaches. Reports may be made by or phone. Initial reporting may be made to: The Health System Privacy Officer The Privacy Hot Line The Confidential Message Line The IST Security Administrator Corporate Risk Management Human Resources
56 Definitions Investigation: Once a suspected breach is reported, an investigation is performed to ascertain the validity of the report. The investigation determines: Whether a breach did in fact occur. How the breach happened (e.g., used wrong fax number, staff member did not sign off of the computer) including an interview of staff members as necessary. What corrective actions need to be implemented to prevent the recurrence (e.g., number pre-programmed into fax machine). HIPAA Assessment Team: Depending upon the nature and level of the breach, a HIPAA Assessment Team (HAT) may be assembled to assist with the investigation.
57 Investigation of Breaches of Privacy and Security Reporting Guidelines Documentation: The Privacy Officer keeps a log of reported breaches, corrective actions, and sanctions. Allegations of breaches of confidentiality that are reported as a patient complaint are forwarded to Patient Relations for follow-up and tracking. Physician/Allied Health Professionals: Report breaches to the Privacy Officer. The Privacy Officer communicates the information to Medical Staff Services.
58 Investigation of Breaches of Privacy and Security Reporting Guidelines Physician and allied health professional breaches are handled by the Privacy Officer in collaboration with Medical Staff Services. Business Associates are required to report, in writing, to the Privacy Officer any use or disclosure of PHI or other sensitive information that is not permitted or required under the terms of the Business Associate Addendum.
59 What is a Level 1 Breach? LEVEL 1 Carelessness, Self-examination of records This occurs when a workforce member unintentionally or carelessly accesses, reviews, or reveals PHI or other sensitive information to himself/herself, or others, without a legitimate need to know the information. Examples include, but are not limited to: Discussing PHI or other sensitive information in a public area. Leaving documentation containing PHI in a public area. Leaving a computer unattended and unlocked in an accessible area. Faxing PHI to a wrong number.
60 What is a Level 2 Breach? LEVEL 2 Curiosity, Concern, or Willful Disregard of Policy (not for personal gain) This occurs when a workforce member intentionally accesses or discusses PHI or other sensitive information for purposes other than for the care of the patient or other authorized purposes. Examples include, but are not limited to: Workforce member intentionally looks up PHI that is not related to his/her job duties. Workforce member shares his/her system password. Workforce member accesses and reviews a record of a patient out of concern or curiosity (this includes family members, friends, and exspouses).
61 What is a Level 3 Breach? LEVEL 3 Personal Gain or Malice This occurs when a workforce member accesses, reviews, or discusses PHI or other sensitive information for personal gain or with malicious intent. Examples include, but are not limited to: A workforce member reviews a patient record for personal use, such as obtaining an address or phone number in order to contact a patient or family member for reasons not related to Health Systems business. A workforce member compiles a mailing list for personal use or commercial use. A workforce member provides PHI to the media for monetary reparation and /or to embarrass the patient or Health System.
62 Disciplinary Action Disciplinary Sanctions are outlined in the Administrative Policy, Investigation of Breaches of Privacy Policies and Procedures. Investigation of Breaches of Privacy Policies and Procedures Policy
63 What is the HITECH Act? The Health Information Technology for Economic and Clinical Health ( HITECH ) Act requires under certain circumstances that patients be informed when their PHI has been breached. Breach notification requirements are triggered when someone gains access to unsecured PHI. PHI is unsecured when it has not been rendered unusable, unreadable, or indecipherable to unauthorized individuals through the use of an approved technology or methodology such as encryption.
64 What is the HITECH Act? Breach notification standards require the provision of notice to affected individuals and in some cases the media. The HITECH Act establishes the methods, content, and time period for providing such notice.
65 HITECH Act Requirements All suspected Breaches are to be reported to the Privacy Officer. Some breaches are required to be reported to the Secretary of Health and Human Services and to the North Carolina Attorney General. HITECH establishes penalties and sanctions for workforce members who violate HIPAA regulations.
66 Identity Theft Prevention Program
67 Medical Identity Theft Medical identity theft occurs when someone steals another person s personal information (e.g. name, Social Security number, Medicare number) to obtain medical care, buy drugs, or submit fake billings to Medicare. Medical identity theft disrupts lives, damages credit ratings, and can be life-threatening to patients if the wrong information ends up in their medical records. Medical identity theft is a significant and growing problem in the U.S. health-care industry. It has been estimated that medical identity theft alone costs tens of billions of dollars a year.
68 Identity Theft Prevention Policy CFVHS takes reasonable measures to identify, detect, and mitigate risks of identity theft of patients and employees of the Health System. The purpose of the Identity Theft Prevention policy is to assist CFVHS with compliance with the N.C. Identity Theft Protection Act of 2005 (NCGS et al.) and the Federal Trade Commission s Identity Theft Prevention Red Flags Rule of 2008 (16 C.F.R. Section 681.2)
69 Identity Theft Prevention Policy Report potential identity theft involving CFVH to the Privacy Officer. The Privacy Officer has the primary responsibility to investigate potential identity theft. Identity Theft Prevention Policy
70 Part III: Accountable Care Organization ( ACO ) Compliance Requirements If you have any questions, please contact: Bart Fiser ACO, Executive Director (910)
71 Objectives The objectives are to: Provide an overview of the Accountable Care Organization ( ACO ) Explain the ACO compliance obligations Describe the duty and protocol for ACO compliance investigation and reporting
72 Accountable Care Organization What is an Accountable Care Organization? An organization of healthcare providers and professionals working together to coordinate care for the Medicare fee-for-service patients that they serve. Cape Fear Valley ACO Mission: To improve the engagement, health, and wellness of community members, enhance the quality of care through clinical and service excellence, and decrease the cost of care using a collaborative team-based approach to care delivery. Cape Fear Valley ACO Vision: To become a nationally recognized leader in population health by providing our community members the best care for the best value.
73 ACO Makeup ACO Participants: Cape Fear Valley Health System, including Cape Fear Valley Medical Center, Highsmith Rainey Specialty Hospital, and physician practices and subsidiaries. Hoke Healthcare Bladen Healthcare ACO Provider/Supplier: Physicians and other practitioners that bill Medicare under an ACO Participant.
74 ACO Compliance Officer Iris Murphy is the Compliance Officer for the Cape Fear Valley ACO. She is responsible for administering the ACO Compliance Program, including: Developing compliance education; Promoting open and anonymous communication regarding any possible compliance violations; and Overseeing the investigation of any reports of suspected non-compliance or improper or illegal behavior.
75 ACO Compliance Plan Cape Fear Valley ACO Compliance Plan covers the key compliance requirements for participation in an ACO. The Compliance Plan utilizes and incorporates Cape Fear Valley s existing policies and procedures where appropriate. You should assume all of the Cape Fear Valley Health System rules, policies and procedures addressed in our compliance training also apply to Cape Fear Valley ACO. In addition, the Compliance Plan also addresses specific ACO regulations. Additional written ACO Policies and Procedures will be developed as appropriate to ensure compliance with all federal requirements. The ACO Compliance Plan, and relevant Policies and Procedures will be located on the InfoWeb and/or in department manuals.
76 Reporting Suspected Compliance Problems Cape Fear provides a Confidential Message Line to report any suspected problems to the compliance officer, including ACO compliance issues. Individuals have a duty to report suspected compliance violations. The Confidential Message Line number is: (910) Individuals will not be retaliated against by Cape Fear Valley for good faith reporting of compliance concerns.
77 Compliance With Laws Participation with an ACO requires strict compliance with applicable federal and state laws, regulations and rules, and CMS guidance, including: Federal criminal law The False Claims Act The Anti-Kickback Statute The Civil Monetary Penalties Law The Physician Self-Referral Law ( Stark Law )
78 False Claims Act Documentation provided by Cape Fear Valley ACO may be used to determine payments to be made by Medicare to Cape Fear Valley ACO. Cape Fear Valley ACO will provide accurate information and data to the government. Employees and contractors are prohibited from making false or fraudulent statements to the government in connection with the ACO.
79 Beneficiary Choice Medicare beneficiaries are assigned to different ACOs based on where they obtain their primary care services. Generally, if a Medicare patient receives the majority of primary care services from a primary care physician affiliated with the Cape Fear Valley ACO, that patient is attributed to the Cape Fear Valley ACO. But ACOs are not closed managed care networks. Patients are free to continue seeing any Medicare provider or supplier. Cape Fear Valley ACO will ensure that such beneficiary choice is maintained.
80 Regulation of Referrals ACO providers/suppliers remain free to refer beneficiaries to non-aco providers/suppliers anytime when: A beneficiary has expressed a preference for a different provider/ practitioner/ supplier. The beneficiary's insurer has made a determination of the provider/ supplier. A referral to an ACO provider/supplier is not in the beneficiary's best medical interests in the judgment of the referring party.
81 Beneficiary Inducements ACO participants, providers and suppliers may not provide any gifts, cash, or other forms of remuneration to beneficiaries for choosing to receive services as part of the ACO network or with an ACO provider. Examples: no baseball tickets, jewelry, household items, or gift certificates.
82 Permitted Beneficiary Inducements: Exception for Certain In-Kind Items/Services There is a limited exception for certain in-kind items and services that are provided to encourage care coordination and beneficiary health awareness. However, any such items and services must meet the following requirement: There is a reasonable connection between the items and services and the medical care of the beneficiary; and The items/ services are preventive care items or services that advance a clinical goal for the beneficiary, including for example adherence to a treatment regimen, adherence to a drug regimen, adherence to a followup care plan, or management of a chronic disease or condition.
83 Notice to Beneficiaries Cape Fear Valley ACO will notify beneficiaries at the point of care that their ACO providers/suppliers are participating in the Medicare Shared Savings Program. Cape Fear Valley ACO will also take the following steps to provide notice: Signs will be posted to notify beneficiaries that their ACO providers/suppliers are participating in the Medicare Shared Savings Program. Standardized written notices regarding participation in an ACO will be provided in settings in which beneficiaries receive primary care services.
84 Marketing Materials and Activities Any ACO marketing materials must be developed in collaboration with the ACO and approved by CMS. This includes any materials used to educate, solicit, notify, or contact Medicare beneficiaries or providers and suppliers regarding the Medicare Shared Savings Program: Marketing materials must not be developed or disseminated without express approval from both the President of Cape Fear Valley ACO and the Cape Fear Valley Legal Department. CMS has clarified that social media can be used as a marketing tool and therefore marketing materials and activities that must be approved include social media, such as Twitter or Facebook.
85 CMS Audits Cape Fear Valley ACO must cooperate with any CMS monitoring or evaluation activities connected to the ACO. Such cooperation includes, but is not limited to: Responding to documentation requests; Collection of any data required to measure performance regarding utilization management and clinical quality; Compliance with recommendations to improve utilization or quality performance or patient satisfaction; Record maintenance.
86 Record Maintenance Cape Fear Valley ACO, and its Participants, are obligated to maintain books, contracts, records, documents, and other evidence for a period of 10 years (or longer in some instances) from the final date of the agreement period or from the date of completion of any audit, evaluation, or inspection, whichever is later. Do not destroy ACO records without written approval from the President of Cape Fear Valley ACO and the Cape Fear Valley Legal Department that such destruction is permitted.
87 ACO Compliance is Everyone s Responsibility It is everyone s responsibility to do the right thing by: Asking questions. Requesting additional education when needed. Reporting concerns and suspected or known violations. The Compliance Department is here to assist you - please report any violations.
88 Questions? If you have any questions or concerns, please contact a member of the Compliance Department. Corporate Compliance Officer ismurphy@capefearvalley.com Privacy Officer sherriroberts@capefearvalley.com Internal Auditor egarcia2@capefearvalley.com Medical Reimbursement Auditor tcassanova@capefearvalley.com Medical Reimbursement Auditor
89 Almost Done Close this window and wait for your Assigned Items list to refresh. When the system is done recording that you have finished the presentation, you can click on the item again to see the option to take the test. Read and indicate agreement with the attestation statement: By agreeing with this statement, you are giving your word that you have read, understand, and agree to abide by all of the information included in this training.
Cape Fear Valley Health System s Corporate Compliance Program
Cape Fear Valley Health System s Corporate Compliance Program If you have any questions, contact: Iris Murphy Corporate Compliance Officer (910) 615-6396 Tricia Urquhart-Jones Privacy Officer (910) 615-4406
More informationCOMPLIANCE TRAINING 2015 C O M P L I A N C E P R O G R A M - F W A - H I P A A - C O D E O F C O N D U C T
COMPLIANCE TRAINING 2015 QUALITY MANAGEMENT COMPLIANCE DEPARTMENT 2015 C O M P L I A N C E P R O G R A M - F W A - H I P A A - C O D E O F C O N D U C T Compliance Program why? Ensure ongoing education
More informationCompliance Program. Health First Health Plans Medicare Parts C & D Training
Compliance Program Health First Health Plans Medicare Parts C & D Training Compliance Training Objectives Meeting regulatory requirements Defining an effective compliance program Communicating the obligation
More informationMedicare Parts C & D Fraud, Waste, and Abuse Training
Medicare Parts C & D Fraud, Waste, and Abuse Training IMPORTANT NOTE All persons who provide health or administrative services to Medicare enrollees must satisfy FWA training requirements. This module
More informationMission Statement. Compliance & Fraud, Waste and Abuse Training for Network Providers 1/31/2019
Compliance & Fraud, Waste and Abuse Training for Network Providers Mission Statement To promote the quality of life of our communities by empowering others and working together to creatively solve unique
More informationMedicare Parts C & D Fraud, Waste, and Abuse Training and General Compliance Training. Developed by the Centers for Medicare & Medicaid Services
Medicare Parts C & D Fraud, Waste, and Abuse Training and General Compliance Training Developed by the Centers for Medicare & Medicaid Services Important Notice This training module consists of two parts:
More informationCompliance Fraud, Waste and Abuse HIPAA Privacy and Security
2017 Compliance Fraud, Waste and Abuse HIPAA Privacy and Security Table of Contents/Agenda Welcome to General Compliance Training for Providers! Training Objectives: Understand why you need Compliance
More informationRidgecrest Regional Hospital Compliance Manual
Printed copies are for reference only. Please refer to the electronic copy for the latest version. REVIEWED DATE: 06/02/2014 REVISED DATE: 07/02/2013 EFFECTIVE DATE: 10/17/2007 DOCUMENT OWNER: APPROVER(S):
More informationMedicare Parts C & D Fraud, Waste, and Abuse Training and General Compliance Training
Medicare Parts C & D Fraud, Waste, and Abuse Training and General Compliance Training Developed by the Centers for Medicare & Medicaid Services Issued: February, 2013 Important Notice This training module
More informationWhat is a Compliance Program?
Course Objectives Learn about the most important elements of the compliance program; Increase awareness and effectiveness of our compliance program; Learn about the important laws and what the government
More information2016 Business Associate Workforce Member HIPAA Training Handbook
2016 Business Associate Workforce Member HIPAA Training Handbook Using the Training Handbook The material in this handbook is designed to deliver required initial, and/or annual HIPAA training for all
More informationDeveloped by the Centers for Medicare & Medicaid Services Issued: February, 2013
Medicare Parts C & D Fraud, Waste, and Abuse Training and General Compliance Training Developed by the Centers for Medicare & Medicaid Services Issued: February, 2013 Important Notice This training module
More informationRegion 10 PIHP FY Corporate Compliance Program Plan
Region 10 PIHP FY 2018 Corporate Compliance Program Plan 1 Mission The purpose of the Region 10 Corporate Compliance Program Plan is to provide quality care for all the individuals it serves by acting
More informationIn this course, we will cover the following topics: The structure and purpose of Navicent Health s Compliance Program The requirements of the
In this course, we will cover the following topics: The structure and purpose of Navicent Health s Compliance Program The requirements of the Navicent Health s Corporate Integrity Agreement (CIA) Your
More informationCommitment to Compliance
Introduction Commitment to Compliance SelectHealth has a compliance oversight program which supports compliant behavior by its employees and any of its contracted business partners, including first -tier,
More informationDeveloped by the Centers for Medicare & Medicaid Services
Medicare Parts C and D Fraud, Waste, and Abuse Training Developed by the Centers for Medicare & Medicaid Services Why Do I Need Training? Every year millions of dollars are improperly spent because of
More informationMENTAL HEALTH MENTAL RETARDATION OF TARRANT COUNTY. Board Policy. Number A.3 July 31, 2001 COMPLIANCE PLAN
MENTAL HEALTH MENTAL RETARDATION OF TARRANT COUNTY Board Policy Board Policy Adopted: Number A.3 July 31, 2001 OVERVIEW COMPLIANCE PLAN As adopted by the Board of Trustees on July 31, 2001 The Board of
More informationHIPAA The Health Insurance Portability and Accountability Act of 1996
HIPAA The Health Insurance Portability and Accountability Act of 1996 Results Physiotherapy s policy regarding privacy and security of protected health information (PHI) is a reflection of our commitment
More informationANTI-FRAUD PLAN INTRODUCTION
ANTI-FRAUD PLAN INTRODUCTION We recognize the importance of preventing, detecting and investigating fraud, abuse and waste, and are committed to protecting and preserving the integrity and availability
More informationVendor Code of Business Conduct & Ethics
Dear Valued Vendor, Horizon Blue Cross Blue Shield of New Jersey, including its subsidiaries and affiliates (collectively, Horizon BCBSNJ ), operates under high standards of conduct and we comply with
More informationTriad Healthcare Network Accountable Care Organization Participants
Triad Healthcare Network Accountable Care Organization Participants Code of Conduct V 052016 Board of Managers Approved May 24, 2016 TABLE OF CONTENTS A message from Steven Neorr... 2 INTRODUCTION... 3
More informationD E B R A S C H U C H E R T, C O M P L I A N C E O F F I C E R
D E B R A S C H U C H E R T, C O M P L I A N C E O F F I C E R INTEGRATED CARE ALLIANCE, LLC CORPORATE COMPLIANCE PROGRAM It is the policy of Integrated Care Alliance to comply with all laws governing
More informationSTANDARDS OF CONDUCT For Care1st s Contracted First-Tier, Downstream, and Related Entities (FDRs)
STANDARDS OF CONDUCT For Care1st s Contracted First-Tier, Downstream, and Related Entities (FDRs) This publication contains Care1st Health Plan s ( Care1st ) basic values for ethical conduct, policies
More informationCompliance and Fraud, Waste, and Abuse Awareness Training. First Tier, Downstream, and Related Entities
Compliance and Fraud, Waste, and Abuse Awareness Training First Tier, Downstream, and Related Entities 1 Course Outline Overview Purpose of training Effective Compliance program Definition of Fraud, Waste,
More informationFraud, Waste and Abuse: Compliance Program. Section 4: National Provider Network Handbook
Fraud, Waste and Abuse: Compliance Program Section 4: National Provider Network Handbook December 2015 2 Our Philosophy Magellan takes provider fraud, waste and abuse We engage in considerable efforts
More informationHIPAA PRIVACY REQUIREMENTS. Dana L. Thrasher Robert S. Ellerbrock, III Constangy, Brooks & Smith, LLP
HIPAA PRIVACY REQUIREMENTS Dana L. Thrasher Robert S. Ellerbrock, III Constangy, Brooks & Smith, LLP dthrasher@constangy.com (205) 226-5464 1 Reasons for HIPAA Privacy Rules Perceived need for protection
More informationMedicare Parts C & D General Compliance Training
Medicare Parts C & D General Compliance Training Developed by the Centers for Medicare & Medicaid Services Issued: February, 2013 Part 2: Medicare Parts C & D Compliance Training Developed by the Centers
More informationFDR. Compliance Guide
FDR Compliance Guide Table of Contents Section I: Introduction to the FDR Compliance Guide iii Section II: SelectHealth Medicare Compliance Program 1 Section III: FDR Compliance Requirements & How to Meet
More informationPREVENTION, DETECTION, AND CORRECTION OF FRAUD, WASTE AND ABUSE
1 of 9 PREVENTION, DETECTION, AND CORRECTION OF FRAUD, WASTE AND ABUSE 1. Purpose The purpose of this policy is to articulate commitment by Kaiser Permanente Hawaii Region to control fraud, waste and abuse
More informationAnti-fraud and Corruption Policy
Anti-fraud and Corruption Policy Responsible Division: Finances Validated by: Board (Executive Committee) Date of approval: 17/05/2017 Date of next review: May 2019 Language versions available: English
More informationCorporate Compliance Program. Intended Audience: All SEH Associates 2016 Content Expert: Lisa Frey -
Corporate Compliance Program Intended Audience: All SEH Associates 2016 Content Expert: Lisa Frey - lisa.frey@stelizabeth.com Developed 2012, reviewed Dec 2015 What is Corporate Compliance? Hospitals,
More informationGeorgia Health Information Network, Inc. Georgia ConnectedCare Policies
Georgia Health Information Network, Inc. Georgia ConnectedCare Policies Version History Effective Date: August 28, 2013 Revision Date: August 2014 Originating Work Unit: Health Information Technology Health
More informationFalse Claims Act and Whistleblower Protections
False Claims Act and Protections Date Implemented: 1/28/2009 Date Reviewed/ Revised: 9/5/2017 Reviewed/ Revised By: SR/KBJ Purpose: To satisfy requirements to provide information and education about False
More informationDisclaimer LEGAL ISSUES IN PHYSICAL THERAPY
LEGAL ISSUES IN PHYSICAL THERAPY Paul J. Welk, PT, JD Tucker Arensberg, P.C. pwelk@tuckerlaw.com 2017 PHCA Annual Convention 1 Disclaimer The purpose of this presentation is to provide a general overview
More informationMultiPlan Code of Business Conduct and Ethics for Network Providers and Third-Parties
MultiPlan Code of Business Conduct and Ethics for Network Providers and Third-Parties ABOUT OUR CODE: MultiPlan is committed to conducting our business with integrity at all times. It s a commitment that
More informationHIPAA Privacy & Security. Transportation Providers 2017
HIPAA Privacy & Security Transportation Providers 2017 HIPAA Privacy & Security As a non emergency medical transportation provider, you deal directly with Medicare and Medicaid Members healthcare information
More informationRequired CMS Contract Clauses Revised 8/28/14 CMS MCM Guidance Chapter 21
Required CMS Contract Clauses Revised 8/28/14 CMS MCM Guidance Chapter 21 The following provisions are required to be incorporated into all contracts with first tier, downstream, or related entities as
More informationInterim Date: July 21, 2015 Revised: July 1, 2015
HIPAA/HITECH Page 1 of 7 Effective Date: September 23, 2009 Interim Date: July 21, 2015 Revised: July 1, 2015 Approved by: James E. K. Hildreth, Ph.D., M.D. President and Chief Executive Officer Subject:
More informationBAY-ARENAC BEHAVIORAL HEALTH AUTHORITY POLICIES AND PROCEDURES MANUAL
Page: 1 of 10 Policy It is the policy of Bay-Arenac Behavioral Health Authority (BABHA) to conduct corporate compliance investigations when a complaint is received and/or there is reasonable cause to suspect
More informationEffective Date: 4/3/17
HIPAA AND HITECH ADM 067.4 Attachment D Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule and Security Rule Health Information Technology for Economic and Clinical Health (HITECH)
More informationTORONTO PORT AUTHORITY CODE OF BUSINESS CONDUCT AND ETHICS. November 29, 2005
TORONTO PORT AUTHORITY CODE OF BUSINESS CONDUCT AND ETHICS November 29, 2005 CODE OF BUSINESS CONDUCT AND ETHICS... 2 SUMMARY OF CODE OF BUSINESS CONDUCT AND ETHICS... 2 EXPLANATION OF THE CODE... 3 1.
More informationCODE OF BUSINESS CONDUCT AND ETHICS
CODE OF BUSINESS CONDUCT AND ETHICS 1. Introduction Shutterstock, Inc. and its subsidiaries ( Shutterstock, the Company or we ) are committed to maintaining the highest standards of ethical conduct. This
More informationDEFICIT REDUCTION ACT AND FALSE CLAIMS POLICY INFORMATION FOR All NEW YORK WORKFORCE MEMBERS
DEFICIT REDUCTION ACT AND FALSE CLAIMS POLICY INFORMATION FOR All NEW YORK WORKFORCE MEMBERS The Company is committed to preventing health care fraud, waste and abuse and complying with applicable state
More informationMedicare Advantage High Level Training
Medicare Advantage High Level Training For contractors, vendors and other non-associates with access to Premera s information or information systems An Independent Licensee of the Blue Cross Blue Shield
More informationHIPAA FUNDAMENTALS For Substance abuse Treatment Industry
HIPAA FUNDAMENTALS For Substance abuse Treatment Industry (c)firststepcounselingonline2014 1 At the conclusion of the course/unit/study the student will... ANALYZE THE EFFECTS OF TRANSFERING INFORMATION
More informationPEDRO J. MORALES, M.D. & TIM P. CARLSON, M.D., P.A. NOTICE OF PRIVACY PRACTICES UPDATED 01/01/2014
PEDRO J. MORALES, M.D. & TIM P. CARLSON, M.D., P.A. NOTICE OF PRIVACY PRACTICES UPDATED 01/01/2014 PLEASE REVIEW, SIGN AND RETURN TO THE FRONT DESK OR MAIL TO: 2191 9 TH Avenue North, Suite 220 St. Petersburg,
More informationMedicare Parts C & D Fraud, Waste, and Abuse Training and General Compliance Training
Medicare Parts C & D Fraud, Waste, and Abuse Training and General Compliance Training Developed by the Centers for Medicare & Medicaid Services Issued: February, 2013 Important Notice This training module
More informationNOTICE OF PRIVACY PRACTICES
NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT COVERED PERSONS MAY BE USED AND DISCLOSED AND HOW COVERED PERSONS CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY.
More informationvendor Code of Conduct
vendor Code of Conduct Revised December Revised June 2017 2013 Table of Contents MESSAGE FROM THE PRESIDENT... 3 SECTION 1 OUR VALUES................................ 4 LEGAL AND REGULATORY COMPLIANCE...
More informationPolicy to Provide Information for Combating Fraud, Waste and Abuse and the Ability of Employees to Report Wrongdoing
1 of 8 and Abuse and the Ability of Employees to Report Wrongdoing 1. Purpose The purpose of this policy is to provide information for combating fraud, waste and abuse and the ability of employees to report
More informationImproving Integrity in Nursing Centers
Improving Integrity in Nursing Centers Susan Edwards Reed Smith LLP AHCA/NCAL s General Counsel Goals of this webinar Introduce you to AHCA/NCAL s Fraud and Abuse Toolkit Provide you with a basic understanding
More informationNOTICE OF PRIVACY PRACTICES
NOTICE OF PRIVACY PRACTICES Original Effective Date: April 14, 2003 Effective Date of Last Revision: August 30, 2013 I. THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED
More informationCurrent Status: Active PolicyStat ID: Fraud, Waste and Abuse
Current Status: Active PolicyStat ID: 2397820 Policy Scope: Date Of Origin: 06/2015 Last Approved: 07/2016 Last Revised: 07/2016 Next Review: 07/2018 Sponsor: Policy Area: Regulatory Tags: Applicability:
More informationCertifying Employee Training Navicent Health s Corporate Integrity Agreement Year Two
Certifying Employee Training Navicent Health s Corporate Integrity Agreement Year Two Corporate Integrity Agreement Effective 4/23/2015 Term of five years Basic Requirement: Maintain a Compliance Program
More informationSelf Funded Provider Manual. Self Funded Provider Manual 1. Section 8: Compliance
Self Funded Provider Manual Section 8 Compliance Self Funded Provider Manual 1 Table of Contents 8 SECTION 8: COMPLIANCE... 3 8.1 COMPLIANCE WITH LAW... 3 8.2 KAISER PERMANENTE PRINCIPLES OF RESPONSIBILITY
More informationCOUNTY OF RIVERSIDE, CALIFORNIA BOARD OF SUPERVISORS POLICY
STANDARDS OF ETHICAL CONDUCT TO ADDRESS C-35 1 of 7 : In the spirit of sound and ethical governance and consistent with California Government Code 8330-8332 (the Citizen Complaint Act of 1997); 27133(d);
More informationSOMERVILLE HOUSING AUTHORITY ANTI- FRAUD POLICY. April 3, 2013
SOMERVILLE HOUSING AUTHORITY ANTI- FRAUD POLICY April 3, 2013 Introduction The Board of Commissioners of the Somerville Housing Authority has established an anti-fraud policy to enforce controls and to
More informationLOGIS Code of Business Conduct and Ethics
LOGIS Code of Business Conduct and Ethics A. Scope This Code of Business Conduct and Ethics applies to all LOGIS directors, officers and employees, as well as to directors, officers and employees of each
More informationMNsure Certified Application Counselor Services Agreement with Tribal Nation Attachment A State of Minnesota
MNsure Certified Application Counselor Services Agreement with Tribal Nation Attachment A State of Minnesota 1. MNsure Duties A. Application Counselor Duties (a) (b) (c) (d) (e) (f) Develop and administer
More informationCorporate Legal Policy
Corporate Legal Title Number Current Effective Date Original Effective Date Replaces Cross Reference Fraud, Waste and Abuse General Information & Reporting CP.LE.SI.001.v1.5 04/20/18 03/19/04 External
More informationHIPAA PRIVACY POLICY AND PROCEDURES FOR PROTECTED HEALTH INFORMATION THE APPLICABLE WELFARE BENEFITS PLANS OF MICHIGAN CATHOLIC CONFERENCE
HIPAA PRIVACY POLICY AND PROCEDURES FOR PROTECTED HEALTH INFORMATION THE APPLICABLE WELFARE BENEFITS PLANS OF MICHIGAN CATHOLIC CONFERENCE Policy Preamble This privacy policy ( Policy ) is designed to
More informationCORPORATE COMPLIANCE POLICY AND PROCEDURE
Title: Fraud Waste and Abuse Laws in Health Care Policy # 1011 Sponsor: Corporate Compliance Approved by: Russell J. Matuszak, Interim Director, Corporate Compliance and Chief Privacy Officer Issued: Page:
More informationHighmark Health Third Party Code of Business Conduct
Highmark Health Third Party Code of Business Conduct 1 Table of Contents Overview Highmark Health s Obligations to Third Parties Highmark Health s Expectations for Third Parties Highmark Health s Expectations
More informationFRAUD, WASTE, & ABUSE (FWA) for Brokers. revised 10/17
FRAUD, WASTE, & ABUSE (FWA) for Brokers revised 10/17 OBJECTIVES After reviewing this information, you will be able to: Understand Fraud, Waste, and Abuse (FWA) training requirements; Be familiar with
More informationSUNY DOWNSTATE MEDICAL CENTER POLICY AND PROCEDURE. No:
SUNY DOWNSTATE MEDICAL CENTER POLICY AND PROCEDURE Subject: Complying with the Deficit Reduction Act of 2005: Detection & Prevention of Fraud, Waste & Abuse Page 1 of 4 Prepared by: Shoshana Milstein Original
More informationPolicies and Procedures. Code of Ethics Policy
Policies and Procedures Code of Ethics Policy Approved by: Group CEO Department: Group Company Secretariat Table of Contents 1. Introduction... 3 2. Purpose... 3 3. Scope... 3 4. Policy Standards... 3
More informationHeerema Marine Contractors
Heerema Marine Contractors ANTI-FRAUD POLICY Date of issue September 2012 Version 2012.02 Document HMC L055 Summary HMC requires its staff at all times to act honestly and with integrity in order to safeguard
More informationOHC CORPORATE COMPLIANCE PROGRAM (ACF & ECF) DOING THE RIGHT THING
OHC CORPORATE COMPLIANCE PROGRAM (ACF & ECF) DOING THE RIGHT THING Renee Olmsted, RHIA - Director Corporate Compliance, Risk Management, Privacy Officer Dan Vick, MD VP, Medical Affairs and Chief Medical
More informationEffective Date: February 3, 2016
TripAdvisor, Inc. Code of Business Conduct and Ethics Effective Date: February 3, 2016 TripAdvisor, Inc. (together with its subsidiaries and affiliates, the Company ) has adopted this Code of Business
More informationFWA (Fraud, Waste and Abuse) Training
FWA (Fraud, Waste and Abuse) Training Why Do I Need Training or Re Training? Every year billions of dollars are improperly spent because of FWA. It affects everyone including you. This training will help
More informationAU4000 THEFT, FRAUD AND CORRUPTION January 2014
AU4000 THEFT, FRAUD AND CORRUPTION January 2014 1.0 PURPOSE Interior Health (IH) is committed to fostering integrity in our workplace and is committed to minimizing risk of all forms of theft, fraud, corruption
More informationCARIBBEAN DEVELOPMENT BANK STRATEGIC FRAMEWORK FOR INTEGRITY, COMPLIANCE AND ACCOUNTABILITY PILLARS I, II AND III WHISTLEBLOWER POLICY
CARIBBEAN DEVELOPMENT BANK STRATEGIC FRAMEWORK FOR INTEGRITY, COMPLIANCE AND ACCOUNTABILITY PILLARS I, II AND III WHISTLEBLOWER POLICY To provide for a Whistleblower System and the protection of Whistleblowers
More informationHOSPITAL COMPLIANCE POTENTIAL IMPLICATION OF FRAUD AND ABUSE LAWS AND REGULATIONS FOR HOSPITALS
HOSPITAL COMPLIANCE H C C A R E G I O N A L C O N F E R E N C E A P R I L 2 8, 2 0 1 6 S A N J U A N, P U E R T O R I C O S A N C H E Z B E T A N C E S, S I F R E & M U Ñ O Z N O Y A, C S P J A I M E S
More informationDEFICIT REDUCTION ACT AND FALSE CLAIMS POLICY INFORMATION FOR All MASSACHUSETTS WORKFORCE MEMBERS
DEFICIT REDUCTION ACT AND FALSE CLAIMS POLICY INFORMATION FOR All MASSACHUSETTS WORKFORCE MEMBERS The Company is committed to preventing health care fraud, waste and abuse and complying with applicable
More informationThese restrictions apply to:
These restrictions apply to: - LSUHSC-NO Institutionally-related foundations that are being used to raise funds on behalf of the LSU ( e.g. The LSUHSC-NO Foundation, alumni associations) - Any third-party
More informationSTRIDE sm (HMO) MEDICARE ADVANTAGE Fraud, Waste and Abuse
Fraud, Waste and Abuse Detecting and preventing fraud, waste and abuse Harvard Pilgrim is committed to detecting, mitigating and preventing fraud, waste and abuse. Providers are also responsible for exercising
More informationi!lsms CODE OF CONDUCT POLICY
i!lsms SPECIALIZED MEDICAL SEltVlCES ~NEW POLICY AND PROCEDURE 0 REVISION DATE: CODE OF CONDUCT POLICY Specialized Medical Services, Inc. ("SMS") has adopted a comprehensive "Corporate Compliance Program"
More informationBUSINESS POLICY AND PROCEDURE MANUAL
06/10 1 of 1 01-13 GENERAL STATEMENT OF HIPAA Compliance The Health Insurance Portability and Accountability Act of 1996 (HIPAA regulates health care providers (Covered Entities) that electronically maintain
More informationCODE OF ETHICS FOR TRUSTEES, OFFICERS AND EMPLOYEES. A. Banking is a Business Based on Mutual Trust
CODE OF ETHICS FOR TRUSTEES, OFFICERS AND EMPLOYEES I. Introduction This Code of Ethics reaffirms the basic policies of ethical conduct expected of Trustees, officers and employees of Ulster Savings Bank,
More informationHealth Alliance Plan utilizes the Centers for Medicare and Medicaid Services (CMS) current definitions to define (FDRs):
January 2017 Table of Contents INTRODUCTION... 1 Definition of a First Tier, Downstream and Related Entity... 1 Definition of a Delegated Downstream Entity (DDE)... 2 REQUIREMENTS FOR FDRs/DDEs... 2 Compliance
More informationApproval version. G l o b a l P o l i c y : F r a u d R e s p o n s e a n d W h i s t l e b l o w i n g P o l i c y. Board of Directors.
Approval version G l o b a l P o l i c y : Issuer Author Approved by Board of Directors Group Legal Department Board of Directors Issue date July 01 2013 Revision history Publication via n/a BCnet Limitations
More informationCODE OF BUSINESS CONDUCT FOR THE LIFETIME HEALTHCARE COMPANIES
CODE OF BUSINESS CONDUCT FOR THE LIFETIME HEALTHCARE COMPANIES Approved January 29, 1999 Revised and Approved May 19, 2000, March 30, 2006 Welcome to The Lifetime Healthcare Companies. I am pleased to
More informationThis course is designed to provide Part B providers with an overview of the Medicare Fraud and Abuse program including:
This course is designed to provide Part B providers with an overview of the Medicare Fraud and Abuse program including: Medicare Trust Fund Defining Fraud & Abuse Examples of Fraud & Abuse Fraud & Abuse
More informationand STAR VALLEY BANCSHARES, INC. CODE OF ETHICS
and STAR VALLEY BANCSHARES, INC. CODE OF ETHICS The Bank of Star Valley and its holding company, Star Valley Bancshares, Inc. strives to be honest in all dealings. When violations of this policy occur,
More informationApril 2015 FC 158/12 E. Hundred and Fifty-eighth Session. Rome, May Anti-Fraud and Anti-Corruption Policy
April 2015 FC 158/12 E FINANCE COMMITTEE Hundred and Fifty-eighth Session Rome, 11-13 May 2015 Anti-Fraud and Anti-Corruption Policy Queries on the substantive content of this document may be addressed
More informationCategory: BOARD POLICY ADMINISTRATIVE PARAMETERS
Category: BOARD POLICY ADMINISTRATIVE PARAMETERS Title: Theft, Fraud, Corruption, and Non-Compliant Activities Policy Reference Number: AB 630 1. POLICY OBJECTIVES Last Approved: February 22, 2017 Last
More informationCode of Conduct. This Code of Conduct covers all associates. When appropriate, it also covers all members of the Company's Board of Directors.
Code of Conduct This Code of Conduct has been adopted for the purpose of ensuring that the Company's "Associates" (Officers and Employees) conduct themselves and operate the Company's business in accordance
More informationGovernance. Board of Directors. Ion Spor, President Steven Reeve, Director Will Spence, Secretary Terry Good Greg Meeker. Conflict of Interest Policy
Governance Mountaintop Retreat OFBC Inc., is led by a Board of Directors with all of the powers of governing, directing and overseeing the management of the organization. The corporate governance principles
More informationSPARK THERAPEUTICS, INC. CODE OF BUSINESS CONDUCT AND ETHICS
SPARK THERAPEUTICS, INC. CODE OF BUSINESS CONDUCT AND ETHICS This Code of Business Conduct and Ethics (the Code ) sets forth legal and ethical standards of conduct for employees, officers and directors
More informationCorporate Integrity Department
Corporate Integrity Department 2018 Volunteer Compliance Training Introduction This self-guided training module will educate you on CoxHealth s Corporate Compliance Program, The Code of Business Conduct
More informationAMENDED ANTI-FRAUD PLAN FOR AVMED, INC. Amended November 2014
AMENDED ANTI-FRAUD PLAN FOR AVMED, INC. Amended November 2014 AvMed, Inc. hereby amends the Anti-Fraud Plan of its Special Investigations Unit ("SIU") which was created to identify, investigate, and rectify
More informationLast Updated: 1 February 2018 To be reviewed: Annually
CARE International Policy on Fraud and Corruption Awareness, Prevention, Reporting and Response Sponsor: Secretary General/CEO Policy Owner: Deputy Secretary General, CARE International Effective Date:
More informationHIPAA Privacy & Security Plan October 2016
HIPAA Privacy & Security Plan October 2016 Page 1 HIPAA Privacy & Security Plan Introduction The Health Insurance Portability and Accountability Act of 1996 (HIPAA) and its implementing regulations restrict
More informationHIPAA Training. HOPE Health Facility Administrators June 2013 Isaac Willett and Jason Schnabel
HIPAA Training HOPE Health Facility Administrators June 2013 Isaac Willett and Jason Schnabel Agenda HIPAA basics HITECH highlights Questions and discussion HIPAA Basics Legal Basics Health Insurance Portability
More informationEGYPTIAN ELECTRIC COOPERATIVE ASSOCIATION POLICY BULLETIN NO. 214A
CASH AND BENEFITS PLAN (SECTION 125 PLAN) HIPAA POLICIES AND PROCEDURES EFFECTIVE DATE: APRIL 14, 2004 It is the intent of the Egyptian Electric Cooperative Association (EECA) to comply in all respects
More informationHIPAA Privacy Policy and Procedures Supplement for KP-IT
HIPAA Privacy Policy and Procedures Supplement for KP-IT Table of Contents Now that you know about HIPAA...3 How do I contact my Privacy Officer?...3 KP Privacy Policies...3 Notice of Privacy Practices...4
More informationCentral Florida Regional Transportation Authority Table of Contents A. Introduction...1 B. Plan s General Policies...4
Table of Contents A. Introduction...1 1. Purpose...1 2. No Third Party Rights...1 3. Right to Amend without Notice...1 4. Definitions...1 B. Plan s General Policies...4 1. Plan s General Responsibilities...4
More informationNETWORK PARTICIPATION AGREEMENT
NETWORK PARTICIPATION AGREEMENT THIS NETWORK PARTICIPATION AGREEMENT ( Agreement ) is entered into on the date(s) indicated below, by and between the undersigned physician (hereinafter Physician ; and
More informationCODE OF CONDUCT BOARD OF DIRECTORS APPROVAL FEBRUARY 21, 2017
2017 CODE OF CONDUCT BOARD OF DIRECTORS APPROVAL FEBRUARY 21, 2017 Letter from the Chief Executive Officer Dear Employees and Business Partners: is committed to conducting its business operations with
More informationRegent Management Services Regent Care Center
Compliance Policies Table of Contents Policy Page Policy Title # Number 001 Compliance Plan 2 001.1 Corporate Integrity Agreement 6 002 Compliance Communication and Internal Reporting 11 003 Compliance
More information