HIPAA compliance is a journey, not a destination — and that journey needs to be funded. Unfortunately, HIPAA and cyber security budgets are often seriously underfunded by health care organizations – or not funded at all. At risk: the security of your patients' sensitive and protected health information. Not to mention your peace of mind. In this webinar recording we share valuable tips for how to build an appropriate HIPAA and cyber security budget for your health care organization. Recorded October 22, 2019.
In this webinar recording, we discuss the HIPAA Security Rule requirement to regularly review records of in...
Other content in this Stream
This webinar shares ten tips to help medical practices re-open during COVID-19 public health crisis.
Our cyber insurance expert provides a comprehensive overview of our primary cyber insurance benefits.
This webinar will help guide you during these uncertain times.
To access the docume
This webinar recording is for all physicians and managers of medical practices who struggle with HIPAA compliance. We discuss the importance of an annual HIPAA compliance checkup, and cover all thre
In this webinar recording, we discuss the HIPAA Security Rule requirement to regularly review records of information system activity. During this interactive, fast-paced session, our experts: - explo
Patient requests for medical records are complicated, from both an administrative and legal perspective. Watch this webinar recording to learn the legal requirements for your organization's policy and
Learn what could happen if the OCR investigates your practice, for either a breach or a complaint. TMLT hosts Kassie Toerner and Cathy Bryant are joined by a Texas physician who survived an OCR invest
It is imperative to have a system in place that allows the release of complete, legible, and organized records from your medical office.
The actions taken in the hours and days after a cyber breach are critical, especially in protecting evidence. In this webinar, attorney Adrian Senyszyn, discusses the most important steps that covered
Providers can take steps following an attack to help preserve evidence, which may help them meet their burden of proof and conclude that there was a low probability of compromise to ePHI.
Simply complying with the HIPAA Security Rule is not enough to ensure your practice is equipped with strong cyber security. Robert Felps and Ed Jones of Third Rock, a top cyber risk management firm, s
TMLT risk management experts Cathy Bryant and Kassie Toerner discuss the role HIPAA rules and regulations play for medical practices when dealing with online threats, risks, and vulnerabilities.
In this webinar recording, TMLT risk management experts Cathy Bryant and Kassie Toerner discuss various risk assessments and current standards expected by the Health and Human Services Office for Civi