HIPAA

  1. Home
  2. HIPAA
  3. (Page 4)
Happy 25th Anniversary HIPAA!

HIPAA Celebrates 25 Years – A Synopsis of the Law’s Evolution

Rachel V. Rose, JD, MBA, principal with Rachel V. Rose – Attorney at Law, P.L.L.C., Houston, TX presents this timely webinar. It’s hard to believe that it’s been 25 years since HIPAA was signed into law on August 21, 1996! Over the past two and a half decades, there have been a multitude of changes in the healthcare industry and technology. The three items that remain constant are preserving the confidentiality, integrity, and availability of a patient’s protected health information.

Happy Birthday HIPAA!! 25 Years of Growing and Changing!

Catherine Short speaks with Rachel V. Rose, JD, MBA, principal with Rachel V. Rose – Attorney at Law, P.L.L.C., Houston, TX, on the topic of “HIPAA Celebrates 25 Years – A Synopsis of the Law’s Evolution.” It’s hard to believe that it’s been 25 years since HIPAA was signed into law on August 21, 1996! Over the past two and a half decades, there have been a multitude of changes in the healthcare industry and technology. The three items that remain constant are preserving the confidentiality, integrity, and availability of a patient’s protected health information.

Negotiations in Healthcare and Technology – An Interview with Professor Bruce Lynskey

Rachel V. Rose, JD,MBA, principal at Rachel V. Rose – Attorney at Law, PLLC (Houston, Texas) and Bruce Lynskey, Co-Founder, Director, and Chief Executive Officer at ePrevenir, will present the webinar “Negotiations in Healthcare and Technology” on September 21, 2021. The 90-minute special presentation will be worth 1.5 CEUs. In anticipation of this event, Rachel and Bruce present this valuable interview.

Commemorate the 25th Anniversary of HIPAA with Educational Webinar with Rachel V. Rose

HIPAA was signed into law 25 years ago on August 21, 1996. Over the past two and a half decades, there have been a multitude of changes in the healthcare industry and technology. The three concepts that remain constant are preserving the confidentiality, integrity, and availability of a patient’s protected health information. In this “ode to HIPAA”, participants will glimpse some of the lesser known or emphasized aspects of HIPAA, as well as key parts of its history, recent enforcement actions, and anticipated developments.

5 Basic Features of HIPAA Compliance Management Software

The Office of the Inspector General (OIG) of the Department of Health and Human Services, U.S. has published the seven fundamental elements of an effective compliance program. Healthcare organizations should create a compliance program that can reduce fraud, abuse liability, and waste. If the compliance management software that you are considering doesn’t have mechanisms to address all these elements, it is not a comprehensive solution and won’t fully protect you from OCR audits and fines.

New Approach to Cybersecurity Training

Stop the Insanity! Why Healthcare Organizations Need to Take a New Approach to Cybersecurity & Data Privacy Training

Rebecca L. Rakoski, managing partner at XPAN Law Partners and Sajed Naseem, Chief Information Security Officer (CISO) from NJ Courts are presenting this engaging webinar. Employees are one of an organization’s greatest strengths, but also its greatest weaknesses. For years cybersecurity and data privacy advocates have been arguing that training employees is the only way to safeguard the organization. This is especially true in the healthcare arena where HIPAA training is required. However, these same healthcare organizations engage in training for their employees only to stare down the barrel of a data breach caused by one of those trained employees.The question becomes, why do we continue to repeat the same exercise expecting a different outcome?

Healthcare Cybersecurity Awareness Training

Healthcare Cybersecurity Awareness Training

Raymond Ribble, founder of SPHER, Inc. a leading SaaS-based compliance analytics solution addressing PHI protection and cybersecurity in healthcare, leads this informative webinar. This presentation takes the audience through a series of scenarios and lessons learned that can assist in securing the employee “endpoint” either in the office or at a Home Office. The presentation highlights key security measures a person can deploy to create a better security environment in order to protect their personal and professional documents from unauthorized access.

Menu