Web-based Tracking Technology and AI: HIPAA Compliance Issues for Health Care Practices
Podcast: Discussing the Implications of Healthcare Privacy Violations
Podcast: Discussing Information Blocking with Eddie Williams
Expanded Information Block Rules Go into Effect
HIPPA: Privacy & Security and Potential Rule Changes
Compliance Perspectives: Privacy Investigations in a Virtual World
Tech Podcast: Interview With Innovative Health Care Tech Company Rymedi
Effectively Marketing Your Medical and Dental Practice While Staying Legally Compliant
Compliance Perspectives: The Ethics of Data
Compliance Perspective: What's New in Healthcare Privacy
Protecting Patient Medical Records
Exploring Digitization of Health and Medical Data and Records Part One
The goal of value-based care (VBC) is to promote better care for individual patients and improved health outcomes for communities at reduced costs. This is an important and admirable purpose as many VBC stakeholders attempt...more
Contract Review Tips for Long-Term Care Facilities - A long-term care facility can execute contracts with many different vendors including food product and service vendors, laundry and linen providers, IT companies, and...more
This Halloween, the scariest monsters might not be in your closet or under your bed. They may be overseas, orchestrating intrusions into your electronic medical record. Or they may be lurking in your own workforce, carrying...more
The HHS Office for Civil Rights (OCR) must improve its oversight and enforcement of patient information privacy and security rules by “covered entities” and their business associates under the Health Information Portability...more
On October 31, 2014, The U.S. Department of Health and Human Services (HHS) Office of Inspector General (OIG) released its Work Plan for fiscal year (FY) 2015. The Work Plan summarizes “new and ongoing reviews of activities...more
On December 5, 2013, the Office of Inspector General (OIG) reported on the Office for Civil Rights’ (OCR) compliance as of May 2011 with oversight and enforcement of the Security Rule and compliance with federal cybersecurity...more