New Search

If you are not happy with the results below please do another search

96 search results for: cybersecurity

21

Healthcare Cybersecurity

With healthcare information breaches on the rise, it’s more important than ever to protect your organization. Review our infographic and make sure you are taking the best steps to prevent disaster.

23

Clarification on Three Common HIPAA Misconceptions

Rachel V. Rose, JD, MBA These incorrect beliefs can have you running afoul with privacy regulations. Despite the Health Insurance Portability and Accountability Act of 1996 (HIPAA) being around since August 1996 and the Final Omnibus Rule being promulgated in the Federal Register on Jan. 25, 2013, it never ceases to amaze me when individuals […]

25

The Increasing Role of the FTC in the Poaching of PHI – A Discussion of Better Help, GoodRx & Flo: Audio Version of the Webinar

Rachel V. Rose, JD, MBA, principal with Rachel V. Rose – Attorney at Law, P.L.L.C., Houston, TX will be presenting this informative webinar. Cybersecurity risk management and the potential for enforcement actions is not diminishing. An area of increasing interest by the Federal Trade Commission, the United States Department of Justice, and Congress is third parties taking sensitive data (especially by social media and search engine giants), including protected health information, without obtaining affirmative patient/consumer consent and benefiting financially. The U. S. Department of Health and Human Services, the agency tasked with enforcing HIPAA, also plays a critical role. The purpose of this presentation is to address different federal government initiatives, recent enforcement actions and incidents, and risk mitigation.

26

A Closer Look at the FTC and the Poaching of PHI

Join Rachel V. Rose’s complimentary webinar on May 16, 12-1 pm ET, to learn about the increasing role of the Federal Trade Commission in the poaching of protected health information. The session will cover federal government initiatives, recent enforcement actions, risk mitigation measures, and implications of not obtaining appropriate consent.

27

The Increasing Role of the Federal Trade Commission in the Poaching of PHI – A Discussion of Better Help, GoodRx & Flo

Rachel V. Rose, JD, MBA, principal with Rachel V. Rose – Attorney at Law, P.L.L.C., Houston, TX will be presenting this informative webinar. Cybersecurity risk management and the potential for enforcement actions is not diminishing. An area of increasing interest by the FTC, the United States DOJ, and Congress is third parties taking sensitive data (especially by social media and search engine giants), including protected health information, without obtaining affirmative patient/consumer consent and benefiting financially. The U. S. Department of HHS, the agency tasked with enforcing HIPAA, also plays a critical role. The purpose of this presentation is to address different federal government initiatives, recent enforcement actions and incidents, and risk mitigation.

28

A Practical Approach to The Safe Harbor Law

1st Talk Compliance features guest Raymond Ribble, CEO and Founder at SPHER, Inc., on the topic of A Practical Approach to The Safe Harbor Law. Ray joins our host Catherine Short to discuss how HIPAA data breach penalties typically get measured in millions of dollars, even following an organization implementing NIST cybersecurity framework measures. However, with the new HIPAA Safe Harbor Law, signed in January 2021, HHS and OCR may consider some penalty mitigation. It is important to understand that the Safe Harbor Law, while offering substantial protection, does not provide a true safe harbor and only offers some protection. This episode will examine what the established security practices for healthcare are, and how to pivot your organization’s security profile to mitigate breach penalties if an event occurs.

29

The Safe Harbor Law: A Practical Approach – Audio Version of the Webinar

Raymond Ribble is the CEO and Founder at SPHER, Inc. HIPAA data breach penalties typically get measured in millions of dollars even following an organization implementing NIST cybersecurity framework measures. It is important to understand that the Safe Harbor Law, while offering substantial protection, does not provide a true safe harbor. Our presentation will examine what are the established security practices for healthcare, and how to pivot your organization’s security profile in order to mitigate breach penalties in the event of an event.

30

How to Protect Your Healthcare Assets: Q&A

Highly-regarded attorneys Sean McKenna, Lauren Nelson, and Vincent Aiello of Spencer Fane LLP recently held the comprehensive webinar Preserving and Protecting Assets in Healthcare joined by Catherine Short and First Healthcare Compliance. Read Sean, Lauren, and Vince’s lively question and answer session related to enforcement and liability proceedings with asset protection, and explore government and private litigation matters.