Marcallee, I can't believe the providers allowed the looping to go on that long -- I'm surprised that they didn't do some direct payer follow-ups along the way to find out that the claims were looping.
You bring up a very good point! When I send a claim to the "first-hop", I expect to get a 997 back which tells me that it at least got there. If the "first-hop" isn't the intended final receiver of the claim, I probably won't ever get to see any other acknowledgements from the other "hops" to give me confidence that the claim is progressing at a reasonable pace. Aside from the original intended use of loop 1000 (see page 40 in the 837 IG) there doesn't appear to be any other way to record who opens the envelope. Yet one more reason to want to go direct to the payer... Dave Minch T&CS Project Manager John Muir / Mt. Diablo Health System Walnut Creek, CA (925) 941-2240 -----Original Message----- From: Rachel Foerster [mailto:[EMAIL PROTECTED]] Sent: Thursday, January 24, 2002 3:26 PM To: WEDi SNIP 4 (E-mail 3) Subject: FW: Need to know routing path I'm posting Marcallee's message below to the list for her since for some reason she has been temporarily prohibited from posting directly. Rachel -----Original Message----- From: Marcallee Jackson [mailto:[EMAIL PROTECTED]] Sent: Thursday, January 24, 2002 1:36 AM To: [EMAIL PROTECTED] Subject: RE: Whose name is it, anyway? Rachel- While it may not be important to the payer/receiver what path the claim takes, it is often important to the provider who might like to have some sort of record of where his claim was sent. Particularly if claims are being delayed by several days while they pass from trading partner to trading partner. Pull up a WebMD payer list and see if you can tell which payers they send direct and which they send through trading partners. I think most providers would appreciate an easy way to follow a claim's path. Perhaps important to remember is that most clearinghouses will translate every single claim that comes into their operation into an internal format before translating it yet again into an outbound format (which may or may not be standard). Since non-standard transactions = violation, it might not be so bad to know who might have altered content along the way. One other thing, I once experienced a situation where clearinghouse trading partners had a payer client switch clearinghouses from one to the other. Clearinghouse A won the contract over Clearinghouse B. Clearinghouse B updated their system and began to route the payer's claims to Clearinghouse A. Clearinghouse A, after testing and processing a production file, never made the final switch to automatically move the claims direct. Instead, their system sent claims to Clearinghouse B who sent them to Clearinghouse A and so the claims looped for almost a year until the auditors asked why there where no billables being sent to the participating payer. Now I've worked with lots of clearinghouses and I know that the best you can do is find the cleanest dirty shirt. While there where lots of errors made to allow this type of problem, these types of issues aren't that unusual. If there had been an element tracking the entire path of this transaction, it might have been caught much earlier. I love a good debate! Marcallee -----Original Message----- From: Rachel Foerster [mailto:[EMAIL PROTECTED]] Sent: Wednesday, January 23, 2002 4:43 PM To: [EMAIL PROTECTED] Subject: RE: Whose name is it, anyway? Marcalle, I'm not sure that it's essential that the entire and full path be followed and known to all. One only needs to know from whom it received the interchange. I consider this to be somewhat analogous to what happens on the public internet....some messages, for example, can take as many as 15 or more hops before they arrive at their final destination. The final destination did not need to know of the intermediate hops. And to return a reply, etc., the receiver only needs to know the logical address. I think what may be happening is that today's current processes have evolved over years where each party in the chain knew each other party in the chain and thus the feeling is that this needs to be perpetuated. Using the X12 standards would in my opinion negate the continuation of this business practice. It's for these reasons, plus others, that I've been so adamant that participants on the list work through (debate, argue, disagree, whatever) what today's problems are so that requirements for tomorrow can be developed. I would certainly not like us to perpetuate today's problems tomorrow for no valid business reason! Make sense? I'm glad to see the debate finally being engaged on this list. I made the suggestion on the Business Issues WG confcall yesterday that I would like to see the goal for us at the meeting in Seattle to emerge from that meeting with a clear definition of today's problem(s) plus an initial outline of the table of contents of the white paper which must be the work product of our group. Rachel Foerster Rachel Foerster & Associates, Ltd. Phone: 847-872-8070 -----Original Message----- From: Marcallee Jackson [mailto:[EMAIL PROTECTED]] Sent: Wednesday, January 23, 2002 12:49 PM To: [EMAIL PROTECTED] Subject: RE: Whose name is it, anyway? Rachel - How do we follow the chain/path of a transaction? If a transaction passes through three CH's before arriving at the final destination, how do we follow that chain? Does the ISA sender element allow that? If not, is there another element that does? Thanks, Marcallee -----Original Message----- From: Rachel Foerster [mailto:[EMAIL PROTECTED]] Sent: Wednesday, January 23, 2002 9:25 AM To: [EMAIL PROTECTED] Subject: RE: Whose name is it, anyway? Chris, Well done! I think you're on the right track in starting to get a good handle on the core problem. As I see it, there are, at a very high level, two: 1. Whose identifier gets inserted into the ISA sender/receiver elements? We know from the IG's which coding systems are valid, including our friend, mutually defined. But, what we haven't yet reached any industry consensus on, in my opinion, is who is the "real" sender and receiver. Personally, I view the provider as the "real" sender of the claim transaction, for example. The provider (the real sender) then has (potentially) several choices of the mechanism of getting the transaction to the "real" receiver -- the guy who's going to pay the claim. Thus, the provider can perhaps choose a direct point-to-point mechanism if the payer offers that choice. Or the provider may choose to use a switch (read VAN), or a clearinghouse. Thus, to continue with Chris' analogy of FedEx, etc., whether a VAN, clearinghouse, or whatever, these entities are just a carrier. Now, that doesn't preclude these carriers from also offering additional value-add services, such as reformatting of the transaction into/out of the standard, etc., just as FexEx and other package carriers also offer other services. But none of these carriers is the originator of the transaction - they just facilitate the package from point A to point B. 2. What data transport method and protocol is to be used? And then, what are the security aspects of this? Thus, additional "packaging" of the EDI interchange is now required. Each transport method and transporter (?) will have its own requirements for identification/authentication, etc. Lastly, keep in mind that the ISA sender and receiver IDs are **always** just logical addresses and are not tied (nor were they ever intended to be) to a physical device or physical location. However, these identifiers, plus the GS sender/receiver codes, are the second level of security (authentication) built into the X12 standards. The first level, in my opinion, is outside of the X12 standards and is at the link level---what alien systems are allowed to log on to yours, how do you validate who's attempting to log on, and do you allow it. This link level authentication is outside of the X12 standards and also outside of the HIPAA rules. Rachel Foerster Rachel Foerster & Associates, Ltd. Phone: 847-872-8070 -----Original Message----- From: Christopher J. Feahr, OD [mailto:[EMAIL PROTECTED]] Sent: Tuesday, January 22, 2002 8:16 PM To: [EMAIL PROTECTED] Subject: Re: Whose name is it, anyway? OK,here's one more stab at framing "the core problem": The sender (of any interchange-type message) needs to know WHERE/HOW to send the message... from HERE... i.e., the "physical address of the next hop/destination on the way to Receiver X" and the correct "outer" addressing requirements... i.e."outside" of the ISA sender/receiver info coded inside the message. In the parcel shipping analogy below, this would be the identification of the correct "drop box". While there certainly can be ambiguity about the ID of the ultimate receiver, that would seem to be outside the scope of this WG and is probably well (enough) addressed with the assortment of identifiers offered in the IG. The problem seems analogous to someone having a line of drop-boxes out in front of his office for shipping parcels: one for FedEx, one for UPS, one for Airborne, etc. , and needing to know which one to use in each shipping scenario. Having an authorization from the carrier (the drop-box owner) to use a particular box and knowing the usernames and passwords for these drop-boxes would seem to be be outside of our scope. Once we have all the parameters for defining these entry points, then each receiver would have to publish (somehow) all the possible "drop-boxes" into which a HIPAA transaction intended for it could be placed by a sender... maybe with one flagged as "preferred". If it receives traffic via large "common carrier" type VANs or CHs, then the sender would also need a list of possible entry points or "drop box" definitions for each of the "common carriers" that feed his target receiver. Each standard drop-box definition would have to include the transport mechanism (FTP, secure email, Z-modem, etc.), therefore implying all the other requirements the sender would have to meet to get the thing into the stream. Is this sounding "right" so far?? -Chris At 02:28 PM 1/22/02 -0500, you wrote: >I would like to reiterate - these ID are sometimes (frequently) an integral >part of the security of an EDI system. For instance, that proprietary ID >assigned by the payer to the submitter (provider/billing service or >clearinghouse) may be the ID of an ID/password pair used in securing access >to mailboxes, etc (sorry - no plug intended). > >In our case, we use that ID/password to regulate access, and then correlate >the ID against the providers within the transactions, to validate that the >source of the transaction is authorized as an agent of the provider. A >similar process is used on the response side. > >Bob Christopher J. Feahr, OD http://visiondatastandard.org [EMAIL PROTECTED] Cell/Pager: 707-529-2268