AuditNet® Audit-library::Auditnet healthcare-auditing
1. Detecting Healthcare Vendor Fraud Using Data Analysis (DA-2) April 17
What you will learn:
• Who are the most common dishonest healthcare providers —It’s not always clear!
• New fraud risks under Obamacare
• Case studies: Surprising ways that vendors rip off hospitals, clinics and other providers
• How insiders collude with vendors to embezzle funds, divert inventory and steal confidential medical data
• Red flags of healthcare billing schemes, sham vendor frauds, drug diversion schemes and other hugely costly scams
• Proven data analytics procedures for detecting indicators of healthcare fraud
Date: Wednesday, April 17, 2013
Time: 11:00 AM- 1:00 PM (Eastern, GMT -0500)
CPE: 2 Credits are available for registrants attending the seminar which are awarded based on a 50-minute hour.
Program Level / Prerequisites and Advance Preparation: Basic / None
Basic Delivery Method: Group Internet Based
Recommended Category: Specialized Knowledge and Applications
Cost: $99 Individual ... $300 Group Pricing
Please register for Detecting Healthcare Vendor Fraud Using Data Analysis on Apr 17, 2013 11:00 AM EDT at:
Health Benefits Administration
Hospital Audit Program from the State of Iowa, Auditor of State
Third Party Administrator Health Care Audit Program (pdf)
RESOURCES
American Association of Medical Audit Specialists
Compliance Program Guidance for Third-Party Medical Billing Companies
Preparing for an Internal Billing Audit
SekChek for Internal Auditors and Privacy Officers can complement HIPAA Compliance audits by confirming adequate security of the host system/s running Medical Patient applications. This automated computer security analysis tool/service details the key control measures in place to secure the operating system environment. In turn, these independent SekChek assessments can confirm whether the production environments can be relied upon to protect the Privacy of medical / patient databases and HIPAA-conforming audit trails against inadvertent, unauthorized or malicious access or changes. Originally developed in 1997, SekChek is designed, and continually enhanced, to analyze security settings of all major (non-mainframe) operating systems and platforms, including all versions of Windows, Unix, Netware and AS/400. Sample reports can be downloaded from SekChek Information Protection Services at www.sekchek.com