Arkansas Medicaid Review & Prior Authorization Services
iEXCHANGE is available for Arkansas Medicaid reviews. It is a browser-based application that uses a secure Internet connection to allow healthcare providers to submit requests for prior authorization, continued stay and extension of benefits reviews and to electronically submit medical records. Find out more about iEXCHANGE.
How AFMC protects you
AFMC respects your concerns about personal data protection and value our relationship with you. AFMC complies with federal and state laws, also an internal compliance program to protect the privacy of medical records, personal health information (PHI), and personal identifiable information (PII).
AFMC implements a set of processes and system controls designed to ensure security of your privacy regulated by the Federal Information Security Management Act (FISMA). We put continuous efforts into monitoring potential risk by conducting audits, risk management, security planning and other FISMA related best practices.
The Standards of Conduct articulates AFMC’s commitment to follow applicable federal and state laws and regulations, including the following:
Title XVIII of the Social Security Act; Medicare regulations found in 42 C.F.R., sections 422 and 423; Patient Protection and Affordable Care Act (PPACA); Health Insurance Portability and Accountability Act (HIPAA) and as modified by HITECH Act; False Claims Act (FCA) and the Federal Criminal False Claims statutes; NIST Special Publication 800-26, Department of Defense (DoD) Policy 8500; Director of Central Intelligence Directive (DCID) 6/3; ISO/IEC Standard 17799; General Accounting Office (GAO) Federal Information System Controls Audit Manual (FISCAM); and Health and Human Services (HHS) Centers for Medicare and Medicaid Services (CMS) Core Security Requirements.
How to protect yourself
AFMC will protect your privacy as described in this Privacy Statement, however, you should keep in mind that if you voluntarily disclose personal information, especially confidential health information, it is possible that despite our efforts, information may be accessible by others. You can help guard against this by:
- Enabling security features on personal mobile devices
- Use strong passwords with your laptop and mobile accounts
- Safely dispose of personal information (mail, old hard drives and computers)
- Ensure that personal computers have the latest security updates to decrease risk
- Keeping hard copy of sensitive information stowed away in secure cabinet or briefcase
- Don’t overshare information through social networking
- Be conscious of web security (internet browser settings)
- Be conscious of your surrounding when carrying sensitive information