Podcast: Discussing Information Blocking with Eddie Williams
Podcast: Keeping an Eye on HIPAA Trends with Shannon Hartsfield
A Zero Percent Error Rate: An Inspiring Story on How to Get There
Expanded Information Block Rules Go into Effect
Podcast: Interoperability: Information Blocking Claims and Enforcement - Diagnosing Health Care
Podcast: Interoperability: Health Care's Next Disruptor Is openEHR - Diagnosing Health Care
Podcast: Interoperability: A New Vision Through openEHR - Diagnosing Health Care
Taking the Pulse, A Health Care and Life Sciences Podcast | Episode 99: David Stefanich, Co-founder and CEO, Rymedi
Podcast: Interoperability - the Role of Health Information Exchanges - Diagnosing Health Care
Gerry Blass on Healthcare Vendor Risk Management
Hooper, Kearney and Macklin on Cutting Edge Topics in the False Claims Act
AGG Talks: Technology - In the Balance: Interoperability and Security
The New Information Blocking Rule: What It Means For Hospices
Sitting with the C-Suite: Looking Ahead to Potential Compliance Issues Due to COVID-19
From NC State to Changing the State of Health Information Networks, with Medicom Technologies’ Malcolm Benitz
Exploring Digitization of Health and Medical Data and Records Part Two
Exploring Digitization of Health and Medical Data and Records Part One
Patient Records Requests: What You Need to Know
Electronic Medical Records: Help or Hindrance?
Technology in Healthcare
The U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR) and Substance Abuse and Mental Health Services Administration (SAMHSA) released its anticipated Final Rule last week. The Final Rule revises...more
The healthcare sector is a prime target for data breaches. According to a summary by the HIPAA Journal, 32% of all data breaches between 2015 and 2022 were in the healthcare sector, “almost double the number recorded in the...more
The first law signed by California's first Governor, Peter Burnett, was the The Act Concerning the Public Archives (Chapter 1, Statutes of 1850). The act instructed the Secretary of State, William Van Voorhies, to classify...more
Ian Campbell, the President and CEO of iCONECT, has a design background and, prior to founding iCONECT, he worked in advertising and founded his own agency. In 2012 iCONECT launched its flagship review product, Xera, which...more
Recent high-profile news articles have drawn public attention to large technology companies’ access to medical information. As a result, health care entities need to prepare for questions about this topic and increased...more
Google Health’s Partnerships Raise Privacy Concerns - Recently, Google has been at the center of privacy concerns due to its health- sharing collaborations with the University of Chicago Medical Center (the Medical Center)...more
This episode is the first in a series focusing on recent efforts by the Substance Abuse and Mental Health Services Administration (SAMHSA) to update 42 C.F.R. Part 2 (Part 2) regulations related to the confidentiality of...more
On May 29, 2018, Colorado Governor John Hickenlooper signed changes to Colorado law that significantly increase potential data breach burdens and financial penalties on entities operating in Colorado.1 Beginning September 1,...more
On July 1, 2016, Tennessee’s Revised Uniform Fiduciary Access to Digital Assets Act went into effect. The Act grants fiduciaries authority to access a decedent’s digital assets. As a result, executors, trustees, powers of...more
Are you relying on your insurance policy to cover unauthorized or unintended electronic disclosure of confidential information? If so, you may want to take a closer look at your policy with an eye towards objections to...more
Commercial General Liability policies have, for several decades, included advertising and personal injury coverage. Such coverage is afforded for injury caused by various enumerated offenses, including breach of privacy....more
With headlines every day announcing another release of Protected Health Information (PHI), providers are asking themselves – is there a way to protect against these breaches? Beyond improving the security of large...more
Elaine M. Howle, the California State Auditor (“CSA”), released a report on August 25, 2015 on the results of her office’s audit of controls in the state’s information systems. The results of the audit generally were grim,...more
FCC Working Group Issues Report On Cybersecurity Best Practices – The June 2015 issue of the Intellectual Property & Technology Law Journal features an article by King & Spalding partner Steven Snyder on a Federal...more
Legal bloggers sometimes ask themselves: If my post appears on the Internet, but there’s no evidence anyone has read it, have I been published? The question has not yet been finally resolved among law firm compensation...more
On December 5, 2013, the Office of Inspector General (OIG) reported on the Office for Civil Rights’ (OCR) compliance as of May 2011 with oversight and enforcement of the Security Rule and compliance with federal cybersecurity...more
We’ve sounded warnings about the lowly copy machine before. The proliferation of digital devices in the workplace means that data security must extend beyond computer networks and laptops. Seemingly old fashioned equipment,...more