
Hacking Healthcare: A Guide to Standards, Workflows, and Meaningful Use

even if you are), you will be asked to sign what is known as a Business Associate Agreement, which will spell out clearly that all data you receive from the covered entity is HIPAA-covered.
David Uhlman • Hacking Healthcare: A Guide to Standards, Workflows, and Meaningful Use
Outpatient facilities tend to refer to their visits or encounters as occurring in numbers of exam rooms. For
David Uhlman • Hacking Healthcare: A Guide to Standards, Workflows, and Meaningful Use
than any potential buyer.
David Uhlman • Hacking Healthcare: A Guide to Standards, Workflows, and Meaningful Use
Small providers regularly ignore the AMAs licensing requirements (much like running pirated copies of software) and hope to slide under the radar of the AMA’s enforcement.
David Uhlman • Hacking Healthcare: A Guide to Standards, Workflows, and Meaningful Use
On average, it takes three attempts and resubmissions to have a claim adjudicated to the fullest extent that the provider or patient can achieve.
David Uhlman • Hacking Healthcare: A Guide to Standards, Workflows, and Meaningful Use
HL7 is intended to be implemented on top of other networking protocols,
David Uhlman • Hacking Healthcare: A Guide to Standards, Workflows, and Meaningful Use
As it stands, without widespread interoperability, it is almost impossible to migrate from one EHR to another.
David Uhlman • Hacking Healthcare: A Guide to Standards, Workflows, and Meaningful Use
Having received the EOB or ERA, a facility must reconcile the information provided with the balances they billed out on the claim and figure out the patient’s responsibility for any remaining amount owed.
David Uhlman • Hacking Healthcare: A Guide to Standards, Workflows, and Meaningful Use
Although a single copy of any given data point is always preferable, this is impossible in any EHR system that has even rudimentary interoperation with other information systems