From OASIS accuracy to NOA timeliness and PDGM optimization, our home health billing team turns clinical documentation into maximum-allowed reimbursement, with audit-ready compliance.
PDGM, OASIS, HIPPS codes, face-to-face rules, LUPA thresholds, and NOA timelines are unique to home health. Generic medical billing teams don't have the clinical and regulatory depth to protect agency revenue.
30-day periods are paid based on clinical grouping, functional impairment, comorbidity, admission source, and timing. Every OASIS field maps to reimbursement, we audit for correct group placement.
M-item scoring drives HIPPS codes. Our COS-C reviewers catch under-coded functional status, missed comorbidities, and inconsistent clinical grouping before periods are locked.
F2F documentation must support homebound status and skilled need. Missing F2Fs mean denied claims. We track every patient's F2F and chase documentation proactively.
Notice of Admission must reach Medicare within 5 calendar days of SOC. Late NOAs lose 1/30th of the period payment per day late. We submit NOAs day-of whenever possible.
When a 30-day period falls below the case-mix visit threshold, payment reverts to per-visit. We alert scheduling in real time to prevent accidental LUPAs.
Medicare Advantage, Medicaid waivers, and commercial plans each pay differently. We manage authorizations, visit limits, and concurrent reviews across every payer.
Our home health billing team includes COS-C certified OASIS reviewers, HCS-D certified home health coders, and HH-compliance specialists who understand the PDGM-era regulatory landscape end-to-end.
Home health data includes OASIS clinical assessments, F2F documentation, and 485 plans of care. Our operations align with HIPAA, ISO 27001, and HITRUST CSF.
All PHI lives inside encrypted, access-controlled systems with audit trails. Our team is trained on HHA Conditions of Participation and survey-readiness documentation standards.
Information security management aligned with ISO/IEC 27001 and HITRUST CSF. Continuous monitoring, least-privilege access, and documented incident response protect agency data.
Related Services