by Jody Swearingen DPT, OCS, STC, COMT, CHP | Feb 2, 2026 | Outpatient Therapy Compliance
Satisfactory Assurances for Permitted Uses & Disclosures of PHI In Part 1 of this series, we explored the release of records when attorneys request them. In this second installment, we dive deeper into scenarios where your clinic may receive requests for medical...
by Jody Swearingen DPT, OCS, STC, COMT, CHP | Dec 18, 2025 | Outpatient Therapy Compliance
Navigating Record Release Requests: A Guide for Outpatient Therapy Practices For managers and owners of outpatient therapy practices, managing mail is often a low priority due to the demands of patient care and other matters; however, great care should be taken to...
by Mary Daulong PT, CHC, CHP | Nov 11, 2025 | Outpatient Therapy Compliance
Can an Enrolled Therapist Sign Off on Treatment Provided to a Medicare Patient by a Non-Enrolled Therapist? Therapist Enrollment and Medicare Sign-Offs Explained As outpatient therapy clinics expand to meet growing patient demand, hiring additional therapists is often...
by Alicia Mahoney, President | Oct 30, 2025 | Outpatient Therapy Compliance, Physical Therapy HIPAA Compliance
Are You Running Your Private Practice Naked? Compliance for Outpatient Therapy Providers … the requirement that private practitioners often put in the back of the closet. When regulators come to your door, do you want to be naked…i.e., without a...
by Jody Swearingen DPT, OCS, STC, COMT, CHP | Oct 28, 2025 | Outpatient Therapy Compliance
Selecting the Right Clinical Auditor for Your Outpatient Therapy Practice In today’s outpatient therapy landscape, the rapid adoption of technology, including cutting-edge AI services, is transforming practice operations. Among the least favored responsibilities for...
by Jody Swearingen DPT, OCS, STC, COMT, CHP | Oct 14, 2025 | Outpatient Therapy Compliance, Physical Therapy HIPAA Compliance
What is Phishing? The U.S. Department of Health and Human Services (HHS), through its Office for Civil Rights (OCR), defines phishing as a sophisticated cyber-attack designed to deceive individuals into disclosing sensitive information through electronic...