Learn what could happen if the OCR investigates your practice, for either a breach or a complaint. TMLT hosts Kassie Toerner and Cathy Bryant are joined by a Texas physician who survived an OCR investigation conducted after a reportable HIPAA breach occurred in one of his practice’s offices. This frank discussion includes how the privacy incident was discovered; the reporting process; the investigation, mitigation of issues identified, and how the investigation was resolved. Recorded December 17, 2019.
Law enforcement exceptions to HIPAA
If you suspect one of your patients may harm himself or others, can you report your suspicions to the polic...
Thank you for subscribing to CYBER @TMLT
Error - something went wrong!
Other content in this Stream
OCR to waive potential HIPAA penalties during COVID-19 emergency
HHS OCR announced it will waive potential HIPAA penalties against health care providers using telehealth services to care for patients during the COVID-19 national emergency.
Coronavirus: Answers to your risk management questions
On-demand webinar discussing: HIPAA and patient privacy; sharing PHI with public health authorities; and preparing for coronavirus in your practice.
HIPAA and the coronavirus
HIPAA and public health emergencies: updates from the OCR
Practice fined for response to social media review
Dallas dental practice fined $10,000 after publishing PHI in response to a patient review on Yelp
Texting patients while staying HIPAA compliant
How to text patients and colleagues without violating the Health Insurance Portability and Accountability Act.
Law enforcement exceptions to HIPAA
If you suspect one of your patients may harm himself or others, can you report your suspicions to the police without violating patient privacy?
Auditing information systems activity
In this webinar recording, we discuss the HIPAA Security Rule requirement to regularly review records of information system activity. During this interactive, fast-paced session, our experts: - explo
Budgeting for HIPAA and cyber security
HIPAA compliance is a journey, not a destination — and that journey needs to be funded. Unfortunately, HIPAA and cyber security budgets are often seriously underfunded by health care organizations – o
Deadline and new requirements added to Texas breach notification law
New law defines a deadline by which Texas businesses must report data breaches.
Study shows increased cyber security can affect patient outcomes
Corrective actions taken to enhance privacy and security may introduce usability issues.
48 hours after a HIPAA breach
The actions taken in the hours and days after a cyber breach are critical, especially in protecting evidence. In this webinar, attorney Adrian Senyszyn, discusses the most important steps that covered
Is HIPAA relevant in 2019?
TMLT risk management experts Cathy Bryant and Kassie Toerner discuss the role HIPAA rules and regulations play for medical practices when dealing with online threats, risks, and vulnerabilities.
Podcast: Tips, trends, and understanding your cyber insurance
Learn about the current cyber security landscape, what your cyber insurance policy should cover, and more.
HHS releases voluntary cyber security practices
HHS released voluntary cyber security practices to the health care industry with the aim of providing practice guidelines to reduce cyber security risks.
Guidelines for the release of medical records
It is imperative to have a system in place that allows the release of complete, legible, and organized records from your medical office.
Anthem pays $16 million HIPAA penalty
Anthem will pay $16 million after cyber attacks exposed the ePHI of 79 million people
How to dispose of storage devices containing PHI and other sensitive data
Improper disposal of electronic devices and media puts the information stored on those devices at risk for a breach. And when devices contain protected health information (PHI), it puts your patient’s
What we can learn from MD Anderson's $4.3 million HIPAA penalty
MD Anderson Cancer Center was recently fined for HIPAA violations. Let's go behind the headlines and take a look at the case.
How to encrypt your Smartphone
Your mobile phone comes equipped with tools for encryption that take a few minutes to an hour to initiate and add an important layer of security to your device.
TMLT offers new risk assessment options