Re: Testing.  The ISA I14 Usage Indicator (e.g., P for Production Data,
T for Test Data) applies to the entire interchange - we can't change the
X12 standards here.  I'd say just put the production transactions (and
functional groups) in one production interchange, and the test
transactions in another.  This technique requires nothing of the CPP,
since theoretically a test interchange is sent to the same portal using
the same IDs in the ISA as production data.

Unlike the ISA I14 T/P indicator, which is universally understood - if
not universally implemented, some (or most) organizations demand that
test interchanges be sent using a "testing" ISA receiver ID.    I think
we can handle this, too.  There's nothing to keep us from adding the
capability into the CPP for specifying a Test ID and Qualifier - along
with the production pair.  This would be done on a Delivery Channel
("EDI Address") basis, with some means to differentiate the production
and test (and maybe even "real-time") ISA receiver ID and qualifier
pairs.  For example, in effect, the CPP would say if you end up using
Delivery Channel X, then production data is sent with the ISA receiver
field saying NAIC co-code 54901, but a test interchange would be sent
with the "mutually defined" ID "54901TEST" - the NAIC with "TEST"
appended.  This is an augmentation of what we discussed before, where
the CPP specifies what's stuck in the ISA receiver field depending on
the circumstances;  see "Why do we flap our lips so much....," at
http://www.mail-archive.com/routing%40wedi.org/msg00438.html, from 12
April.


Re: Sharing financial information like routing codes and account
numbers.  Providers who have set up debit blocks, as NACHA's Priscilla
Holland talked about, could safely place their account information in
the CPP; see "Electronic Funds Transfer and Security" at
http://www.mail-archive.com/routing@wedi.org/msg00570.html,   Others
will probably have no choice but to use some kind of notation to
indicate where a payer could obtain  that information, e.g., an e-mail
address or telephone number - necessarily involving a manual process.
Even if we had a fool-proof method of protecting the registry from read
access except by "vetted" participants, most people (providers) would
still feel uncomfortable sharing that information.

I don't know any way around that issue!  Except if, as I suggested, the
837 were changed to include it so it could be sent directly from the
provider to the payer (encrypted or over a secure channel). A REF
segment, in the Pay-to or Billing Provider loop, can handle this.  The
following says, in effect, bank account number 26000001538215 at
Fidelity Federal Bank & Trust of West Palm Beach, Florida (ABA No.
267087358):

    REF*11*26000001538215**01:267087358~

Some people wouldn't even like that (i.e., the provider giving the EFT
information directly to the payer via the claim).  Bruce T LeGrand, my
"Deep Throat" Blue contact, says:

   My EDI portal is not secure. Since I support dial-up, NDM,
   FTP, .. .. ..ad nauseam ad infinitum, my process is fairly
   open. And I don't care. If a provider identifies himself to
   me properly in a claim, there is no way anyone can spoof me
   into sending the payment somewhere it is not supposed to go.
   I verified that initially with him and that data is secure
   within my system. If it comes in the claim, it can go
   anywhere. This is not a secure network like the banks have,
   and I don't see any reason why we should incur the costs of
   that on top of everything else. When I move money, it will
   be the bank portals that service that transaction.


Re: Certification.  "Certification," as we use it in WEDI/SNIP, is
defined in the Testing ("Transaction Compliance and Certification")
whitepaper.  It only "certifies" that an entity is capable of sending
(or receiving?)  syntactically and semantically correct standard
transactions.


Re: Fraud and Trust.  We can't address fraud, except insofar as we can
guarantee (through X.509 technology and CA-signed digital certificates)
that only the entity which owns a particular ID (e.g., a NAIC co-code)
can create the CPP which purportedly belongs to it.  Once you are sure
that you have a CPP really  belonging to Saint Therese Hospital in
Waukegan, our job is done.  If Saint Therese Hospital's lack of internal
controls result in false or over-billings, or the Insurance company
lacks the controls to detect fraud, it's not our problem.  All a payer
could be reasonably sure of is that the 837 claims indeed came from
Saint Therese Hospital, and that remittances, statuses and payments
actually are returned to Saint Therese Hospital.

Likewise, hospitals would be sure that whomever they sent 837s to really
was the payer they intended - as long as they used the correct ID to
obtain the CPP.  Valid digital signatures of incoming claims would
indicate that the payer could trust the claim was coming from whom they
thought - not that they can necessarily trust the sending entity itself.
We can only guarantee identity on the Internet, not honesty or financial
robustness.  Since we're going to use X.509 digital certificates to
buttress our trust model,  we're dependent on the Trusted third-party
CAs (such as Verisign) to properly vet entities.

If out-of-network providers send standard transaction claims to a payer,
I would expect that electronic EOBs would be sent to the provider, and
that paper EOBs and a check would be sent to the patient.  It only makes
sense to send payment to the patient, since in this case the payer only
has a contract with the patient - not the provider.  Actually, you would
think that it would be prudent for the payer to always send some type of
paper EOB to the patient, in or out of network, to increase the odds
that funny business will be caught.  Given the paper EOB, a  patient
treated in-network might have an incentive to report provider
over-billing simply because it applies to his lifetime max.

I don't know how you could keep a provider from submitting an
out-of-network over-billing to the payer (which would only benefit the
patient since she receives the check).   It's not my problem - I'm not
paid to worry about it.  But standard electronic transactions don't
exacerbate the problem: these are probably also concerns when using the
old HCFA paper form for out-of-network claims.

William J. Kammerer
Novannet, LLC.
Columbus, US-OH 43221-3859
+1 (614) 487-0320

----- Original Message -----
From: "Ronald Bowron" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Wednesday, 22 May, 2002 10:06 AM
Subject: Re: Updated CPP Spreadsheet and Model Diagram


Per William's request, I'm posting this response to the list. I had
originally sent it directly to William.

William,

To be honest, I haven't thought much about specific data elements.  I
was more interested in ensuring that user's of the CPP have the ability
to establish testing requirements as well as production requirements.

Getting down to the ISA routing level:
It would be nice if everyone had the ability to process transactions
based on the testing indicator as recommended by the X12 User Guides.
And that all the information in the ISA would be used for both
Production and Testing.  Then the only data element to change when going
live would be the Test/Production indicator.  The problem with this
indicator is it is not transaction specific - therefore it assumes all
transaction within the interchange are valid for production.  This is
not always the case - for example, an entity may be in production with
sending eligibility requests, but not claims.

Also, not many institutions have used the T/P indicator properly.  Most
organizations didn't setup their test environments to represent their
production environments when it comes to sender and receiver ID's.
Therefore, a sender may have one ID for testing and another for
production - assuming the ID is dictated by the receiver (i.e. via ZZ
codes).  It's possible that some may consider building x-ref tables to
address this and the use of standard identifiers like the D&B numbers.

With regards to the specific data elements that are released in the
CPP, I somewhat agree with your analogy regarding ABA and other types of
information.  Once they are in the public domain, we don't have much
control over how and when they get used.  But, if such information can
only be used to benefit (i.e. receive deposits), then there is no reason
for concern.  But, if such information can be used to access protected
assets (i.e. make withdraws/payments), then different levels of
protection may be required.

With regards to "Certification".  "Certification" will not guarantee
that the transactions are not fraudulent, only that they are properly
formatted and contain valid content based on the standards.  Not that
the content is appropriate for payment.

So, much like the Public Trust model discussed in another thread, when
does one consider a business entity a trusted entity?  How do you
determine whether or not payment is valid?

In the old days, when a patient was "Out of Network", the physician
simply billed the patient.  It was the patients responsibility to
forward the claim to the payer (this is still used today, my dentists
bills this way).  The payer then knows that the patient actually did
visit the physician and received the services.  With the CPP, does this
become an automated process?  What roll will the patient play, if any,
to ensure the claim is sent to the proper insurance plan for payment?
How does the Insurance Plan verify that the patient actually received
the billed services?

I didn't post this to the list, because much of it is out of scope, but
I believe without answers to these types of questions, the CCP may not
have many early adopters.

-Ronald Bowron



Reply via email to