HIPAA Zone

How to Handle Document Retention & Destruction

1st Talk Compliance features guest Rachel V. Rose, JD, MBA, principal with Rachel V. Rose – Attorney at Law, P.L.L.C., Houston, TX, on the topic of “HIPAA and Beyond: Documentation Retention & Legal Holds.” Rachel joins our host, Catherine Short to review a multitude of laws, including HIPAA, requires certain types of documents be kept for a certain period of time. How does document retention play out for public companies subject to SOX and what should companies do in the event of a legal hold or a preservation request? This presentation addresses laws that are relevant to healthcare industry participants, as well as compliance suggestions, and steps to take when either a legal hold or a preservation request arrives.

Snooping Webinar

How to Prevent Employee Snooping and Insider Threats – Audio Version of the Webinar

Raymond Ribble is the CEO and Founder at SPHER, Inc. a market-leading compliance analytics, cyber-security solution addressing: HIPAA compliance, State Privacy Laws, and ePHI security threats and our presenter for this webinar. Snooping and Insider threats are exactly why user monitoring and ePHI access strategies are vital to the security of sensitive patient information and data protection. While it is an unsettling thought, not all cybersecurity incidents are traced from employee negligence. With so much attention and money surrounding cybersecurity in the healthcare industry, malicious employees may decide to purposefully disclose patient information. Since employees and contractors may have knowledge of your network setup, vulnerabilities, and access codes, snooping employees with malicious intent hold the key to exposing your organization to a series of unwanted risks and threats.

Recent Developments in Health Info Privacy

Recent Developments in Health Information Privacy: HIPAA Right of Access, NPRM, & Information Blocking: Audio Version of the Webinar

First Healthcare Compliance hosts Sheba Vine, Attorney and Senior Manager in the Global Privacy Office at Exact Sciences Corporation, for an interactive discussion on “Recent Developments in Health Information Privacy: HIPAA Right of Access, NPRM, & Information Blocking.” This presentation will review recent developments including OCR Enforcement Highlights, HIPAA Right of Access & Ciox Health Decision, NPRM, and 21st Century Cures Act Information Blocking Regulation.

Recent Developments in Health Information Privacy: HIPAA Right of Access

Catherine Short speaks with Sheba Vine, Attorney and Senior Manager in the Global Privacy Office at Exact Sciences Corporation, on the topic of “Recent Developments in Health Information Privacy: HIPAA Right of Access.” We will review recent developments including OCR Enforcement Highlights, HIPAA Right of Access & Ciox Health Decision, NPRM, and 21st Century Cures Act Information Blocking Regulation.

Combating Ransomware in Healthcare

Combating Ransomware in Healthcare: Audio Version of the Webinar

First Healthcare Compliance hosts William J McBorrough, co-Founder and Chief Security Advisor at MCGlobalTech, a Washington, D.C.-based Information Security Consulting Firm for an interactive discussion on “Combating Ransomware in Healthcare.” Ransomware attacks have impacted thousands of organizations worldwide. The healthcare sector has been the most targeted. Join in to discuss the state of ransomware in the healthcare sector in 2021 and best practices to prepare your organization from the inevitable attacks.

Happy 25th Anniversary HIPAA!

HIPAA Celebrates 25 Years – A Synopsis of the Law’s Evolution

Rachel V. Rose, JD, MBA, principal with Rachel V. Rose – Attorney at Law, P.L.L.C., Houston, TX presents this timely webinar. It’s hard to believe that it’s been 25 years since HIPAA was signed into law on August 21, 1996! Over the past two and a half decades, there have been a multitude of changes in the healthcare industry and technology. The three items that remain constant are preserving the confidentiality, integrity, and availability of a patient’s protected health information.

Happy Birthday HIPAA!! 25 Years of Growing and Changing!

Catherine Short speaks with Rachel V. Rose, JD, MBA, principal with Rachel V. Rose – Attorney at Law, P.L.L.C., Houston, TX, on the topic of “HIPAA Celebrates 25 Years – A Synopsis of the Law’s Evolution.” It’s hard to believe that it’s been 25 years since HIPAA was signed into law on August 21, 1996! Over the past two and a half decades, there have been a multitude of changes in the healthcare industry and technology. The three items that remain constant are preserving the confidentiality, integrity, and availability of a patient’s protected health information.

New Approach to Cybersecurity Training

Stop the Insanity! Why Healthcare Organizations Need to Take a New Approach to Cybersecurity & Data Privacy Training

Rebecca L. Rakoski, managing partner at XPAN Law Partners and Sajed Naseem, Chief Information Security Officer (CISO) from NJ Courts are presenting this engaging webinar. Employees are one of an organization’s greatest strengths, but also its greatest weaknesses. For years cybersecurity and data privacy advocates have been arguing that training employees is the only way to safeguard the organization. This is especially true in the healthcare arena where HIPAA training is required. However, these same healthcare organizations engage in training for their employees only to stare down the barrel of a data breach caused by one of those trained employees.The question becomes, why do we continue to repeat the same exercise expecting a different outcome?

Healthcare Cybersecurity Awareness Training

Healthcare Cybersecurity Awareness Training

Raymond Ribble, founder of SPHER, Inc. a leading SaaS-based compliance analytics solution addressing PHI protection and cybersecurity in healthcare, leads this informative webinar. This presentation takes the audience through a series of scenarios and lessons learned that can assist in securing the employee “endpoint” either in the office or at a Home Office. The presentation highlights key security measures a person can deploy to create a better security environment in order to protect their personal and professional documents from unauthorized access.

Menu