Podcast - Data Privacy and Tracking Technology Compliance
Medical Device Legal News with Sam Bernstein: Episode 10
AI Risks in Healthcare
Business Associates Here, There, and Everywhere: When Does Your Service Provider Really Need to Sign a HIPAA Business Associate Agreement?
Healthcare Privacy Walkthroughs
HIPAA Tips With Williams Mullen - Health Care Providers - Are You Ready for a Ransomware Attack?
Hybrid Workforces and Compliance with Sheila Limmroth
Privacy and Healthcare Business Associates with Isabella Porter
Podcast: Interoperability: The Provider Perspective - Diagnosing Health Care
HIPAA Tips With Williams Mullen - COVID Health Information and HIPAA – Do You Know the Rules?
Podcast–Interoperability: How Far We’ve Come and Where We’re Going - Diagnosing Health Care
State Law Privacy Video Series | Healthcare Entities and Health Data
Getting Personal—Wearable Devices, Data, and Compliance
AGG Talks: Technology - In the Balance: Interoperability and Security
Podcast: How Can Companies in the Health Care and Life Sciences Industries Strengthen Their Cybersecurity Posture? - Diagnosing Health Care
Nick Culbertson on Compliance Breaches in Healthcare
Privacy Series: HIPAA Breaches - When It Is, and When It Is Not a Breach
Podcast: Are Vaccine Passports the Key to Reopening? - Diagnosing Health Care
HIPPA: Privacy & Security and Potential Rule Changes
Compliance Perspectives: Privacy Investigations in a Virtual World
WHERE VALUE-BASED CARE MEETS THE BUSINESS OF HEALTHCARE - Join hundreds of c-suite leaders, investors, operators and counsel in the healthcare capital of the United States for a deep dive into the key business and policy...more
After more than a year since the U.S. Department of Health and Human Services' (HHS) Office for Civil Rights (OCR) and Substance Abuse and Mental Health Services Administration (SAMHSA) issued the proposed changes to the...more
We are frequently approached by health care providers who have received a subpoena demanding patient records for a lawsuit to which the health care provider is not a party. Often times these subpoenas arrive without warning...more
The May 2018 cyber security newsletter from the U.S. Department of Health and Human Services Office for Civil Rights (OCR) focused on a topic often overlooked by covered entities and their business associates: physical...more
New York is emerging as the nation’s de facto top data security regulator. Earlier this year, the state’s powerful Department of Financial Services implemented its tough cybersecurity regulation covering banks and...more
In Boston, we celebrated Data Privacy Day (January 28) by presenting “U.S. Privacy and Data Protection: 2013 Year In Review and a Prediction of What’s to Come in 2014” for participants in an IAPP KnowledgeNet. Our panel of...more
On December 27, 2013, CMS published a final rule in the Federal Register revising the previously enacted exception to the Stark law that permits certain arrangements involving the donation of electronic health records (EHR)...more
The Office of Inspector General (OIG) has amended the Safe Harbor Regulation regarding electronic health record (EHR) items and services. The primary purpose of the amendment is to extend the Safe Harbor, which was scheduled...more
In 2006, the Centers for Medicare & Medicaid Services ("CMS") and the Office of Inspector General of the Department of Health and Human Services (the "OIG") published final rules providing for an exception to the Stark Law...more
The Texas Health Services Authority (THSA) recently announced its selection of the Health Information Trust Alliance (HITRUST) Common Security Framework (CSF), the most widely adopted information privacy and security...more
I’ve hesitated to write this post because the law is always changing and you can’t cover it all in one blog post (thank goodness for linking). I did a presentation to the Houston Interactive Marketing Association this week...more
On November 26, 2012, the Department of Health and Human Services Office for Civil Rights (OCR) released long-overdue guidance on how covered entities subject to the Health Insurance Portability and Accountability Act (HIPAA)...more
HIPAA places tight restrictions on the use and disclosure of protected health information, but there are many ways to “de-identify” it, freeing it from HIPAA’s constraints. Covered entities and business associates can use...more