Protected Health Information

News & Analysis as of

Polsinelli Podcasts: Cloud Computing, From Cybersecurity to Confidentiality Issues [Video]

Hosting and securing data is a concern for both businesses and consumers. As companies and health systems are quickly adopting the idea of hosting data “in the cloud,” regulatory agencies are crafting laws to protect private...more

Physician Practices Be Alert: You Might Be Violating HIPAA If You Produce Medical Records In Response To State Court Subpoenas

Over the past months, my experiences with physician practices have made me realize that many practices do not understand how HIPAA applies to subpoenas for medical records. More worrisome, I suspect that many practices...more

HHS/Office of the National Coordinator issues report that health information sharing is being blocked to gain a competitive edge

In a scathing report released last Friday, the Department of Health and Human Services Office of the National Coordinator (ONC) accused hospitals and software vendors of preventing the sharing of health information in order...more

EEOC Issues Proposed Wellness Program Amendments to ADA Regulations

On April 16, 2015, the Equal Employment Opportunity Commission (“EEOC”) released its highly anticipated proposed regulations (to be published in the Federal Register on April 20, 2015, for notice and comment) setting forth...more

National Roadmap for Health Data Sharing: FTC Advocates Preservation of Privacy and Competition

On April 1, 2015, the Office of the National Coordinator for Health Information Technology (ONC), which assists with the coordination of federal policy on data sharing objectives and standards, issued its Shared Nationwide...more

Legal and Regulatory Landscape for Mobile Health Technologies

Mobile health (mHealth) technologies continue to expand in application and implementation. Over the past decade, the breadth of these technologies has grown from the creation of healthcare-directed websites (think WebMD) to...more

Data Privacy and Security Considerations in M&A Transactions

By some estimates, cybercrime costs the global economy $445 billion annually. If cybercrime were a single country, this dollar amount would place it within the world’s top 30 countries in terms of gross domestic product, and...more

Beyond HIPAA: Connected Health Care and the Internet of Things

The U.S. Federal Trade Commission (FTC) Staff Report titled "Internet of Things: Privacy & Security in a Connected World," released in January 2015, continues to generate interest and questions about the regulation of health...more

Blog: HIPAA FAQ Series: Do You Need a BAA with Your Mail Carrier?

This week, the HIPAA FAQ series continues with a topic about business associate agreements (BAAs). Most Covered Entities and Business Associates are familiar with general BAA obligations. ...more

Pharmacies: Watch Out for Future HHS Crackdowns on Security Rule Violations

As we all know by now, HIPAA required the Secretary of the U.S. Department of Health and Human Services (HHS) to adopt regulations protecting the privacy of "protected health information" (PHI). HHS responded to that...more

Is Your Company Ready to Comply with Encryption of Individually Identifiable Health Information?

New Jersey’s new data privacy standard, signed into law as S. 562 by Gov. Chris Christie on January 9, requires health insurance carriers that are authorized to issue health benefit plans in New Jersey to protect individually...more

Blog: HIPAA FAQ Series: Does HIPAA Permit Communications via E-mail with PHI Subjects?

Last week, we introduced a new series to this blog that will cover frequently asked questions regarding the Health Insurance Portability and Accountability Act (HIPAA). This week, the series continues by delving into a hot...more

OCR’s Enforcement of HIPAA’s Privacy and Security Rules Continues with Robust 2014

With the news of the recent cyber-attack and resulting data breach at health insurance giant Anthem Inc., the buzz around data security and privacy is again high. The Anthem breach serves as a reminder to those entities...more

A Look Back: NetDiligence 2014 Cyber Claims Study

The NetDiligence 2014 Cyber Claims Study relies on data voluntarily provided by insurers about amounts paid out on cyber claims occurring from 2011 through 2013. Since the Study only accounts cyber claims reported to larger...more

Lessons Learned from Recent Data Security Breaches, Part Two

Because controlling access is essential to protecting privacy of PHI under HIPAA, the HITECH Security Rule essentially requires that a covered entity control physical and electronic access to the data system by implementing...more

State Legislatures React To Latest Health Data Breaches By Updating State Data Breach Notification Laws And Encryption...

Recent, large-scale breaches of health information have served to highlight the fact that federal agencies have only rarely assessed penalties against companies as a result of these breaches, while many states do not have...more

Lessons Learned from the Anthem Cyber-Attack and Corresponding “HIPAA Actions”

Anthem Inc. (“Anthem”), the nation's second-largest health insurer, disclosed on Wednesday, February 4, 2015, that it was the victim of a major cyber-attack. According to Anthem, the attack exposed personal information of...more

Monthly Benefits Alert - February 2015

Health & Wellness Plans - Anthem Data Breach Requires Plan Sponsor Attention - On January 29, 2015, Anthem Inc., one of the largest managed health care companies in the country, disclosed that the sensitive...more

US District Court in Texas Finds Plaintiffs Lack Article III Standing in PHI Breach

Beverly Peters v. St. Joseph Services Corporation d/b/a St. Joseph Health Care System was a class action that arose out of a data breach of the defendant-health care service provider. It was alleged in the action that...more

Tapping Into the Big Value of Health Care Big Data

In This Issue: - Executive Summary - Improving Care by Tapping Into the Data Goldmine - Big Opportunities Available in Big Data - Government Programs Supporting the Use of Big Data -...more

“Bring Your Own Device” To Work Programs: Regulatory and Legal Risks and How To Minimize Them

If you’ve ever left your mobile phone on an airplane, in a restaurant, or somewhere other than in your possession, you know it’s frightening enough to think of losing the device itself, which costs a premium, as well as your...more

New Jersey Imposes Unique Encryption Requirements

Effective August 1, 2015, New Jersey will require health insurance carriers authorized to issue health benefit plans in New Jersey to encrypt personal information that they store electronically....more

States Respond to Recent Breaches with Encryption Legislation

In the wake of recent breaches of personally identifiable information (PII) suffered by health insurance companies located in their states, the New Jersey Legislature passed, and the Connecticut General Assembly will consider...more

HIPAA Compliant Technology and the Importance of Encryption

We welcome this guest blog by Gene Fry, Compliance Officer, Scrypt, Inc. The Health Insurance Portability and Accountability Act (HIPAA) sets the standard for protecting sensitive patient data. This means that any...more

Health Care E-Note - February 2015

In This Issue: - HIPAA Privacy During Emergency Situations - Probationary Medicaid RCOs – How Do Physicians Respond Without Subjecting Themselves to Potential Criminal And Civil Liability? - Big Data...more

508 Results
|
View per page
Page: of 21

All the intelligence you need, in one easy email:

Great! Your first step to building an email digest of JD Supra authors and topics. Log in with LinkedIn so we can start sending your digest...

Sign up for your custom alerts now, using LinkedIn ›

* With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name.
×