One crucial aspect healthcare entities must prioritize in the ever-evolving landscape of healthcare regulations is exclusion screening, which is the process of checking individuals and entities against various exclusion lists to ensure compliance with federal and state regulations. Failing to comply with these requirements can have serious consequences for your organization. Read on to explore the importance of exclusion screening, its benefits, and how partnering with the right experts can help you navigate this critical aspect of healthcare compliance.
The Increasing Role of the FTC in the Poaching of PHI – A Discussion of Better Help, GoodRx & Flo: Audio Version of the Webinar
Rachel V. Rose, JD, MBA, principal with Rachel V. Rose – Attorney at Law, P.L.L.C., Houston, TX will be presenting this informative webinar. Cybersecurity risk management and the potential for enforcement actions is not diminishing. An area of increasing interest by the Federal Trade Commission, the United States Department of Justice, and Congress is third parties taking sensitive data (especially by social media and search engine giants), including protected health information, without obtaining affirmative patient/consumer consent and benefiting financially. The U. S. Department of Health and Human Services, the agency tasked with enforcing HIPAA, also plays a critical role. The purpose of this presentation is to address different federal government initiatives, recent enforcement actions and incidents, and risk mitigation.
A Closer Look at the FTC and the Poaching of PHI
Join Rachel V. Rose’s complimentary webinar on May 16, 12-1 pm ET, to learn about the increasing role of the Federal Trade Commission in the poaching of protected health information. The session will cover federal government initiatives, recent enforcement actions, risk mitigation measures, and implications of not obtaining appropriate consent.
The Safe Harbor Law: A Practical Approach – Audio Version of the Webinar
Raymond Ribble is the CEO and Founder at SPHER, Inc. HIPAA data breach penalties typically get measured in millions of dollars even following an organization implementing NIST cybersecurity framework measures. It is important to understand that the Safe Harbor Law, while offering substantial protection, does not provide a true safe harbor. Our presentation will examine what are the established security practices for healthcare, and how to pivot your organization’s security profile in order to mitigate breach penalties in the event of an event.
The Risk of Data Sharing
1st Talk Compliance features guest Iliana L. Peters, Shareholder at Polsinelli PC, on the topic of The Risk of Data Sharing. Iliana joins our host Catherine Short to discuss how these days, health data is an incredibly valuable commodity. Companies of all types should consider the legal risk with data valuation, data ownership, and data sharing agreements. In this episode, we will be discussing the scope and breadth of data sharing projects in development in the health care sector, examine contractual, state, federal, and international legal obligations for data privacy and security for such projects, and discuss issues related to data ownership that may also be part of such projects.
DMEPOS – In Compliance with CMS
1st Talk Compliance features guest Rachel V. Rose, JD, MBA, principal with Rachel V. Rose – Attorney at Law, P.L.L.C., on the topic “DMEPOS – In Compliance with CMS.” Rachel joins our host Catherine Short to discuss special payment rules associated with durable medical equipment, prosthetics, orthotics and supplies. DMEPOS products must meet quality standards, suppliers need to be accepted by Medicare to participate, similar to providers, and are subject to fraud, waste, and abuse laws. This episode will provide an overview of participation and quality requirements, relay the latest compliance and requirements updates, and discuss the consequences of non-compliance, as well as submitting false and fraudulent claims.
The Criminal Side of Cybersecurity and HIPAA – Audio Version of the Webinar
Expert presenter, Rachel V. Rose, JD, MBA, principal with Rachel V. Rose – Attorney at Law, P.L.L.C., Houston, TX guides us during this important and informative webinar. Breaches and the lack of the requisite technical, administrative, and physical safeguards can have criminal consequences. While most people are familiar with civil cases, there is the potential for HIPAA violations and ransomware attacks to be prosecuted criminally. The purpose of this webinar is to highlight potential areas of criminal liability, give specific examples, and address mitigation techniques – both before and after a government discovery request or grand jury subpoena emerges.
Infographic: HIPAA, Health Apps, & Securing PHI
Adapted from First Healthcare Compliance’s presentation with Rachel V. Rose, JD, MBA, principal with Rachel V. Rose – Attorney at Law, P.L.L.C., HIPAA and Health Apps, this infographic is a concise focus on the best steps to mitigate risk when dealing with sensitive protected health information (PHI).
Infographic: 6 Steps To Mitigate Risks with PHI
Adapted from First Healthcare Compliance’s presentation with Rachel V. Rose, JD, MBA, principal with Rachel V. Rose – Attorney at Law, P.L.L.C., “HIPAA and Health Apps,” this infographic is a concise focus on the best steps to mitigate risk when dealing with sensitive protected health information (PHI).
Employee Snooping & Insider Threats
1st Talk Compliance features guest Raymond Ribble, CEO and Founder at SPHER, Inc., on the topic of “Employee Snooping & Insider Threats.” Ray joins our host Catherine Short to discuss snooping and insider threats and why user monitoring and ePHI access strategies are vital to the security of sensitive patient information and data protection. With so much attention and money surrounding cybersecurity in the healthcare industry, malicious employees may decide to purposefully disclose patient information. Since employees and contractors may have knowledge of your network setup, vulnerabilities, and access codes, snooping employees with malicious intent hold the key to exposing your organization to a series of unwanted risks and threats. Listen as we identify signs of unauthorized access, provide guidelines to prevent snooping, and offer procedures to detect insider threats.