News & Analysis as of

De-Identified Protected Health Information Protected Health Information

Health Care Compliance Association (HCCA)

[Webinar] Understanding HIPAA De-Identification: Exploring the Mysterious 18th Identifier - August 22nd, 12:00 pm - 1:30 pm CT

Learning Objectives: - Understand the methods for de-identification - Learn about the differences between anonymization, de-identification, and pseudonymization - Understand what “potential for re-identification”...more

Holland & Knight LLP

Five Red Flags in De-identification and Data Monetization for Healthcare Companies

Holland & Knight LLP on

Healthcare providers running on thin margins or just seeking new (and in the case of tax-exempt providers, permissible) revenue sources may jump at the chance when third party vendors offer to help them monetize their patient...more

Health Care Compliance Association (HCCA)

Settlement Involves 'Dark Overlord' Hack, Tip by Breach-Tracking Journalist

Report on Patient Privacy 20, no. 10 (October 2020) - September was quite the month for enforcement actions by the HHS Office for Civil Rights (OCR). The agency announced eight settlements totaling more than $10 million....more

McDermott Will & Emery

[Webinar] Resolving Inconsistencies in Requirements for De-identification and Anonymization of Health Data under CCPA, HIPAA, and...

McDermott Will & Emery on

For companies seeking to use, license, or otherwise commercialize health data, there are potential inconsistencies among the HIPAA de-identification standard, the CCPA definition of de-identified data, and GDPR requirements...more

Holland & Hart - Health Law Blog

Use of PHI for Non-Patient Purposes

In an era of decreasing reimbursement and rapidly expanding opportunities associated with “big data”, healthcare entities may be looking for ways to monetize protected health information (“PHI”) for their own, non-patient...more

Tucker Arensberg, P.C.

Negotiating Software Agreements – Key Terms For Electronic Health Records

Healthcare providers (Providers) rely on third party vendors for providing Electronic Health Record (EHR) software services. Due to the amount of protected health information Providers store in these software services, and...more

Saul Ewing LLP

$750,000 Settlement Agreement Reiterates Importance of HIPAA Security Rule Compliance

Saul Ewing LLP on

On September 2, 2015, the U.S. Department of Health and Human Services ("HHS") announced that it had entered into a Settlement Agreement with an Indiana-based medical practice for alleged violations of the Health Insurance...more

Dickinson Wright

Healthcare Legal News: Volume 5, Number 3

Dickinson Wright on

RESPONDING TO SUBPOENAS AND OTHER REQUESTS FOR PERSONAL HEALTH INFORMATION: TAKE THEM AT FACE VALUE - Healthcare providers and other HIPAA covered entities receive requests for protected health information (“PHI”) from...more

Polsinelli

Cybersecurity for Startups Now a Cost of Entry for Consideration by Larger Clients: What is Your Company's Plan?

Polsinelli on

For technology startups, maintaining strong security controls remains vital to winning new business opportunities and strengthening existing relationships. Despite the global spike in cybersecurity attacks (there were 42.8...more

McDermott Will & Emery

OCR Launches Phase 2 HIPAA Audit Program with Pre-Audit Screening Surveys

McDermott Will & Emery on

Health Insurance Portability and Accountability Act of 1996 (HIPAA) covered entities have reported that the U.S. Department of Health and Human Services Office for Civil Rights (OCR) recently sent pre-audit screening surveys...more

10 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide