With the COVID-19 pandemic demands for Personal Health Information (PHI) from law enforcement, the press, politicians and the public are increasing. While there may be good reasons behind many of these demands, healthcare...more
5/7/2020
/ Business Entities ,
Coronavirus/COVID-19 ,
Covered Entities ,
Data Privacy ,
Data-Sharing ,
Department of Health and Human Services (HHS) ,
Disclosure Requirements ,
Electronic Protected Health Information (ePHI) ,
Health and Safety ,
Health Care Providers ,
Health Insurance Portability and Accountability Act (HIPAA) ,
OIG ,
PHI ,
Privacy Policy
Remember Brexit? It dominated the news before the pandemic. And while it may not be on the front page any longer, the clock is still ticking down to the end of the transition period on December 31, 2020.
As Andre Bywater of...more
When responding to COVID-19, it’s important to both scrub your hands and also scrub your data practices.
As Jonathan Armstrong, partner at Cordery Compliance explains in this podcast, organizations – and not just those based...more
Supply chains are emerging as an increasingly complex risk area for compliance. The risk includes trade compliance, vendor management issues associated with cyber/privacy, product compliance, REACH, ROHS and California...more
2/6/2020
/ Compliance ,
Corporate Social Responsibility ,
Cybersecurity ,
Data Privacy ,
Exports ,
Imports ,
Popular ,
Risk Management ,
Supply Chain ,
Trade Policy ,
Transparency ,
Vendors
Heidi Rudolph, Managing Director at Morae Global, has spent a great deal of time considering technology’s role, risks and rewards for compliance teams. She contributed an article...more
Mark Lanterman, Chief Technology Officer of Computer Forensic Services lives technology at its most terrifying, helping organizations manage the risks of the IT we all use constantly.
Recently he authored an article...more
1/7/2020
/ Business Strategies ,
Chief Compliance Officers ,
Compliance ,
Crisis Management ,
Cyber Attacks ,
Cyber Incident Reporting ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Incident Response Plans ,
Information Technology ,
Passwords ,
Policies and Procedures ,
Public Relations ,
Risk Management ,
Risk Mitigation