Skip to main content

Internal Audits in Revenue Cycle Applications

$349.00
When you get access:
Course access is prepared after purchase and delivered via email
How you learn:
Self-paced • Lifetime updates
Who trusts this:
Trusted by professionals in 160+ countries
Your guarantee:
30-day money-back guarantee — no questions asked
Toolkit Included:
Includes a practical, ready-to-use toolkit containing implementation templates, worksheets, checklists, and decision-support materials used to accelerate real-world application and reduce setup time.
Adding to cart… The item has been added

This curriculum spans the full lifecycle of revenue cycle audits, equivalent in depth to a multi-phase advisory engagement, covering scoping, data integrity, access controls, coding accuracy, claims and payment workflows, denial management, regulatory compliance, reporting, and automation—mirroring the structured rigor of an enterprise-level internal audit program.

Module 1: Defining the Audit Scope and Objectives in Revenue Cycle Systems

  • Selecting which subsystems to audit—registration, charge capture, billing, claims processing, or payment posting—based on historical error rates and regulatory exposure.
  • Determining whether the audit will be transactional (focused on individual claims) or systemic (focused on process controls and configurations).
  • Establishing thresholds for materiality in revenue leakage, such as defining a 2% variance from expected reimbursement as a trigger for deeper analysis.
  • Deciding whether to include third-party vendors (e.g., clearinghouses, RCM partners) within the audit boundary and negotiating data access agreements.
  • Aligning audit objectives with organizational priorities, such as preparing for a HIPAA compliance review or supporting a merger integration.
  • Documenting stakeholder expectations from finance, compliance, and IT to ensure audit deliverables meet operational needs.
  • Choosing between a point-in-time audit and continuous monitoring based on system stability and change frequency.
  • Identifying high-risk payer contracts (e.g., value-based arrangements) that require special audit attention due to complex reimbursement logic.

Module 2: Data Acquisition and Integrity Validation

  • Mapping data sources across EHR, practice management, and billing systems to ensure complete transaction lineage from service delivery to payment.
  • Validating timestamps and audit trails to confirm data has not been altered post-service or during batch processing.
  • Resolving discrepancies between source system logs and data extracts used for audit analysis, particularly in cloud-hosted environments.
  • Implementing hashing or checksum protocols to verify data integrity when transferring extracts from production to audit environments.
  • Assessing data completeness by reconciling patient encounters in scheduling systems with those appearing in charge capture modules.
  • Identifying and documenting data transformation rules applied in ETL processes that could mask revenue cycle errors.
  • Handling personally identifiable information (PII) and protected health information (PHI) during data extraction in compliance with institutional policies.
  • Establishing refresh frequency for audit datasets when working with replicated or snapshot databases.

Module 3: Evaluating System Access Controls and User Privileges

  • Reviewing role-based access control (RBAC) matrices to confirm segregation of duties between billing, coding, and collections roles.
  • Identifying users with excessive privileges, such as coders who can also adjust account balances or void payments.
  • Validating that terminated employee accounts are deactivated within 24 hours of HR notification.
  • Assessing whether system administrators have appropriate oversight and whether their actions are logged and reviewed.
  • Testing whether password policies meet organizational standards, including expiration, complexity, and reuse restrictions.
  • Examining single sign-on (SSO) integration points for vulnerabilities that could allow unauthorized access to revenue applications.
  • Documenting exceptions where temporary elevated access was granted and verifying approval and expiration tracking.
  • Reviewing audit logs for evidence of after-hours access or unusual login locations that may indicate compromise.

Module 4: Assessing Charge Capture and Coding Accuracy

  • Sampling encounters to verify that CPT and ICD-10 codes entered match documentation in the EHR and support medical necessity.
  • Identifying instances where charge capture tools auto-populate codes without clinician review, increasing risk of upcoding.
  • Validating that modifiers are applied correctly and consistently, particularly for bilateral procedures and repeat services.
  • Checking for unbundling of procedure codes that should be reported as a single comprehensive code.
  • Reviewing charge master maintenance logs to confirm updates are approved and tested before implementation.
  • Assessing whether coding staff receive timely updates on payer-specific billing rules and whether these are reflected in system edits.
  • Testing whether the system flags services requiring prior authorization before charge submission.
  • Reconciling charges generated from ancillary departments (e.g., radiology, lab) with source orders in the EHR.

Module 5: Claims Submission and Payer Interface Controls

  • Validating that claims are transmitted with correct payer IDs, provider taxonomy codes, and NPIs to avoid rejections.
  • Reviewing error logs from clearinghouses to identify recurring claim rejections and assessing root causes.
  • Assessing whether the system applies payer-specific formatting rules and edits before claim submission.
  • Testing the handling of denied claims to ensure they are routed to appropriate staff for correction and resubmission.
  • Verifying that electronic data interchange (EDI) 837 and 835 transactions are processed accurately and reconciled daily.
  • Examining whether rejected claims are corrected within SLA timelines and whether delays impact cash flow.
  • Reviewing interface engine logs for dropped or duplicated transactions between systems.
  • Assessing whether fallback procedures exist for claims submission during system outages or network failures.

Module 6: Payment Posting and Reconciliation Processes

  • Validating that payments and adjustments are posted against correct patient accounts and service dates.
  • Testing whether contractual allowances are calculated accurately based on active payer contracts.
  • Reviewing underpayment trends to determine if system edits flag discrepancies between expected and actual reimbursement.
  • Assessing whether unapplied cash is investigated and resolved within 48 hours of posting.
  • Verifying that write-offs are authorized and coded appropriately (e.g., contractual vs. bad debt).
  • Reconciling daily payment batches from bank deposits to system postings to detect discrepancies.
  • Identifying manual journal entries in the general ledger that bypass normal payment posting workflows.
  • Reviewing refund processing controls to ensure proper approvals and documentation are required.

Module 7: Denial Management and Root Cause Analysis

  • Classifying denials by type (e.g., eligibility, coding, authorization) to prioritize remediation efforts.
  • Assessing whether denial reasons are coded consistently and mapped to corrective action plans.
  • Reviewing denial aging reports to identify backlogs and assign accountability for resolution.
  • Validating that front-end edits in registration and charge capture are updated based on denial trends.
  • Testing whether appeals are submitted with required documentation and within payer deadlines.
  • Measuring denial recovery rates by payer and service line to evaluate financial impact.
  • Integrating denial data into staff performance metrics and training programs.
  • Assessing whether denial management tools provide real-time alerts and workflow routing.

Module 8: Compliance and Regulatory Alignment

  • Verifying that audit trails meet HIPAA requirements for retention, accessibility, and immutability.
  • Reviewing system configurations to ensure compliance with CMS billing rules, including NCDs and LCDs.
  • Assessing whether the organization has processes to update systems in response to OIG work plans or RAC audit findings.
  • Validating that Stark Law and Anti-Kickback Statute safeguards are embedded in referral and compensation tracking systems.
  • Testing whether the system flags services that may violate Medicare’s “incident to” billing rules.
  • Reviewing documentation of internal audit findings to ensure they support potential defense in government investigations.
  • Confirming that data access for auditors complies with institutional IRB and privacy board requirements.
  • Assessing whether third-party audit tools are certified for use in regulated healthcare environments.

Module 9: Reporting, Dashboarding, and Audit Follow-Up

  • Designing audit reports that differentiate between systemic failures and isolated errors to guide remediation.
  • Selecting KPIs for executive dashboards, such as denial rate by payer, days in A/R, and clean claim rate.
  • Validating that audit findings are tracked in a centralized issue register with assigned owners and deadlines.
  • Testing whether corrective action plans are implemented and retested within agreed timeframes.
  • Assessing whether root cause analysis leads to changes in system configuration, training, or policy.
  • Reviewing management response to audit findings to ensure accountability and resource allocation.
  • Integrating audit results into vendor performance evaluations for RCM and IT service providers.
  • Archiving audit workpapers and data extracts according to document retention policies.

Module 10: Continuous Monitoring and Automation Integration

  • Identifying high-risk processes suitable for automated monitoring, such as duplicate billing or unbundling.
  • Configuring real-time alerts for transactions exceeding predefined thresholds (e.g., unusually high charges).
  • Integrating audit rules into existing RCM platforms rather than relying on standalone analytics tools.
  • Validating that automated edits do not create new errors, such as blocking valid claims due to overly strict rules.
  • Assessing false positive rates in monitoring tools and adjusting algorithms to improve precision.
  • Establishing a change control process for modifying monitoring rules to prevent unauthorized overrides.
  • Reviewing system logs to confirm monitoring tools are running as scheduled and generating expected outputs.
  • Aligning continuous monitoring scope with annual audit plans to avoid duplication and coverage gaps.