News & Analysis as of

De-Identified Protected Health Information Data Security

Health Care Compliance Association (HCCA)

[Webinar] Understanding HIPAA De-Identification: Exploring the Mysterious 18th Identifier - August 22nd, 12:00 pm - 1:30 pm CT

Learning Objectives: - Understand the methods for de-identification - Learn about the differences between anonymization, de-identification, and pseudonymization - Understand what “potential for re-identification”...more

Holland & Knight LLP

Five Red Flags in De-identification and Data Monetization for Healthcare Companies

Holland & Knight LLP on

Healthcare providers running on thin margins or just seeking new (and in the case of tax-exempt providers, permissible) revenue sources may jump at the chance when third party vendors offer to help them monetize their patient...more

McDermott Will & Emery

[Webinar] Resolving Inconsistencies in Requirements for De-identification and Anonymization of Health Data under CCPA, HIPAA, and...

McDermott Will & Emery on

For companies seeking to use, license, or otherwise commercialize health data, there are potential inconsistencies among the HIPAA de-identification standard, the CCPA definition of de-identified data, and GDPR requirements...more

Saul Ewing LLP

$750,000 Settlement Agreement Reiterates Importance of HIPAA Security Rule Compliance

Saul Ewing LLP on

On September 2, 2015, the U.S. Department of Health and Human Services ("HHS") announced that it had entered into a Settlement Agreement with an Indiana-based medical practice for alleged violations of the Health Insurance...more

Arnall Golden Gregory LLP

Six Ways for Data-Driven Medical Device Companies to Implement Effective Privacy and Security Measures

The increasing amounts of health information being generated, stored and collected have heightened the special risks medical device manufacturers have long faced. In addition to the nexus to patient health and safety, if a...more

Polsinelli

Cybersecurity for Startups Now a Cost of Entry for Consideration by Larger Clients: What is Your Company's Plan?

Polsinelli on

For technology startups, maintaining strong security controls remains vital to winning new business opportunities and strengthening existing relationships. Despite the global spike in cybersecurity attacks (there were 42.8...more

Orrick, Herrington & Sutcliffe LLP

HIPAA Security Requirements Aren't Cloudy, Especially to Whistleblowers

Earlier this month, the U.S. Department of Health and Human Services Office for Civil Rights (HHS OCR) announced that it had entered into a settlement agreement with St. Elizabeth's Medical Center (SEMC) in Brighton,...more

7 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide