The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a significant healthcare reform law that passed Congress in 1996
The law has its roots in the Clinton Health Reform proposal, and its primary purpose was to provide better access to health insurance as well as to toughen the law concerning healthcare billing fraud. There are other corollary sections of the law related to administrative simplification and privacy of protected health information that have far-reaching effects for Providers, Payers, Managed Care Organizations, their business associates, and any entity storing, processing, and transmitting healthcare information.
HIPAA amends the Internal Revenue Code of 1986 by :
- Improving portability and continuity of health insurance coverage in group and individual markets.
- Combating waste, fraud and abuse in health insurance and healthcare delivery.
- Promoting the use of medical savings accounts.
- Improving access to long-term care services and coverage.
In addition, the Act includes provisions for improving and monitoring the security and confidentiality of any records containing health plan member and patient information. In 1998, the Department of Health and Human Services (HHS) proposed, as part of these HIPAA provisions, a Nation Standard Provider Identifier (NPI), a National Standard Employer Identifier and security standards for electronic health data.
The Administrative Simplification rules of HIPAA are intended to improve efficiency in healthcare delivery through standardized, electronic transmission of many administrative and financial transactions as well as protection of confidential health information.
Our HR department conducts extensive background checks on all new employees prior to our “employee confirmation process.” Once confirmed, employees can access our system only with valid logons and passwords. Furthermore, access to sensitive information is on a “need to know basis” and we constantly keep watch to prevent any of our clients’ data from being accessed except by authorized employees. In addition, all our employees receive confidentiality training (as required by HIPAA) and must sign confidentiality agreements.
We take all compliance related concerns of our customers very seriously and we address them proactively
Data Confidentiality
In view of the sensitivity associated with the Healthcare Information, all our teams works on fully locked down dumb terminal PC’s which don’t have a floppy drive, CD drive or a USB port. No process executive has an email access and there is no movement of data across the globe.
The teams have restricted remote access to the client’s software applications and tools enabling them to do the work required to accomplish the required services only in a secure manner. Specific client networks are physically isolated and have dedicated firewalls into the client’s network for an additional security.
Physical Security
In our delivery center no one is allowed in without screening and no one is allowed to bring in or take any information capture devices including mobile phones and cameras. The facility is truly locked down with access only to authorized individuals in client specific areas protected by card readers and biometric technology enabled secure access systems. A 24×7 security force physically guard the facility from any unauthorized access.
Employee Hiring & Background Checks
Our HR department conducts extensive background checks on all new employees prior to our “employee confirmation process.” Once confirmed, employees can access our system only with valid logons and passwords. Furthermore access to sensitive information is on a “need to know basis” and we constantly keep watch to prevent any of our clients’ data from being accessed except by authorized employees. In addition, all our employees receive confidentiality training (as required by HIPAA) and must sign confidentiality agreements.
We take all compliance related concerns of our customers very seriously and we address them proactively
Data Confidentiality
In view of the sensitivity associated with the Healthcare Information, all our teams works on fully locked down dumb terminal PC’s which don’t have a floppy drive, CD drive or a USB port. No process executive has an email access and there is no movement of data across the globe.
The teams have restricted remote access to the client’s software applications and tools enabling them to do the work required to accomplish the required services only in a secure manner. Specific client networks are physically isolated and have dedicated firewalls into the client’s network for an additional security.
Physical Security
In our delivery center no one is allowed in without screening and no one is allowed to bring in or take any information capture devices including mobile phones and cameras. The facility is truly locked down with access only to authorized individuals in client specific areas protected by card readers and biometric technology enabled secure access systems. A 24×7 security force physically guard the facility from any unauthorized access.
Employee Hiring & Background Checks
Our HR department conducts extensive background checks on all new employees prior to our “employee confirmation process.” Once confirmed, employees can access our system only with valid logons and passwords. Furthermore access to sensitive information is on a “need to know basis” and we constantly keep watch to prevent any of our clients’ data from being accessed except by authorized employees. In addition, all our employees receive confidentiality training (as required by HIPAA) and must sign confidentiality agreements.
Businesses must continually improve processes, reduce costs and cut waste to remain competitive, and many are turning to Six Sigma and Lean principles
The Six Sigma process-improvement methodology helps businesses cut costs while improving quality, customer satisfaction and cycle times.We are constantly looking for ways to improve the quality of our processes and sharpen our focus on serving our customers. The Six Sigma program is an integral part of this effort and a testament to our commitment to building process improvement into every one of our client engagements. Six Sigma tools and concepts have sparked performance improvements in practically every division of our company while helping us deliver substantial cost savings to our customers.
The Six Sigma methodology uses data and statistical analysis tools to identify, track and reduce problem areas and defects in products and services, ideally resulting in near-perfect results. Its name derives from a statistical process control model that measures defects per million and assigns a “sigma value” from one to six. Six is the ideal number – indicating only 3.4 defects per million, or 99.99966% perfect. This figure can apply to any range of processes, products or services – from software to back-office business processes – and often translates into cost savings. According to the Six Sigma Academy certified Six Sigma black belts can save companies a lot of money.
Our Six Sigma practices internally reduce costs while increasing revenue and customer and employee satisfaction. Externally, we have improved service delivery often measured by Service Level Agreements (SLAs) which are mutually agreed upon .”We have a strong Lean/Six Sigma program that delivers results,” says Bryant. “Ultimately Lean/Six Sigma principles help us reduce costs and as we reduce costs we pass those savings on to clients.”