New Search

If you are not happy with the results below please do another search

259 search results for: data

91

How to Prevent Employee Snooping and Insider Threats – Audio Version of the Webinar

Raymond Ribble is the CEO and Founder at SPHER, Inc. a market-leading compliance analytics, cyber-security solution addressing: HIPAA compliance, State Privacy Laws, and ePHI security threats and our presenter for this webinar. Snooping and Insider threats are exactly why user monitoring and ePHI access strategies are vital to the security of sensitive patient information and data protection. While it is an unsettling thought, not all cybersecurity incidents are traced from employee negligence. With so much attention and money surrounding cybersecurity in the healthcare industry, malicious employees may decide to purposefully disclose patient information. Since employees and contractors may have knowledge of your network setup, vulnerabilities, and access codes, snooping employees with malicious intent hold the key to exposing your organization to a series of unwanted risks and threats.

92

Employment and Labor Law Digest

1st Talk Compliance features guest Catherine Walters, a partner at BYBEL RUTLEDGE LLP and management-side labor and employment attorney representing employers of all sizes, on the topic of “Employment and Labor Law Digest.” Catherine joins our host, Catherine Short to update employers and human resources professionals on recent employment and labor law developments and discuss specific hot topics.

93

How to Prevent Employee Snooping and Insider Threats

Raymond Ribble is the CEO and Founder at SPHER, Inc. a market-leading compliance analytics, cyber-security solution addressing: HIPAA compliance, State Privacy Laws, and ePHI security threats and our presenter for this webinar. Snooping and Insider threats are exactly why user monitoring and ePHI access strategies are vital to the security of sensitive patient information and data protection. While it is an unsettling thought, not all cybersecurity incidents are traced from employee negligence. With so much attention and money surrounding cybersecurity in the healthcare industry, malicious employees may decide to purposefully disclose patient information. Since employees and contractors may have knowledge of your network setup, vulnerabilities, and access codes, snooping employees with malicious intent hold the key to exposing your organization to a series of unwanted risks and threats.

95

Healthcare and Technology Negotiations

Catherine Short converses with Rachel V. Rose, JD, MBA, principal with Rachel V. Rose – Attorney at Law, P.L.L.C., Houston, TX and Bruce J. Lynskey, Co-Founder at ePrevenir, on the topic of “Negotiations in Healthcare and Technology.” Negotiating occurs in every facet of business and law. From contractual negotiations through settlement negotiations, it is a delicate dance. There are a variety of classic negotiation techniques, which include extreme posturing and “anchoring”. Healthcare and cybersecurity present unique challenges because of the looming exposure to a government investigation and either a civil and/or criminal action, even if a settlement is reached between two private parties. Here we will discuss approaches when negotiating contracts, settlements, and other items, which arise in healthcare and the cybersecurity industries.

96

Hardware Hacking in Healthcare: Expert Insights

The healthcare industry and hospitals are increasingly at risk for ransomware and other types of cyberattacks. Several recent examples illustrate the risks and repercussions that result from a combination of inadequate resources and a lack of clear and effective cybersecurity guidelines.

97

Fraud, Healthcare, COVID-19 and the False Claims Act

Catherine Short speaks with Shauna Itri, Partner at Seeger Weiss LLP on the topic of “Fraud, Healthcare, COVID-19 and the False Claims Act.” A whistleblower or qui tam action can provide financial rewards to individuals who have information that a company/individual has committed fraud. The primary statutes under which this relief may be sought are the federal and state False Claims Acts (“FCAs”). In addition to the FCAs, there are other statutes which apply to tax fraud, securities fraud, and in California, fraud on private insurance companies. This episode will provide an overview of the False Claims Acts, the knowledge and skills to be able to recognize a potential whistleblower case, and understand the unique procedures utilized in filing whistleblower cases/tips. We will also delve into recent trends in cases brought (or that could be brought) under the False Claims Act including cases involving mined data and potential fraud related to COVID-19.

98

What is OSHA Compliance Training?

Under the Occupational Safety and Health Act, OSHA has the authority to issue workplace health and safety regulations known as OSHA Standards. There are nine OSHA standards that are most frequently addressed regarding the healthcare industry.

100

Hardware Hacking Trends – The Insecurity of Everything: Audio Version of the Webinar

John Shegerian, Co-Founder and Chairman/CEO of ERI and co-author of the cybersecurity book, “the Insecurity of Everything” will be presenting a talk about cybersecurity titled “The Insecurity of Everything: How Hardware Data Security is Becoming the Most Important Topic in the World” and will share some of the latest information about the very real problem of hardware hacking in the world of healthcare and beyond and how that issue became even more serious during the pandemic, with so many people working from home. He will also be explaining critical information for health-related businesses to help them keep their private data – and the data of their patients and customers – protected!