Kathleen W. McNicholas, MD, JD, CHC, CCEP, will lead the presentation Ethics and 20 years of HIPAA at the upcoming Virtual HIPAA Privacy and Security Summit 2020 on November 12
HIPAA and the HITECH Act: Recent Case Law, Statutory Changes, and Penalty Assessments
Rachel V. Rose, JD, MBA is a Principal with Rachel V. Rose – Attorney at Law, P.L.L.C. (Houston, TX). She will lead the presentation HIPAA and the HITECH Act: Recent…
Upholding HIPAA OCR Compliance & Streamlining Patient Access to Medical Data
Catherine Short speaks with Cristin Gardner, Director of Consumer Products & Markets at Life Image a healthcare network for exchanging clinical and operational information including medical images, about “Upholding HIPAA…
Deadline for Breach Reporting Coming Soon
As the end of the year approaches, keep in mind that all breaches of unsecured protected health information involving less than 500 individuals must be reported to the Secretary at…
OIG WORKPLAN 2016
The Office of the Inspector General (OIG) is responsible for protecting the integrity of the programs in Health and Human Services against fraud, waste and abuse as well as recommending…
Are You Prepared for the HIPAA Phase 2 Audits?
After reviewing the HIPAA Privacy case investigations from 2009-2011, the Office of the Inspector General sent a strong message to the Office of Civil Rights in regard to the administration…
Are your mobile devices HIPAA compliant?
As the world of healthcare evolves, more and more healthcare providers are turning to mobile devices in their practice. If you are a covered entity, you are responsible for complying…
What is the Wall of Shame?
As part of HITECH, any breach of over 500 individuals will be posted on “The Wall of Shame” on the HHS website. It is important for covered entities to be…
Do You Meet the Security Rule Requirements for a Covered Entity?
Covered entities should be aware of differences between the Privacy and Security Rule requirements regarding protected health information. One major distinction is that the HIPAA Security Rule only applies to…
Do You Meet the Privacy Rule Requirements for a Covered Entity?
Covered entities have several requirements under the Privacy Rule. The purpose of the rule is to protect and secure individually identifiable patient information and the covered provider has the ultimate…