Fraud/Abuse Risk and Unsafe Shortcut Patterns
Key Takeaways
- Fraud generally involves intentional deception, while abuse can involve practices that are improper or inconsistent with accepted standards.
- Unsafe shortcuts include coding without documentation, copying prior codes, bypassing edits, and choosing codes based on payment.
- Coders reduce risk by validating documentation, using official guidance, following policy, and reporting concerns appropriately.
- The CCA exam expects recognition of suspicious patterns and selection of the compliant next step.
Fraud and Abuse in Coding Scenarios
Fraud generally suggests intentional deception for unauthorized benefit. Abuse can involve practices that are improper, excessive, medically unnecessary, or inconsistent with accepted coding and billing standards, even when intent is not clear. CCA exam questions usually focus on recognizing risk and taking the compliant next step.
Coders are not expected to act as attorneys or investigators. They are expected to avoid unsupported coding, identify suspicious patterns, preserve documentation integrity, and follow the facility's compliance reporting process.
Unsafe Shortcuts
Common risk patterns include coding from a problem list without current support, using a diagnosis only to meet medical necessity, unbundling services, applying modifiers to bypass edits without documentation, reporting services not performed, cloning documentation, and selecting higher-level codes because a provider or payer expects them.
Another unsafe shortcut is treating repeated practice as proof of compliance. "We always code it this way" is not a coding rule. The coder should use current official guidelines, payer instructions when relevant, and facility policy.
Exam Strategy
When a question includes payment pressure, repeated denials, missing documentation, or a request to change codes without review, pause. The correct response usually involves validation, query, education, correction through policy, or reporting to compliance.
Avoid answers that hide errors, alter records, code from assumptions, or select the code with the best reimbursement. Compliance is built through a repeatable process: document, validate, query when appropriate, correct when necessary, and escalate when risk persists.
A billing employee asks a coder to add a diagnosis that meets medical necessity for a lab test, but the provider did not document that diagnosis. What should the coder do?
Which pattern creates the greatest fraud or abuse risk?
A coder notices that a clinic repeatedly reports services that are ordered but not documented as performed. What is the best response?