MicroMD PM: Editing Day Sheets

February 9th, 2016

Once the day sheet has been erased, you can no longer edit location, procedure codes, fees, or rendering provider. However, you can still edit service facility, diagnosis codes, place of service, modifiers, date of service, diagnosis pointers, and billing provider; highlighted in red boxes below:

If you must change one of the items on the sequence that cannot be edited after the day sheet has been erased, you will have to void that sequence and then re-post it.


Tip credit belongs to J. Kishel at Henry Schein MicroMD!


Posted by Jim Sherrill | Topic: Tips  | Category: Tips

Careful thought

February 2nd, 2016

We humans are a bit quick on our pattern seeking and story telling: http://edge.org/conversation/richard_nisbett-the-crusade-against-multiple-regression-analysis

Placebo-controlled, double-blind studies with replicable significant results remain the Gold Standard of science.


Posted by Jim Sherrill | Topic: News  | Category: News

General security

November 18th, 2015

I sent this answer list to a relative who had questions. Perhaps some of it is useful to others as well.

0. (unasked, but answered) Any machine and operating system that you consider should be fine for "ordinary" use. If you are not modeling mechanical behaviors of aluminum frame parts in a car crash, for example, and using the computer mainly for e-mail, web, and Turbotax, then almost any rig that you look at will suffice.
- Require a password to boot, log on, or both to your machine.
- While you are using programs, save documents early, save documents often.
- Having one (two is better, three is betterer but harder to manage/remember) USB drives for backups is a Good Thing® too. You have to treat the hardware as if it will die today - being confident with backups allows that useful nonchalance.

1. Security - your best tool is your natural paranoia. Being highly skeptical of any links that you receive, not allowing most advertisements, and behaving generally as a curmudgeon results in a nearly risk-free computing life. How do I know? Because that is how I use computers.

The human element is the most vital link in a secure chain; if you do not click stuff, you are not exposed to extra risks. Or, more realistically, if you are slow & picky to click, thoughtful about what you are doing, then you are in great shape. Do not trust or install extra programs; if something that you think you care about does not work without installing xyz, then first think harder - perhaps it is safe and worth it, but perhaps not. Skipping never causes you harm. Should you accept the risk, install and try it - there are many benign and useful programs. Uninstall it later if you do not think that it should stay on your machine.
It is odd and perhaps sad that grouchy people like me are the safest, but Bad Guys have made the world this way.

2. Finances - these are under the umbrella of 0) and 1) above. You are absolutely fine if you do not trust most links, keep your machine's software updated, back stuff up, and do not lose control of your machine.

3. Privacy - using the philosophy of TRUST NO ONE is my preference. I follow the above plus the steps here. There is no perfect privacy but you can get closer to sanity in these ways.

4. Specifics - here are my opinions, feel free to use or dispose.

  • No, Lifelock is not worth having. Send me $100/year and I will tell you why! annualcreditreport.com, you knowing your account activity, and the above behaviors are valuable well above what they are selling.
  • Yes, different passwords provides you with "defense in depth" - should Bad Guy get access to one of your accounts, he (Russian kid? Peruvian widow? Queue up "It's a Small World") cannot easily proceed to access your other stuff.
  • Yes, Geek Squad is a decent resource

Recall that this is all a big trade-off: the safest computer is not on the Internet and buried in concrete. That makes it useless, so some extra risk accompanies all changes towards interconnectedness. Being mindful and skeptical allows you to manage that risk, use and enjoy computing with an acceptable level of risk.

Finally, I do not trust any cloud vendor for any services, period. (Who's got paranoia now?! nature/nurture...)


Posted by Jim Sherrill | Topic: Tips  | Category: Security


October 7th, 2015

Latest revisions to Meaningful Use rules are now out, here are some first pass highlights:

  • Reporting periods for 2015 are any continuous 90-day period in the 2015 calendar year - instead of calendar-quarters. 
  • Attestations for the 2015 reporting period can be submitted to  CMS's portal from January 4 - February 29, 2016.
  • For 2015 and 2016 reporting periods, the View, Download, Transmit component of the Patient Electronic Access objective now requires that only one (1) patient view, download or transmit their health information to a third party.
  • The Secure Electronic Messaging objective is changed for 2015 (The capability for patients to send/receive secure electronic messages with the EP was fully enabled during the reporting period) and 2016 (A secure message is sent to at least 1 patient seen by the EP during the reporting period).

Read more:

Summary from healthcareitnews.com

Details from the cms.gov Mother Ship


Posted by Jim Sherrill | Topic: News  | Category: News

History Lesson

September 30th, 2015

It starts tomorrow, so you do not have time for this video now; but after the dust settles (does it?), you may enjoy learning where all these codes came from:

ICD-10 history - from othopedicnetworknews.com

Of course, the United States using ICD codes for billing makes us uniquely late to ICD-10, but press on as we all decipher the new ways to work.


Posted by Jim Sherrill | Topic: News  | Category: News

CMS has made it clear there will be no delay on ICD-10 and that means you need to be prepared. There are many resources for ICD10.   

Here are some links that might help you:

MSA ICD10 Information


Posted by Ginnie Hollingsworth | Topic: Events  | Category: News


July 29th, 2015


Find out what ICD-10 brings!

In our EDI Claim Manager, there is a new graphical report that shows the ICD-10 codes that would be used based on your uploaded data. To run the report:

  1. Select the "Search Tools" button on the main screen
  2. Select the "Report Manager" Button
  3. Select the ICD-10 Code Analysis report (Class = Claim, Type = Web Browser)
  4. Run the report for a desired date range, ordered by claim volume or ratio

This report can be helpful in determining your ICD-10 transition strategy.The one-to-many matches may seem daunting: the highest count that we have seen yet is a single ICD-9 code mapping to 7,745 ICD-10 codes - GAH!

(for the curious, that ICD-9 code is V58.89 - ENCOUNTER FOR AFTERCARE OTHER SPECIFIED)

In spite of this insane appearance, stay calm; you will make it through the transition. The new CMS adjustment provides partial relief from strict adherance for one year. We can help with planning and the actual mapping process with a new service.


Posted by Jim Sherrill | Topic: Tips  | Category: News

I updated our list of safe software to use and safe places to get that software.

The paranoid among you will not trust any of these links (well done!) but will search for the tool or site name in a trustworthy search site. Yes it is cumbersome to get squared away but is your work and home information worth it?

Posted by Jim Sherrill | Topic: Tips  | Category: Security

Medical Software Associates. 1021 McCallie Avenue. Chattanooga, TN 37403