TMLT's Cathy Bryant and Kassie Toerner discuss how to identify threats and vulnerabilities to medical practices and how to protect your networks.
Other content in this Stream

It is imperative to have a system in place that allows the release of complete, legible, and organized records from your medical office.

The Fifth Circuit Court disagreed with the OCR’s interpretation of the encryption and disclosure provisions.

A summary from the webinar “Release of medical records: Review of hot topics” presented on May 26, 2020.

Learn about access to health care records, the release of PHI to third parties, and how much a medical practice can charge for these services.

How to text patients and colleagues without violating the Health Insurance Portability and Accountability Act.

A brief description of federal and Texas rules for charging for copies of medical records.

Watch this webinar recording to learn about the legal requirements for releasing medical records to patients.

Documentation pitfalls specifically related to electronic medical records (EMRs) and how to avoid them.

A discussion of releasing the medical records of children and young adults, especially those in college.

If you experienced an IT system failure or other damage from the winter storms, read about recovering damaged medical records.

Improper disposal of electronic devices and media puts the information stored on those devices at risk for a breach. And when devices contain protected health information (PHI), it puts your patient’s

The actions taken in the hours and days after a cyber breach are critical, especially in protecting evidence. Learn the most important steps to take following a cyber incident or breach.

What happens when a system failure brings down the EMR?

Cathy Bryant, manager of product development & consulting services at TMLT, provides five steps to help health care entities prevent a cyber breach.

The amount you can charge for supplying copies of medical records has changed, according to new guidance from the OCR.

View part three of a three-part video series on improving physician/patient interactions.
Medical records are confidential and personal documents, and the rules that govern them are often complex and confusing.

Case studies of actual ransomware attacks on health care organizations.
Protecting sensitive data involves a variety of physical safeguards.