In this webinar recording, we discuss the HIPAA Security Rule requirement to regularly review records of information system activity. During this interactive, fast-paced session, our experts: explore what you should consider for your audits; discuss the importance of written policies and procedures; and review what is needed when the Office for Civil Rights (OCR) requests an information systems audit. With cyber criminals attempting to gain access to your network, information system activity review is critically important in today’s cyber threat environment. Recorded November 26, 2019.
Case closed: Improper prescribing
In this edition of Case Closed, a video series that explores real TMLT medical malpractice cases, errors ma...
Most Recent Videos
Terminating the patient-physician relationship, Part 2
In part 2 of this series, Tanya Babitch, a manager in TMLT's Risk Management Department, provides further instruction for appropriately dismissing patients to avoid allegations of abandonment.
Terminating the patient-physician relationship, Part 1
In part 1 of this 2-part series, Lesley Viner, VP of Risk Management at TMLT, describes guidelines and processes to help physicians dismiss patients appropriately and avoid allegations of abandonment.
Case closed: Improper prescribing
In this edition of Case Closed, a video series that explores real TMLT medical malpractice cases, errors made by both a physician and pharmacy led to a patient receiving an improper prescription.
Budgeting for HIPAA and cyber security
HIPAA compliance is a journey, not a destination — and that journey needs to be funded. Unfortunately, HIPAA and cyber security budgets are often seriously underfunded by health care organizations – o
An individual's right to access their medical records
Patient requests for medical records are complicated, from both an administrative and legal perspective. Watch this webinar recording to learn the legal requirements for your organization's policy and
Surviving an OCR investigation
Learn what could happen if the OCR investigates your practice, for either a breach or a complaint. TMLT hosts Kassie Toerner and Cathy Bryant are joined by a Texas physician who survived an OCR invest
48 hours after a HIPAA breach
The actions taken in the hours and days after a cyber breach are critical, especially in protecting evidence. In this webinar, attorney Adrian Senyszyn, discusses the most important steps that covered
Is HIPAA relevant in 2019?
TMLT risk management experts Cathy Bryant and Kassie Toerner discuss the role HIPAA rules and regulations play for medical practices when dealing with online threats, risks, and vulnerabilities.
Cyber security basics: Hardening your network
Simply complying with the HIPAA Security Rule is not enough to ensure your practice is equipped with strong cyber security. Robert Felps and Ed Jones of Third Rock, a top cyber risk management firm, s
One thing physician practices must do now
In this webinar recording, TMLT risk management experts Cathy Bryant and Kassie Toerner discuss various risk assessments and current standards expected by the Health and Human Services Office for Civi
Interacting with patients: Patient privacy
Russell Krienke, MD, of Austin Regional Clinic and a TMLT board member, offers some quick guidelines on protecting patient privacy on the job and in public.
2018 Annual Report - Putting physician needs first
CEO Robert Donohoe describes how TMLT continues to follow the original doctrines created by its founders to put physicians needs and interest first.
Happy 40th anniversary from TMLT's defense counsel
Members of TMLT's Defense Counsel offer their memories, thoughts, and congratulations to TMLT.
What it takes to be a TMLT defense attorney
Attorney William Abernethy of Donnell, Abernethy & Kieschnick, PC offers advice to new defense attorneys working with TMLT.
Dr. Ken Rohweder on TMLT's 40th anniversary
Dr. Rohweder shares his thoughts on working with TMLT on the event of its 40th Anniversary.
Congratulations from TMLT's governing board on 40th anniversary
Members of TMLT's governing board reflect on 40 years of TMLT.
Employees describe TMLT in one word.
Maryann Baca, Mary Gonzales, and Laura Hunter reflect on their 20-year friendship at TMLT.
What is covered under "cyber extortion" within a cyber liability policy?
John Southrey, director of consulting services at TMLT, describes cyber extortion threats, like ransomware, and what to do if you receive this kind of threat.
How can I prevent a cyber breach?