Dobbs Opinion

The Dobbs Opinion, the Repealing of Roe, & the Impact on the Privacy & Security of Patient Information

Rachel V. Rose, JD, MBA, principal with Rachel V. Rose – Attorney at Law, P.L.L.C., Houston, TX presents this very timely subject for us.The Dobbs Opinion repealed fifty years of precedent under Roe. The implications of the Opinion extend beyond women’s reproductive rights and impact the privacy rights of all Americans. The purpose of this webinar is to explain the key aspects of the Dobbs Opinion related to privacy from both the Majority and the Dissent’s perspective, address the current legislative initiatives, HHS Guidance, and Executive Orders, as well as appreciate the role HIPAA plays in navigating Dobbs.
Protecting Assets

Preserving and Protecting Assets In Healthcare

Expert attorneys Sean McKenna, Lauren Nelson, and Vincent Aiello of SpencerFane LLP will be this dynamic webinar. They will discuss the interplay between enforcement and liability proceedings with asset protection, explore how government and private litigation matters can impact healthcare companies, clinicians, and executives, and provide tips and preventative strategies to preserve income and assets prior to such action to ensure business continuity and succession planning.
Snooping Webinar

How to Prevent Employee Snooping and Insider Threats

Raymond Ribble is the CEO and Founder at SPHER, Inc. a market-leading compliance analytics, cyber-security solution addressing: HIPAA compliance, State Privacy Laws, and ePHI security threats and our presenter for this webinar. Snooping and Insider threats are exactly why user monitoring and ePHI access strategies are vital to the security of sensitive patient information and data protection. While it is an unsettling thought, not all cybersecurity incidents are traced from employee negligence. With so much attention and money surrounding cybersecurity in the healthcare industry, malicious employees may decide to purposefully disclose patient information. Since employees and contractors may have knowledge of your network setup, vulnerabilities, and access codes, snooping employees with malicious intent hold the key to exposing your organization to a series of unwanted risks and threats.