Current Trends in Government Investigations and Enforcement Actions Concerning Medical Device Pricing and Reimbursement
16 June 2010
Presentation details:
- Identifying fraud and abuse concerns in device coverage, pricing and reimbursement
- Avoiding anti-kickback violations for physicians and hospitals
- Stark Law implications
- Pinpointing scenarios where hospitals, physicians, and ASCs have been implicated for device reimbursement fraud by the government
- What are device manufacturers doing to prepare the sales force to speak to the government and private payors?
- Assessing the impact of the AdvaMed Code of Conduct on reimbursement and pricing protocols
- Exploring gain sharing concerns relative to pricing and reimbursement
- common triggers for gain sharing investigations
- adopting a preference for one medical device over another in order to get a larger volume discount when ordering the device
- sharing savings between hospitals and doctors reviewing gain sharing program by the Inspector General’s Office at HHS
- common triggers for gain sharing investigations
People
Related Insights
27 May 2025
Events
The RIF Roadmap: Tools and Tactics for a Smooth and Compliant Transition
Join us for an insightful discussion on proactive workforce planning in today's dynamic economic and regulatory landscape.
16 May 2025
Manufacturing Industry Advisor
Reese’s Law: The Evolving Regulatory and Enforcement Landscape for Consumer Products Containing Button Cell or Coin Batteries
Over the past year, manufacturers, importers, distributors, and retailers of consumer products containing button cell and coin batteries (or products intended to contain them) have continued to adapt to the requirements of Reese’s Law and the Consumer Product Safety Commission’s corresponding enforcement efforts.
29 May 2025
Events
May 2025 Midwest Cyber Security Alliance Meeting | What Happens After a Breach: Practical Tips for the Notification Process
Join us on Thursday, May 29, 2025, at the next Midwest Cyber Security Alliance Meeting. Brandon Hollinder, Esq., and Adam Botter from Epiq will provide practical tips and insights on organizing the data mining and subsequent notification process after a cybersecurity breach.