Terminating the Patient-Physician Relationship, Part 2
In part 2 of this series, Tanya Babitch, a manager in TMLT's Risk Management Department, provides further instruction for appropriately dismissing patients to avoid allegations of abandonment.
Terminating the Patient-Physician Relationship, Part 1
In part 1 of this 2-part series, Lesley Viner, VP of Risk Management at TMLT, describes guidelines and processes to help physicians dismiss patients appropriately and avoid allegations of abandonment.
In this edition of Case Closed, a video series that explores real TMLT medical malpractice cases, errors made by both a physician and pharmacy led to a patient receiving an improper prescription.
In this webinar recording, we discuss the HIPAA Security Rule requirement to regularly review records of information system activity.
During this interactive, fast-paced session, our experts:
- explo
HIPAA compliance is a journey, not a destination — and that journey needs to be funded. Unfortunately, HIPAA and cyber security budgets are often seriously underfunded by health care organizations – o
An individual's right to access their medical records
Patient requests for medical records are complicated, from both an administrative and legal perspective. Watch this webinar recording to learn the legal requirements for your organization's policy and
The actions taken in the hours and days after a cyber breach are critical, especially in protecting evidence. In this webinar, attorney Adrian Senyszyn, discusses the most important steps that covered
TMLT risk management experts Cathy Bryant and Kassie Toerner discuss the role HIPAA rules and regulations play for medical practices when dealing with online threats, risks, and vulnerabilities.
In this webinar recording, TMLT risk management experts Cathy Bryant and Kassie Toerner discuss various risk assessments and current standards expected by the Health and Human Services Office for Civi
Russell Krienke, MD, of Austin Regional Clinic and a TMLT board member, offers some quick guidelines on protecting patient privacy on the job and in public.
What is covered under "cyber extortion" within a cyber liability policy?
John Southrey, director of consulting services at TMLT, describes cyber extortion threats, like ransomware, and what to do if you receive this kind of threat.