Pros & Cons of Outsourcing Revenue Cycle Functions: What You Need to Consider
01/26/2026 Recorded WebinarDescription
Many providers have considered outsourcing functions in the revenue cycle.
Like all businesses, some third-party companies do excellent work for providers, but there may be others that look for ways to take advantage of their provider. Outsourcing has its own pros & cons that must be carefully considered. We will review major common areas that providers must weigh strategically before making a decision whether to outsource and selecting the best partner for your needs.
It is vital providers know exactly who is handling their claims and what they are doing with their information.
- Definitions of third-party vendors
- Legal responsibilities of the provider
- Common industry trends
- Important questions to ask vendors & contractors
Who Will Benefit
- Physicians
- Practice managers
- Medical assistants
- Nurses
- Compliance staff
- Billers
- Coders
- Revenue Cycle
- Risk Management
- Mid level providers
Webinar Details
-
Recorded Webinar
Speaker:
Dorothy D. Steed
MSLD, CCS, CDIP, COC, CPCO, CPUM, CPUR, CPHM, CPMA, ACS-OP, CCS-P, RCC, RMC, CEMC, CPC-I, CFPC, PCS, FCS, CRCR, CICA, CPAR
Dorothy Steed is an Independent Healthcare Consultant and Educator. She has served as Medicare specialist and a physician audit supervisor...
Related Events
Seven Criteria for High Quality Clinical Documenta...
Seven Criteria for High Quality Clinical Documentation Clinical documentation is the cornerstone ..
Paying for Referrals: A Danger to Your Freedom + B...
Paying for Referrals: A Danger to Your Freedom The session will provide an overview of the Anti-K..
Chargemaster: A Critical Tool For Revenue Cycle Ma...
A hospital chargemaster is a comprehensive list of a hospital's products, procedures, and services. ..
Upcoming Webinars
HIPAA in 2026: What Changed, What’s Coming, and Wh...
Over the last few years, the U.S. Department of Health and Human Services, Office for Civil Rights h..
HIPAA Breach Risk Assessment for Ransomware Attack...
HIPAA Breach Risk Assessments determine whether a Ransomware attack constitutes a HIPAA Breach that ..
E&M Coding Guidelines and Documentation Requir...
During this presentation we will Review current documentation guidelines for different location that..





