What's the Tea in L&E? Can You Share An Employee's Medical Info?
Healthcare Document Retention
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 190: Healthcare Tech and Human Resources with Shannon Frazier, HR Executive Director at Lenovo
The Chartwell Chronicles: Occupational Exposure Claims
Proof in Trial: Appellate Edition: Integra Med Analytics LLC et al. v. Providence Health & Services et al.
Hospice Audit Series | Painting the Picture: How to Advocate for Clinical Hospice Eligibility in the Audit Appeal Process
2022 Resolutions: What Healthcare Practices Need To Tackle In the New Year
Podcast: Are Vaccine Passports the Key to Reopening? - Diagnosing Health Care
Compliance Perspective: What's New in Healthcare Privacy
Workers' Compensation Academy: The Smoking Gun: Importance of Investigation in Insurance & Workers’ Compensation
From NC State to Changing the State of Health Information Networks, with Medicom Technologies’ Malcolm Benitz
Protecting Patient Medical Records
Exploring Digitization of Health and Medical Data and Records Part Two
Patient Records Requests: What You Need to Know
Technology in Healthcare
The revamped Health Breach Notification Rule by the Federal Trade Commission (FTC) took effect on July 29, 2024, expanding consumer privacy protections to the users of online health platforms and health and wellness apps. Our...more
This year, the federal government has made significant changes to longstanding health care privacy rules, while state lawmakers continue to enact privacy restrictions on consumer health data. These reforms modify legal...more
Organizations typically deal with ransomware attacks out of the public eye, but the massive scale of United Healthcare Group’s (UHG) February breach made that an impossibility. UHG CEO Andrew Witty was recently on the hot...more
The Cybersecurity and Infrastructure Agency (CISA) is seeking comment on a proposed rule to implement reporting requirements for critical infrastructure entities, including health care entities, on cyberattacks and ransomware...more
Healthcare organizations continue to be prime targets of cyberattacks. It is well-established that cyberattacks can lead to financial loss, reputational damage, and, in some cases, risks to patient care and safety. The recent...more
From cases involving car crashes to employee termination disputes, there are countless reasons for legal professionals to require access to a client’s medical, employment, financial, and other records. What’s more, these...more
The FTC recently proposed amendments to the Health Breach Notification Rule (HBNR). This is on trend with its aggressive interest over the last couple of years in health data not covered by HIPAA....more
Report on Patient Privacy 22, no. 10 (October, 2022) - Thirty Democratic senators led by Sen. Patty Murray, D-Wash., have called on HHS to strengthen federal privacy protections under HIPAA to broadly restrict providers...more
You’ve probably either played the game “Whac-a-Mole” yourself as a kid, or you watched your kid play it, at a Chuck E. Cheese or another similar arcade. It’s a simple game with five holes in which moles pop up and a soft...more
Report on Patient Privacy 21, no. 12 (December, 2021) - Huntington Hospital in New York has sent notices to approximately 13,000 patients about an incident that happened in late 2018 and early 2019 involving a night shift...more
The New Jersey Attorney General’s Office announced on October 12 that Diamond Institute for Infertility and Menopause, LLC, based in Millburn, NJ, will pay a $495,000 penalty for allegedly violating HIPAA and state law by...more
Report on Patient Privacy 21, no. 10 (October, 2021) - A massive data breach at University of New Mexico (UNM) Health may have allowed a third party to obtain medical records from more than 600,000 patients—more than a...more
In this episode, Rebecca Schaefer interviews Gina Bertolini and Desiree Moore about the recent Federal Trade Commission (FTC) policy statement regarding the FTC Health Breach Notification Rule and its applicability to vendors...more
Ransomware Particularly Inflicts Health Care and Life Sciences Organizations - Ransomware is a malicious cyber threat vector that employs encryption malware to prevent users from accessing their systems and data unless...more
Report on Medicare Compliance 30, no. 14 (April 12, 2021) - When employees are required to show their employers proof of a positive COVID-19 test before they get sick leave or a vaccination before returning to work, the...more
Our Virtual Regional Healthcare Compliance Conferences provide updates on the latest news in regulatory requirement, compliance enforcement, and strategies to develop effective compliance programs. Watch, listen, and ask...more
One year ago – in early 2020 – most of us did not know what COVID-19 meant (co-Corona; vi-Virus; d-disease; 19 – 2019); had no idea how to “zoom”; did not know what social distance meant; and, were largely unfamiliar with...more
Health care technology has seen an incredible amount of change over the past twelve months. As health care providers and entities continue to provide patient care in unprecedented times, it is becoming increasingly important...more
Recently the Health Care Compliance Association released the new Health Care Privacy Handbook, 3rd Edition. https://www.hcca-info.org/health-care-privacy-handbook To learn what’s new in the book and in healthcare privacy...more
California Attorney General Xavier Becerra charged Glow, Inc. (Glow), a fertility health app, with privacy and basic security failures that allegedly put women’s “deeply-sensitive” personal and medical information at risk....more
Users of Universal Health Services (UHS), one of the largest healthcare systems in the country, recently lost access to electronic medical records when UHS suffered a ransomware attack and took its systems offline to...more
Report on Patient Privacy 20, no. 9 (September 2020) - The fact that people are the weakest link in compliance is a truism in the privacy and security world. But just how weak is this link, and how likely is it that...more