Safe Harbor Law 2023
Safe Harbor Law 2023
FTC and Poaching of PHI

The Increasing Role of the Federal Trade Commission in the Poaching of PHI – A Discussion of Better Help, GoodRx & Flo

Rachel V. Rose, JD, MBA, principal with Rachel V. Rose – Attorney at Law, P.L.L.C., Houston, TX will be presenting this informative webinar. Cybersecurity risk management and the potential for enforcement actions is not diminishing. An area of increasing interest by the FTC, the United States DOJ, and Congress is third parties taking sensitive data (especially by social media and search engine giants), including protected health information, without obtaining affirmative patient/consumer consent and benefiting financially. The U. S. Department of HHS, the agency tasked with enforcing HIPAA, also plays a critical role. The purpose of this presentation is to address different federal government initiatives, recent enforcement actions and incidents, and risk mitigation.
Infographic: HIPAA, Health Apps, & Securing PHI

Infographic: HIPAA, Health Apps, & Securing PHI

Adapted from First Healthcare Compliance’s presentation with Rachel V. Rose, JD, MBA, principal with Rachel V. Rose – Attorney at Law, P.L.L.C., HIPAA and Health Apps, this infographic is a concise focus on the best steps to mitigate risk when dealing with sensitive protected health information (PHI). 

Congratulations to our 2022 Presenter of the Year!

Each year thousands of healthcare compliance professionals rely…
Safe Harbor Law 2023

The Safe Harbor Law: A Practical Approach

Raymond Ribble is the CEO and Founder at SPHER, Inc. a market-leading compliance analytics, cyber-security solution addressing: HIPAA compliance, State Privacy Laws, and ePHI security threats and our expert presenter for this webinar. HIPAA data breach penalties typically get measured in millions of dollars even following an organization implementing NIST cybersecurity framework measures. With the new HIPAA Safe Harbor Law, HHS and OCR may consider increased penalty mitigation when an organization can demonstrate it has been following established good security practices. Our presentation will examine what are the established security practices for healthcare, and how to pivot your organization's security profile in order to mitigate breach penalties in the event of an event.