In this webinar recording, TMLT risk management experts Cathy Bryant and Kassie Toerner discuss the role HIPAA rules and regulations play for medical practices when dealing with online threats, risks, and vulnerabilities.
48 hours after a HIPAA breach
The actions taken in the hours and days after a cyber breach are critical, especially in protecting evidenc...
Most Recent Videos
Case closed: Improper prescribing
In this edition of Case Closed, a video series that explores real TMLT medical malpractice cases, errors made by both a physician and pharmacy led to a patient receiving an improper prescription.
Terminating the Patient-Physician Relationship, Part 1
In part 1 of this 2-part series, Lesley Viner, VP of Risk Management at TMLT, describes guidelines and processes to help physicians dismiss patients appropriately and avoid allegations of abandonment.
Terminating the Patient-Physician Relationship, Part 2
In part 2 of this series, Tanya Babitch, a manager in TMLT's Risk Management Department, provides further instruction for appropriately dismissing patients to avoid allegations of abandonment.
48 hours after a HIPAA breach
The actions taken in the hours and days after a cyber breach are critical, especially in protecting evidence. In this webinar, attorney Adrian Senyszyn, discusses the most important steps that covered
One thing physician practices must do now
In this webinar recording, TMLT risk management experts Cathy Bryant and Kassie Toerner discuss various risk assessments and current standards expected by the Health and Human Services Office for Civi
Interacting with patients: Patient privacy
Russell Krienke, MD, of Austin Regional Clinic and a TMLT board member, offers some quick guidelines on protecting patient privacy on the job and in public.
2018 Annual Report - Putting physician needs first
CEO Robert Donohoe describes how TMLT continues to follow the original doctrines created by its founders to put physicians needs and interest first.
Happy 40th anniversary from TMLT's Defense Counsel
Members of TMLT's Defense Counsel offer their memories, thoughts, and congratulations to TMLT.
What it takes to be a TMLT defense attorney
Attorney William Abernethy of Donnell, Abernethy & Kieschnick, PC offers advice to new defense attorneys working with TMLT.
Dr. Ken Rohweder on TMLT's 40th anniversary
Dr. Rohweder shares his thoughts on working with TMLT on the event of its 40th Anniversary.
Congratulations from TMLT's governing board on 40th anniversary
Members of TMLT's governing board reflect on 40 years of TMLT.
Employees describe TMLT in one word.
Maryann Baca, Mary Gonzales, and Laura Hunter reflect on their 20-year friendship at TMLT.
What is covered under "cyber extortion" within a cyber liability policy?
John Southrey, director of consulting services at TMLT, describes cyber extortion threats, like ransomware, and what to do if you receive this kind of threat.
How can I prevent a cyber breach?
Cathy Bryant, manager of product development & consulting services at TMLT, provides five steps to help health care entities prevent a cyber breach.
What are some of the direct and indirect costs of a data breach?
John Southrey, director of consulting services at TMLT, describes the costs - both direct and indirect - of a cyber data breach.
Can physicians use their own mobile devices at work?
Cathy Bryant, manager of product development & consulting services at TMLT, discusses the pros and cons of "BYOD," or "Bring Your Own Device."
TMLT 2018 summer CME seminars
Join us for TMLT's Summer CME seminars in Katy on August 4 or McAllen on August 18.
TMLT's 2017 video annual report
Get a glimpse inside TMLT and hear from employees in our 2017 annual report video.
What every physician needs to know: Wernicke's Encephalopathy after bariatric surgery