POPULARITY
Welcome to a strange new world.Recent tariffs announced by the Trump Administration are likely to impact drug manufacturing, since many drug components are produced outside the U.S., in nations such as in India, giving rise to state laws. Many states limit overseas involvement relative to the Health Insurance Portability and Accountability Act (HIPAA). Florida, for example, prohibits the offshoring of certain patient data, requiring such storage to be within the U.S.Responding to this emerging crisis, the producers of RACmonitor and Monitor Mondays have invited Lexi Morrison, director of operations at MedPharma, to be the program's special guest during the next live edition of the venerable Internet broadcast, coming up at 10 a.m. EST on Monday, May 19.The long-running broadcast will also include these instantly recognizable features:• Monday Rounds: Ronald Hirsch, MD, vice president of R1 RCM, will be making his Monday Rounds.• The RAC Report: Healthcare attorney Knicole Emanuel, partner at the law firm of Nelson Mullins, will report the latest news about auditors.• Risky Business: Healthcare attorney David Glaser, shareholder in the law offices of Fredrikson & Byron, will join the broadcast with his trademark segment.• Legislative Update: Adam Brenman, senior government affairs analyst for Zelis, will report on the news happening at the intersection of healthcare and congressional action.
Omenka Nwachukwu, Principal Consultant, Privacy and Compliance, Clearwater, speaks with Kaitlyn O'Connor, Co-Founder and Partner, Elevare Law, about the growth in state privacy laws covering wide ranges of health data and how digital health companies are being impacted. They discuss the role state legislation is playing in addressing gaps left by federal health care privacy laws, how state privacy laws are going beyond the Health Insurance Portability and Accountability Act (HIPAA) in certain areas, and trends in state regulatory activity. They also discuss how digital health companies can ensure compliance across multiple jurisdictions while maintaining innovation, adapt to a broader definition of health data under state laws, and navigate operational and technical challenges in implementing state-specific privacy requirements. Sponsored by Clearwater. AHLA's Health Law Daily Podcast Is Here! AHLA's popular Health Law Daily email newsletter is now a daily podcast, exclusively for AHLA Premium members. Get all your health law news from the major media outlets on this new podcast! To subscribe and add this private podcast feed to your podcast app, go to americanhealthlaw.org/dailypodcast.
Today our guest is an old friend, a musician and an expert in cash healthcare and compliance, Jim Eischen, Esq. James Eischen, Esq (Jim Eischen) is a licensed California attorney with over 32 years of experience handling complex corporate, business planning, health care and real estate matters. He received his J.D. from the University of California at Davis in 1987, and his B.A. from Creighton University in 1984. Web Site: https://www.eischenlawoffice.com/about Email: jim@eischenlawoffice.com Mr. Eischen is a national expert in creating compliant private fee practice models and structuring business transactional relationships with innovative healthcare and wellness models throughout the United States. His work has included compliance solutions for forming private fee practice models (concierge, direct primary care/DPC, integrative/Functional Medicine, connected care platforms) for self-employed healthcare professionals and larger provider networks and systems. He is also recognized nationally for compliance experience regarding complex healthcare corporate business planning and transactions. As a speaker at conferences throughout the US, he addresses private fee practice model formation, business/healthcare integration compliance, telehealth, data privacy, regulatory business planning problem-solving and start-up innovation monetization. In addition to handling traditional healthcare-related corporate transactions, he also works with companies that deliver wellness products and programs to ensure regulatory compliance. Mr. Eischen's broad complex business planning experience also includes life science company/start-up enterprise regulatory support, integration of healthcare professional expertise into business wellness models, and structuring corporate practice of medicine business modeling. He advises physicians, health plans, and business enterprises in matters connected to reimbursement, contracts, interdisciplinary health professional employment and labor issues, and Health Insurance Portability and Accountability Act (HIPAA) compliance. Web Site: https://www.eischenlawoffice.com/about Email: jim@eischenlawoffice.com © 2007-2025 Concierge Medicine Today, LLC. All rights reserved. CONCIERGE MEDICINE TODAY IS THE INDUSTRY'S TRADE PUBLICATION, EST. 2007. DISCLAIMER: THIS SITE DOES NOT CONSTITUTE MEDICAL, FINANCIAL, LEGAL OR OTHER PROFESSIONAL ADVICE. © 2025 CONCIERGE MEDICINE TODAY, LLC. ALL RIGHTS RESERVED. THIS CONTENT/SITE IS NOT WITHOUT ERROR OR OMISSIONS.
Free up your work week by using a digital appointment scheduler. Spend more time with clients and less time managing your calendar. Read the text version Contact the Agent Survival Guide Podcast! Email us ASGPodcast@Ritterim.com or call 1-717-562-7211 and leave a voicemail. Resources: 3 Insurance Business Tools You Absolutely Can't Live Without: https://ritterim.com/the-ultimate-agent-resource-list/ Best Practices for Video Calls: https://lnk.to/8jc7x9 Digital Marketing for Insurance Agents: Our Top Tips to Boost Business: https://ritterim.com/blog/digital-marketing-for-insurance-agents-our-top-tips-to-boost-business/ Free eBooks & Guides: https://ritterim.com/guides/ Get Your PlanEnroll Site: https://ritterim.com/planenroll/ How to Stay Compliant During All Medicare Sales: https://lnk.to/41gE4C Meet Your Sales Specialist: https://ritterim.com/meet-your-sales-team/ MedicareCENTER: https://ritterim.com/integrity-tools/#medicarecenter Register with Ritter Insurance Marketing: https://app.ritterim.com/public/registration/ What Are Agents Responsible for Under HIPAA: https://ritterim.com/blog/what-are-agents-responsible-for-under-hipaa/ Where It All Begins: Obtaining Permission to Contact for Medicare Sales: https://ritterim.com/blog/where-it-all-begins-obtaining-permission-to-contact-for-medicare-sales/ The Ultimate Agent Resource List Pt 3: Staying Organized: https://ritterim.com/blog/the-ultimate-agent-resource-list-pt-3-staying-organized/ Appointment Schedulers: Acuity: https://acuityscheduling.com/ Google Workspace: https://workspace.google.com/resources/appointment-scheduling/ Microsoft Bookings: https://www.microsoft.com/en-us/microsoft-365/business/scheduling-and-booking-app OnceHub: https://oncehub.com/ SimployBook.me: https://simplybook.me/en/ References: Lurie, Matt. “20 Integrable Scheduling Tools for Small Business Systems.” Ruby, 11 Nov. 2024, https://www.ruby.com/blog/20-of-the-best-small-business-appointment-scheduling-tools-and-apps/. “Acuity Scheduling: Online Appointment Scheduling Software.” Acuity, https://acuityscheduling.com/. Accessed 3 Mar. 2025. “Acuity Scheduling and HIPAA.” Acuity : Scheduling, https://help.acuityscheduling.com/hc/en-us/articles/16689567523597-Acuity-Scheduling-and-HIPAA. Accessed 3 Mar. 2025. “Agencybloc's AMS+ Solution for Health, Group Benefits, & Senior Insurance.” AgencyBloc Insurance Agency CRM, https://www.agencybloc.com/ams/. Accessed 3 Mar. 2025. “Appointment Scheduler.” Radius Help Center, https://help.radiusbob.com/en/articles/5448715-appointment-scheduler. Accessed 3 Mar. 2025. “Compare All Microsoft 365 Plans.” Microsoft, https://www.microsoft.com/en-us/microsoft-365/business/compare-all-microsoft-365-business-productss. Accessed 3 Mar. 2025. “Free Appointment Booking System.” SimplyBook.Me - Free Appointment Booking System, https://simplybook.me/en/. Accessed 3 Mar. 2025. “Google Workspace.” Google Workspace: Secure Online Productivity & Collaboration Tools, Google, https://workspace.google.com/. Accessed 3 Mar. 2025. “Health Insurance Portability and Accountability Act (HIPAA) & Health Information Technology for Economic and Clinical Health (HITECH) Act - Microsoft Compliance.” Microsoft Compliance | Microsoft Learn, https://learn.microsoft.com/en-us/compliance/regulatory/offering-hipaa-hitech. Accessed 3 Mar. 2025. “HIPAA Compliance with Google Workspace and Cloud Identity.” Google Workspace Admin Help, Google, https://support.google.com/a/answer/3407054. Accessed 3 Mar. 2025. “HIPAA for Professionals.” HHS.Gov, 19 July 2024, https://www.hhs.gov/hipaa/for-professionals/index.html. “Microsoft 365 - Subscription for Productivity Apps: Microsoft 365.” Microsoft 365 - Subscription for Productivity Apps | Microsoft 365, https://www.microsoft.com/en-us/microsoft-365. Accessed 3 Mar. 2025. “Online Appointment Booking Software - Unmatched Free Plan.” OnceHub, https://oncehub.com/. Accessed 3 Mar. 2025. “Online Appointment Scheduling with Google Calendar.” Google Workspace, Google, https://workspace.google.com/resources/appointment-scheduling/. Accessed 3 Mar. 2025. “Online Bookings and Appointment Scheduling: Microsoft 365.” Online Bookings and Appointment Scheduling | Microsoft 365, Microsoft, https://www.microsoft.com/en-us/microsoft-365/business/scheduling-and-booking-app. Accessed 3 Mar. 2025. “Productivity Apps for Business Owners & Entrepreneurs | Google Workspace Individual.” Google Workspace, Google, https://workspace.google.com/individual/. Accessed 3 Mar. 2025. Alder, Steven. “The Use of Technology and HIPAA Compliance.” The HIPAA Journal, https://www.hipaajournal.com/the-use-of-technology-and-hipaa-compliance/. Accessed 3 Mar. 2025. “What Is a HIPAA Business Associate Agreement (BAA)?: TechTarget.” Healthtech Security, TechTarget, 14 Feb. 2022, https://www.techtarget.com/healthtechsecurity/feature/What-Is-a-HIPAA-Business-Associate-Agreement-BAA. “What Is Our Online Scheduler Solution?” Producer Max The Agent-Centric Platform, https://www.producermax.com/Online-Scheduler.html. Accessed 3 Mar. 2025. Follow Us on Social! Ritter on Facebook, https://www.facebook.com/RitterIM Instagram, https://www.instagram.com/ritter.insurance.marketing/ LinkedIn, https://www.linkedin.com/company/ritter-insurance-marketing TikTok, https://www.tiktok.com/@ritterim X, https://x.com/RitterIM and Youtube, https://www.youtube.com/user/RitterInsurance Sarah on LinkedIn, https://www.linkedin.com/in/sjrueppel/ Instagram, https://www.instagram.com/thesarahjrueppel/ and Threads, https://www.threads.net/@thesarahjrueppel Tina on LinkedIn, https://www.linkedin.com/in/tina-lamoreux-6384b7199/ Not affiliated with or endorsed by Medicare or any government agency.
Joining The Feds this week is Twila Brase, RN, president of Citizens' Council for Health Freedom and author of the book Big Brother in the Exam Room: The Dangerous Truth about Electronic Health Records. We discuss the Health Insurance Portability and Accountability Act (HIPAA) and how it not only does not provide privacy for medical history, but allows your information to be more readily shared. We discuss what citizens can do to turn the tide and reverse this deceptive act, the role AI already plays in the medical system, and what kinds of doctors freedom-minded Americans should be seeking out. Twila warns our audience of the harms of the REAL ID and the greater power the federal government would hold if a significant number of Americans comply. She gives the history of the National ID discussion, and debunks the claim that citizens will no longer be able to fly after May 7, 2025 without the REAL ID. Twila gives helpful insight into what we can do to turn this tide, and continue to demand our freedoms be respected and upheld. Visit the Citizens' Council for Health Freedom website: https://www.cchfreedom.org/View “Helpful Handouts”: https://www.cchfreedom.org/helpful-handouts/ X: @noSocializedMed @twilabraseInstagram: cchealthfreedom Please join us for our conference, Medical Freedom and the Constitution: Your Life in the Balance on Saturday, April 5 at Liberty University in Lynchburg, VA. Register: https://vamfa.org/medical-freedom-and-the-constitution-your-life-in-the-balance/ Check out Feds For Freedom's SubstackWatch and listen to The Feds on any of these platforms: https://taplink.cc/fedsforfreedomSupport the Work and Become a Member of Feds For Freedom www.fedsforfreedom.org/joinFollow Us on Social Media Instagram/X (Twitter)/Facebook: @feds4freedomusa
The Department of Health and Human Services Office for Civil Rights (OCR) has made risk analysis a top priority in its enforcement of Health Insurance Portability and Accountability Act (HIPAA) compliance. Dawn Morgenstern, Senior Director of Consulting Services and Chief Privacy Officer, Clearwater, speaks with Betsy Hodge, Partner, Akerman LLP, about OCR's risk analysis enforcement initiative. They discuss what's driving the initiative, key enforcement actions, and steps health care organizations can take to ensure they meet regulatory requirements regarding risk analysis. From AHLA's Health Information and Technology Practice Group. Sponsored by Clearwater.AHLA's Health Law Daily Podcast Is Here! AHLA's popular Health Law Daily email newsletter is now a daily podcast, exclusively for AHLA Premium members. Get all your health law news from the major media outlets on this new podcast! To subscribe and add this private podcast feed to your podcast app, go to americanhealthlaw.org/dailypodcast.
Discusses data privacy considerations in the context of digital technologies. Our guest today is Emilee Rader, an associate professor at the Information School at the University of Wisconsin-Madison. Emilee's research focuses on the human-centered aspects of data privacy. She studies how people reason and make choices about data collection and inferences enabled by digital technologies to better understand why people struggle to manage their privacy and to discover new ways to help people gain more appropriate control over information about them. Additional resources: Consumer Reports: https://www.consumerreports.org/issue/data-privacyElectronic Frontier Foundation: https://www.eff.org/Family Educational Rights and Privacy Act (FERPA): https://about.citiprogram.org/course/family-educational-rights-and-privacy-act-ferpa/ Health Insurance Portability and Accountability Act (HIPAA): https://about.citiprogram.org/series/health-insurance-portability-and-accountability-act-hipaa/ Human Subjects Research (HSR): https://about.citiprogram.org/series/human-subjects-research-hsr/
In an era of escalating digital threats, cybersecurity compliance goes beyond ticking a legal box - it's a crucial shield safeguarding assets, reputation, and the very survival of your business. What is the most common pain point facing businesses these days? Is it supply chain fragility? Fierce competition? Tight cashflows? Or is it the rising and relentless tide of cyberattacks? Evidence and analysts suggest it's often the latter. As cyberthreats show no signs of slowing down, both small and large organizations increasingly recognize that cybersecurity is no longer optional. What's more, governments and regulatory agencies have also caught onto its importance, especially when it concerns organizations that operate in sectors that are critical to a nation's national infrastructure. The result? An expanding set of compliance requirements that feel daunting but are essential for a country's smooth operations and public security. Forms of compliance For starters, we need to distinguish between two types of compliance - compulsory and voluntary, as each brings its own set of requirements. Compulsory compliance encompasses regulations enforced by state-level or state-adjacent agencies and targeting companies operating in critical infrastructure sectors, such as healthcare, transport, and energy. For example, a company working with patient data in the US must abide by the Health Insurance Portability and Accountability Act (HIPAA), a federal regulation, to maintain patient data privacy across state lines. On the other hand, voluntary compliance means that businesses apply for specific certifications and standards that identify them as experts within a particular field or qualify some of their products as fulfilling a standard. For example, a company seeking environmental credibility might apply for ISO 14001 certification that demonstrates its commitment to environment-friendly practices. However, every company needs to recognize that compliance isn't a one-time effort. Every standard, or another "bit of compliance", requires additional resources since these processes require consistent monitoring and budget allocations (even ISO certifications require regular re-certification). Cybersecurity compliance - not only for security vendors A company that doesn't conform to compulsory compliance can face hefty fines. Incidents such as data breaches or ransomware attacks can result in extensive costs, but evidence of a failure to comply with mandated security measures can ultimately cause the final bill to go "through the roof". The specific cybersecurity regulations an organization needs to abide by depend on the type of industry the company operates in, and how important the security of its internal data is to privacy, data security, or critical infrastructure acts. Do also note that many regulatory acts and certifications are region-specific. Furthermore, depending on what customers, clients, or partners a business wants to attract, it is wise to apply for a specific certificate to qualify for a contract. For example, if a company wants to work with the US federal government, it needs to apply for the FedRAMP certificate, demonstrating its competence in protecting federal data. At any rate, compliance needs to be built into the foundations of any business strategy. As regulatory requirements keep rising in the future, well-prepared companies will have an easier time adapting to the changes, With compliance being measured continuously, this can save organizations significant resources and enable their growth in the long run. Key cybersecurity acts and frameworks Let's now have a quick rundown on some of the most important cybersecurity regulatory acts and frameworks: Health Insurance Portability and Accountability Act (HIPAA) This regulatory act covers the handling of patient information in hospitals and other healthcare facilities. It represents a set of standards that are designed to protect confidential patient health data from be...
Privacy Torts Privacy torts are civil wrongs that protect an individual's right to privacy. These torts can arise from a variety of actions, such as intrusion upon seclusion, appropriation of name or likeness, public disclosure of private facts, and false light. Intrusion upon Seclusion Intrusion upon seclusion occurs when someone intentionally intrudes upon another person's solitude or seclusion. This can include physically entering someone's home without permission, spying on someone, or eavesdropping on a private conversation. Appropriation of Name or Likeness Appropriation of name or likeness occurs when someone uses another person's name, likeness, or other identifying characteristics without their consent. This can include using someone's name or image in an advertisement, on a product, or in a work of art. Public Disclosure of Private Facts Public disclosure of private facts occurs when someone discloses private information about another person to the public. This can include disclosing someone's medical history, financial information, or sexual orientation. False Light False light occurs when someone portrays another person in a false or misleading light. This can include publishing a false or misleading story about someone, or creating a composite image of someone that is not accurate. Privacy torts can have a significant impact on the victim, causing emotional distress, humiliation, and even financial harm. Victims of privacy torts may be able to recover damages for their injuries, including compensatory damages, punitive damages, and injunctive relief. In addition to the four privacy torts discussed above, there are a number of other legal doctrines that can protect an individual's privacy. These include the Fourth Amendment to the United States Constitution, which protects against unreasonable searches and seizures, and the Health Insurance Portability and Accountability Act (HIPAA), which protects the privacy of medical information. --- Support this podcast: https://podcasters.spotify.com/pod/show/law-school/support
Privacy Torts Privacy torts are civil wrongs that protect an individual's right to privacy. These torts can arise from a variety of actions, such as intrusion upon seclusion, appropriation of name or likeness, public disclosure of private facts, and false light. Intrusion upon Seclusion Intrusion upon seclusion occurs when someone intentionally intrudes upon another person's solitude or seclusion. This can include physically entering someone's home without permission, spying on someone, or eavesdropping on a private conversation. Appropriation of Name or Likeness Appropriation of name or likeness occurs when someone uses another person's name, likeness, or other identifying characteristics without their consent. This can include using someone's name or image in an advertisement, on a product, or in a work of art. Public Disclosure of Private Facts Public disclosure of private facts occurs when someone discloses private information about another person to the public. This can include disclosing someone's medical history, financial information, or sexual orientation. False Light False light occurs when someone portrays another person in a false or misleading light. This can include publishing a false or misleading story about someone, or creating a composite image of someone that is not accurate. Privacy torts can have a significant impact on the victim, causing emotional distress, humiliation, and even financial harm. Victims of privacy torts may be able to recover damages for their injuries, including compensatory damages, punitive damages, and injunctive relief. In addition to the four privacy torts discussed above, there are a number of other legal doctrines that can protect an individual's privacy. These include the Fourth Amendment to the United States Constitution, which protects against unreasonable searches and seizures, and the Health Insurance Portability and Accountability Act (HIPAA), which protects the privacy of medical information. --- Support this podcast: https://podcasters.spotify.com/pod/show/law-school/support
Privacy Torts Privacy torts are civil wrongs that protect an individual's right to privacy. These torts can arise from a variety of actions, such as intrusion upon seclusion, appropriation of name or likeness, public disclosure of private facts, and false light. Intrusion upon Seclusion Intrusion upon seclusion occurs when someone intentionally intrudes upon another person's solitude or seclusion. This can include physically entering someone's home without permission, spying on someone, or eavesdropping on a private conversation. Appropriation of Name or Likeness Appropriation of name or likeness occurs when someone uses another person's name, likeness, or other identifying characteristics without their consent. This can include using someone's name or image in an advertisement, on a product, or in a work of art. Public Disclosure of Private Facts Public disclosure of private facts occurs when someone discloses private information about another person to the public. This can include disclosing someone's medical history, financial information, or sexual orientation. False Light False light occurs when someone portrays another person in a false or misleading light. This can include publishing a false or misleading story about someone, or creating a composite image of someone that is not accurate. Privacy torts can have a significant impact on the victim, causing emotional distress, humiliation, and even financial harm. Victims of privacy torts may be able to recover damages for their injuries, including compensatory damages, punitive damages, and injunctive relief. In addition to the four privacy torts discussed above, there are a number of other legal doctrines that can protect an individual's privacy. These include the Fourth Amendment to the United States Constitution, which protects against unreasonable searches and seizures, and the Health Insurance Portability and Accountability Act (HIPAA), which protects the privacy of medical information. --- Support this podcast: https://podcasters.spotify.com/pod/show/law-school/support
This Day in Legal History: National Security Act of 1947On July 25, 1947, Congress passed the National Security Act of 1947, a landmark legislation that restructured the United States' military and intelligence operations in the post-World War II era. This pivotal act established the National Security Council (NSC), which would advise the President on security matters, and created the Central Intelligence Agency (CIA) to gather and analyze foreign intelligence. The Act also led to the formation of the Department of Defense, unifying the previously separate Department of War and Department of the Navy, and creating the National Military Establishment. This new establishment comprised three separate departments: the Army, the Navy, and the newly-formed United States Air Force. Additionally, the Joint Chiefs of Staff were established to ensure coordinated military strategy among the services. The National Security Act of 1947 fundamentally reshaped the U.S. defense and intelligence framework, reflecting the changing nature of global threats and the need for a cohesive national security strategy in the early Cold War period. This legislation laid the foundation for the modern American military and intelligence community, shaping U.S. defense policy for decades to come.Walt Disney Co. must face a lawsuit backed by Elon Musk over the firing of Gina Carano, a former star of “The Mandalorian.” A federal judge in Los Angeles, Judge Sherilyn Peace Garnett, ruled against Disney's motion to dismiss the case, stating that Disney did not prove that employing Carano was an act of First Amendment-protected expressive association. The judge noted that Disney had not shown evidence that it hires actors to promote values like respect, decency, integrity, or inclusion.The case will explore California's protections for employees' political activities outside of work. Carano, a former mixed martial artist, argues she was dismissed due to her political views, which clashed with the show's audience on social media. The incident that led to her firing was a February 2021 Instagram post comparing the treatment of Trump supporters to that of Jews during the Holocaust. Carano claims her male co-stars were not disciplined for their liberal-leaning posts, even when they also referenced the Holocaust. Strained logic, but we live in a time of strained logic.Judge Garnett found that Carano sufficiently alleged her firing could have been to deflect criticism from Disney's business practices and reorganization under former CEO Bob Chapek. Schaer Jaffe LLP represents Carano, while O'Melveny and Myers LLP represents Disney, Lucasfilm, and Huckleberry Industries. The case is Carano v. Walt Disney, C.D. Cal., No. 24-cv-1009, 7/24/24.Disney Must Fight Musk-Backed ‘Mandalorian' Actor Firing SuitThe U.S. Senate is set to vote on two online safety bills targeting the protection of children and teens on social media. Scheduled for Thursday, these bills have garnered broad bipartisan support and are expected to pass. Senate Majority Leader Chuck Schumer emphasized the importance of updating safety measures to address current online threats to children.The Kids Online Safety Act (KOSA) aims to mandate social media platforms to offer minors options to safeguard their information and deactivate addictive features by default. It also imposes a legal duty on companies to mitigate risks such as suicide and disordered eating among minors.The Children and Teens' Online Privacy Protection Act (COPPA 2.0) proposes a ban on targeted advertising to minors and data collection without their consent. It also allows parents and children to delete their information from social media platforms.These bills represent the first significant legislative efforts to ensure online safety for children since the original COPPA was enacted in 1998. Tech companies like Microsoft and Snap have shown support for these initiatives, while Meta Platforms suggested that federal law should require app stores to seek parental approval for downloads by users under 16.US Senate set to vote on two child online safety bills | ReutersBoeing has finalized a guilty plea to a criminal fraud conspiracy charge and will pay at least $243.6 million for breaching a 2021 agreement with the U.S. Justice Department. This breach involved allowing potentially risky work at its factories and not ensuring accurate or complete airplane record keeping. Boeing admitted to conspiring to defraud the Federal Aviation Administration by making false representations about key software for the 737 MAX.The Justice Department found Boeing violated the deferred prosecution agreement after a January in-flight panel blowout on an Alaska Airlines 737 MAX exposed ongoing safety and quality issues. Additionally, Boeing disclosed false stamping at its 787 plant in South Carolina, leading to further investigations. The company also failed to ensure proper sequence in airplane manufacturing, increasing the risk of defects.By way of very brief background, "false stamping" refers to the practice of improperly marking or certifying parts or components as meeting required safety and quality standards when they do not. This fraudulent activity can involve the use of counterfeit certification stamps or documentation to falsely indicate that a part has passed necessary inspections and tests. Such actions undermine the integrity of the aircraft manufacturing process, potentially compromising the safety and reliability of the airplanes.Boeing agreed to pay a maximum fine of $487.2 million, with a credit for its previous $243.6 million payment, and will spend at least $455 million over the next three years to enhance safety and compliance programs. An independent monitor will oversee Boeing's compliance, with annual progress reports made public. Families of the 737 MAX crash victims can file objections before Judge Reed O'Connor, who will decide on accepting the deal and potential restitution. Boeing's board must also meet with the victims' families within four months of sentencing.Boeing finalizes 737 MAX guilty plea deal, US outlines reasons | ReutersUnited States v. The Boeing Company (4:21-cr-00005)The Federal Trade Commission (FTC) is set to implement updates to its health data breach notification rule on July 29, which could lead to increased litigation for companies providing health-related services through mobile apps. These amendments, finalized in April, extend the rule's coverage to companies that aggregate health information from multiple sources, which are not currently governed by the Health Insurance Portability and Accountability Act (HIPAA).The rule mandates that businesses must notify affected individuals and the FTC within 60 days of discovering a breach affecting 500 or more people. Non-compliance could result in civil penalties of up to $51,744 per violation. The FTC's amendments broaden the rule's scope, potentially transforming it from a data security breach rule to a consent requirement for sharing health data.Legal experts have raised concerns about the FTC's lack of a precise definition for "authorized access," which could complicate compliance and lead to fines and litigation. Despite stakeholders' requests for clearer guidelines, the FTC only stated that unauthorized disclosures might include the sharing or selling of consumer information inconsistent with a company's stated policies.The expanded rule could cover around 170,000 additional entities, though industry groups believe this number may be higher. Many of these entities might need to develop robust notification programs, as the new requirements mark unfamiliar territory for some.The updated rule could also increase lawsuits against healthcare-related businesses for exposing user data to third-party advertisers. For example, enforcement actions against GoodRx and Easy Healthcare Corp. cited breaches due to sharing health information with advertisers via pixel tracking technology.The FTC's broad interpretation of "unauthorized access" has significant implications. If a company's privacy policy is not sufficiently descriptive regarding data collection and sharing, the FTC may consider it an unauthorized disclosure. This aggressive stance by the FTC necessitates careful attention from industry players.The rule also raises questions about who is responsible for reporting breaches concerning personal health records (PHR). Companies might struggle to determine whether they are acting as downstream service providers or PHR-related entities, complicating their compliance obligations.FTC Health Breach Rule's New Updates May Spur More Litigation This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit www.minimumcomp.com/subscribe
Artificial Intelligence (AI) has emerged as a transformative force in various fields, with its potential for innovative applications being increasingly recognized. One such application is the analysis of behavior for health purposes, a field in which BlueSkeye AI is making significant strides.AI analyzes behavior for healthBlueSkeye AI is a company that specializes in analyzing medically relevant behavior from facial expressions and voice patterns. The company employs AI algorithms to detect subtle movements, muscle actions, gaze patterns, and tone of voice that could be indicative of underlying medical conditions. By interpreting these behavioral cues, BlueSkeye AI aims to diagnose conditions such as depression and other neurodegenerative diseases.The AI technology developed by BlueSkeye AI extends beyond mere facial recognition of emotions like happiness or anger. It delves into micro-expressions, asymmetries, and subtle behavioral cues that may not be easily perceptible to humans. By scrutinizing these intricate behavioral patterns, AI can yield valuable insights into an individual's mental and physical health.Advantages and usage of AI analysisThe application of this technology involves interactive tasks and questions designed to elicit specific behavioral signals associated with a particular condition. For instance, a virtual assistant may pose questions about a person's day or prompt them to mimic facial expressions to assess their motor neuron function. By evaluating the responses, tone of voice, and facial expressions, AI can make predictions about a person's health status.A key advantage of using AI to analyze behavior for health is its capacity to detect gradual changes over time. While individuals may have a general sense of their well-being on a day-to-day basis, AI can monitor long-term trends and identify subtle changes that could signal the onset of a medical condition. This long-term monitoring can be particularly beneficial for detecting neurodegenerative diseases like Parkinson's, where early intervention is crucial for improved outcomes.The Health Foundation Platform, an initiative by BlueSkeye AI, serves as a platform for pharmaceutical companies and researchers to conduct studies using facial recognition technology. This platform facilitates the rapid setup of studies, enabling researchers to collect data on behavior and health outcomes.Challenges to implementationThe development and implementation of mental health technology also involve regulatory challenges. Companies like BlueSkeye AI have chosen to comply with regulations such as the Health Insurance Portability and Accountability Act (HIPAA) and the General Data Protection Regulation (GDPR) to ensure the privacy and security of patient data. This commitment to regulatory compliance underscores the company's dedication to providing safe and effective solutions for mental health monitoring.AI technology also has the potential to integrate with healthcare systems and provide diagnostic capabilities. By connecting with healthcare providers, AI-powered mental health technology can streamline the diagnosis and treatment process, leading to improved patient outcomes. This level of integration represents a significant advancement in the field of mental health technology and has the potential to transform the management of mental health conditions. But, overcoming the challenges of privacy and acceptance could limit the reach.Conclusion: AI behavioral analysis can improve diagnosisIn conclusion, AI technology holds the potential to revolutionize the way we analyze behavior for health purposes. By harnessing advanced algorithms and facial recognition technology, companies like BlueSkeye AI are leading the way in developing innovative solutions for diagnosing and monitoring medical conditions. As AI continues to evolve, we can anticipate even more sophisticated applications in healthcare that enhance patient outcomes and transform the field of medicine.Interview by Todd Cochrane of Geek News Central.Sponsored by: Get $5 to protect your credit card information online with Privacy. Amazon Prime gives you more than just free shipping. Get free music, TV shows, movies, videogames and more. The most flexible tools for podcasting. Get a 30 day free trial of storage and statistics.
Artificial Intelligence (AI) has emerged as a transformative force in various fields, with its potential for innovative applications being increasingly recognized. One such application is the analysis of behavior for health purposes, a field in which BlueSkeye AI is making significant strides.AI analyzes behavior for healthBlueSkeye AI is a company that specializes in analyzing medically relevant behavior from facial expressions and voice patterns. The company employs AI algorithms to detect subtle movements, muscle actions, gaze patterns, and tone of voice that could be indicative of underlying medical conditions. By interpreting these behavioral cues, BlueSkeye AI aims to diagnose conditions such as depression and other neurodegenerative diseases.The AI technology developed by BlueSkeye AI extends beyond mere facial recognition of emotions like happiness or anger. It delves into micro-expressions, asymmetries, and subtle behavioral cues that may not be easily perceptible to humans. By scrutinizing these intricate behavioral patterns, AI can yield valuable insights into an individual's mental and physical health.Advantages and usage of AI analysisThe application of this technology involves interactive tasks and questions designed to elicit specific behavioral signals associated with a particular condition. For instance, a virtual assistant may pose questions about a person's day or prompt them to mimic facial expressions to assess their motor neuron function. By evaluating the responses, tone of voice, and facial expressions, AI can make predictions about a person's health status.A key advantage of using AI to analyze behavior for health is its capacity to detect gradual changes over time. While individuals may have a general sense of their well-being on a day-to-day basis, AI can monitor long-term trends and identify subtle changes that could signal the onset of a medical condition. This long-term monitoring can be particularly beneficial for detecting neurodegenerative diseases like Parkinson's, where early intervention is crucial for improved outcomes.The Health Foundation Platform, an initiative by BlueSkeye AI, serves as a platform for pharmaceutical companies and researchers to conduct studies using facial recognition technology. This platform facilitates the rapid setup of studies, enabling researchers to collect data on behavior and health outcomes.Challenges to implementationThe development and implementation of mental health technology also involve regulatory challenges. Companies like BlueSkeye AI have chosen to comply with regulations such as the Health Insurance Portability and Accountability Act (HIPAA) and the General Data Protection Regulation (GDPR) to ensure the privacy and security of patient data. This commitment to regulatory compliance underscores the company's dedication to providing safe and effective solutions for mental health monitoring.AI technology also has the potential to integrate with healthcare systems and provide diagnostic capabilities. By connecting with healthcare providers, AI-powered mental health technology can streamline the diagnosis and treatment process, leading to improved patient outcomes. This level of integration represents a significant advancement in the field of mental health technology and has the potential to transform the management of mental health conditions. But, overcoming the challenges of privacy and acceptance could limit the reach.Conclusion: AI behavioral analysis can improve diagnosisIn conclusion, AI technology holds the potential to revolutionize the way we analyze behavior for health purposes. By harnessing advanced algorithms and facial recognition technology, companies like BlueSkeye AI are leading the way in developing innovative solutions for diagnosing and monitoring medical conditions. As AI continues to evolve, we can anticipate even more sophisticated applications in healthcare that enhance patient outcomes and transform the field of medicine.Interview by Todd Cochrane of Geek News Central.Sponsored by: Get $5 to protect your credit card information online with Privacy. Amazon Prime gives you more than just free shipping. Get free music, TV shows, movies, videogames and more. The most flexible tools for podcasting. Get a 30 day free trial of storage and statistics.
Healthcare industry: medical transportation, medical billing, homecare business
The Health Insurance Portability and Accountability Act (HIPAA) of 1996 mandates the protection of all medical data to ensure equal access to healthcare and insurance coverage. Its privacy and security rules prevent sharing specific healthcare information with insurers. However, many healthcare professionals still find HIPAA compliance challenging. This guide answers frequently asked questions and provides practical tips to help you confidently navigate the complex world of HIPAA compliance.
Bishop reviews the arguments made in front of the Illinois Supreme Court over whether the Health Insurance Portability and Accountability Act (HIPAA) protects health care employers from lawsuits by employees under the state's Biometric Information Privacy Act (BIPA). --- Support this podcast: https://podcasters.spotify.com/pod/show/bishoponair/support
Bishop reviews the arguments made in front of the Illinois Supreme Court over whether the Health Insurance Portability and Accountability Act (HIPAA) protects health care employers from lawsuits by employees under the state's Biometric Information Privacy Act (BIPA). --- Support this podcast: https://podcasters.spotify.com/pod/show/bishoponair/support
Welcome back to Wine and Dime, where we delve into the rich nuances of financial planning, just as one might explore the complexities of a fine wine. In this episode, Amy Irvine, CEO and Founder of Rooted Planning Group, uncorks the topic of healthcare proxies in estate planning.Remember, just like a good bottle of wine, the Wine and Dime Podcast gets better with time. So don't forget to rate and subscribe to our show, where we blend the flavors of wine and personal finance to help you achieve financial freedom! If you have any questions that you would like answered on the show, feel free to email us at info@rootedpg.comOr visit us at www.rootedpg.com/podcasts for full show notes and links!What You'll LearnThe definition and purpose of a healthcare proxy within the context of comprehensive estate planning.The importance of selecting a trusted person (or persons) who can make healthcare decisions on your behalf during difficult and emotional times.Various scenarios and preferences you can outline in your healthcare proxy, including end-of-life decisions, organ donations, and specific medical treatments.An understanding of the Health Insurance Portability and Accountability Act (HIPAA) and its impact on your healthcare information.The relevance and importance of advanced directives and how they complement a healthcare proxy.How to manage healthcare-related decisions in case of permanent unconsciousness or terminal conditions.The necessity of open conversations with loved ones about your healthcare preferences and end-of-life wishes.Wine Tour RecommendationRooted Vine Wine Tours | Santa Barbara Wine Tours & Tastings (rootedvinetours.com)In keeping with the tradition of discovering wineries with a rooted theme, Amy brings to our attention the Rooted Vine Wine Tours based out of Santa Barbara. It's not a winery in itself but offers an exciting opportunity to explore various wineries in the region.Whether you're a novice enthusiast or a seasoned connoisseur, Rooted Vine Wine Tours promises a delightful expedition through some of the finest vineyards Santa Barbara has to offer. Ideal for those planning a visit to the area or looking for a unique wine adventure.Remember, like our financial journey, wine tasting is not just about the destination but the journey itself. You may just find your new favorite vine on the Rooted Vine Wine Tour!Check out their website for more details and plan your wine tour extravaganza.This episode is brought to you by Rooted Planning Group. Rooted Planning Group is a fee-only financial planning firm that specializes in working with women in their 30s and 40s who want to take control of their finances and plan for the future. Whether you're just starting out or you're looking to make a big change, Rooted Planning Group can help. Visit www.rootedpg.com to learn more.
Major updates regarding progress on the imminent ICD-11 code set were made during the recent meeting of the National Committee of Vital Health Statistics (NCVHS), including a request for information on the enigmatic code set, yet to be adopted by the U.S.Stanley Nachimson, longtime editorial contributor to ICD10monitor and former career professional at the Centers for Medicare & Medicaid Services (CMS), now an IT consultant, monitored the recent meeting and will report other NCVHS actions, including the updating Health Insurance Portability and Accountability Act (HIPAA) standards. Moreover, Nachimson is expected to report on a surprise move made by the Committee.Talk Ten Tuesdays will also feature these outstanding segments and thought leaders:Coding Report: Laurie Johnson, senior healthcare consultant for Revenue Cycle Solutions, LLC, will report the latest coding news.SDoH Report: Tiffany Ferguson, a subject-matter expert on the social determinants of health (SDoH), will report on the news that's happening at the intersection of coding and the SDoH.News Desk: Timothy Powell, CPA, will anchor the Talk Ten Tuesdays News Desk.TalkBack: Erica Remer, MD, founder and president of Erica Remer, MD, Inc., and Talk Ten Tuesdays co-host, will report on a subject that has caught her attention during her popular segment.
It's a phone call no parent wants to get. Their 18-year-old child has gone off to college, leaving the nest for the first time, and despite being the most level-headed and responsible teenager imaginable, they've landed in the hospital. Every parent's natural inclination is to do everything possible to help their child, but after attempting to talk with the treating physician, they're told they cannot participate in their child's care. After 18 years of making medical decisions on their child's behalf, parents are now on the outside, looking in. The reason? Passed in 1996, the Health Insurance Portability and Accountability Act (HIPAA) established a set of national standards for the protection of certain health information, but in doing so, the law also made it impossible for parents to participate or advise on their child's medical care once they reach the age of 18 — unless that young adult has given express written permission for their parents to act as their agent in such a circumstance. This is exactly what happened to estate planning attorney Laura Patton, our guest on the latest episode of A Place of Possibility™. Her son was off at college in Minnesota and had spent a late night playing video games with his friends. He slept in late, and after he woke up and showered, he passed out from dehydration, hitting his head on the corner of his dorm bed. His roommate took him to the emergency room and contacted Laura, who found herself absolutely terrified for her son. Even though she was an attorney, there was nothing she could do to help her child. Her feeling of helplessness prompted Laura to seek a solution for young adults — and their parents — who could easily face this circumstance. She knew full well that consulting with an attorney to create the incapacity planning documents a young adult might need in this situation would be time-consuming and expensive. And, since most young adults haven't amassed much in the way of financial or personal assets, creating a comprehensive estate plan for them was often overkill. Her solution was to start Scholar Shield, an online service focused on creating customized, high-quality legal documents that are specifically geared toward young adults. Laura will chronicle her journey to coming up with this revolutionary approach to incapacity planning for young adults, as well as her own varied legal career path, and she'll also explain the legal challenges that young adults face — challenges that HIPAA, despite its best intentions, has made more complex. We'll be talking about: The pervasive problem that faces parents whose kids are going off to college for the first time – how do they protect young adults while also encouraging their independence? How Laura's own experience as a mother instilled in her a sense of urgency to come up with a solution that bridged the gap between no incapacity planning at all and traditional estate planning that is designed for asset distribution after death. The cost and time-saving advantages that Scholar Shield offers over the more traditional process of consulting with an attorney. When and why a family might want to explore a more comprehensive estate plan. And more! As a parent, you encounter a mixture of emotions when your child turns 18 and leaves for college — elation that they're on a good path, but also some sadness that they'll no longer be under your roof. And you'll no doubt worry about them. Yet, even if they're as responsible as possible, unforeseen events can happen. This episode will help you look after a young adult's best interests and ensure that you, as a parent, are involved in their care should those circumstances arise.
According to the Health Insurance Portability and Accountability Act (HIPAA), a patient's protected health information can be reasonably disclosed without the patient's consent in each of the following instances EXCEPT: Find it all out in the podcast! Be prepared for the NPTE so that you can pass with flying colors! Check out www.ptfinalexam.com/podcast for more information and to stay up-to-date with our latest courses and projects.
In this episode, we discuss the Health Insurance Portability and Accountability Act (HIPAA) and its significance in various industries. We delve into HIPAA violations, the tiers of violation fines, and how leadership must take responsibility to meet HIPAA regulations. Our guest speakers provide valuable insights on how to mitigate HIPAA breaches and manage your practice.Additional Resources:https://www.hipaajournal.com/hipaa-violation-fines/https://ocrportal.hhs.gov/ocr/breach/breach_report.jsfHave a question or topic suggestion? Email us at info@cit-net.com or head out to www.cit-net.com/podcast
On The Cloud Pod this week, Amazon announces massive corporate and tech lay offs and S3 Encrypts New Objects By Default, BigQuery multi-statement transactions are now generally available, and Microsoft announces acquisition of Fungible to accelerate datacenter innovation. Thank you to our sponsor, Foghorn Consulting, which provides top notch cloud and DevOps engineers to the world's most innovative companies. Initiatives stalled because you're having trouble hiring? Foghorn can be burning down your DevOps and Cloud backlogs as soon as next week. General News: Amazon to lay off 18,000 corporate and tech workers. [1:11] Episode Highlights ⏰ Amazon S3 Encrypts New Objects By Default. [3:09] ⏰ Announcing the GA of BigQuery multi-statement transactions. [13:04] ⏰ Microsoft announces acquisition of Fungible to accelerate datacenter innovation. [17:14] Top Quote
Healthcare industry: medical transportation, medical billing, homecare business
Every business that falls under the Healthcare Insurance Portability and Accountability Act (HIPAA) is required to assign someone to the role of HIPAA compliance officer. Learn more about HIPAA compliance officer duties. Improve your operations, eliminate rejected claims - switch to medical billing software today.
In this weeks episode of the RD Exam Made Easy Podcast, you're gonna learn about the "Acts" - government acts that is. This episode was requested by a listener like you. There's a lot of government acts but this episode reviews some of the most common ones regarding working conditions and expectations. I made a FREE cheat sheet for you that summarizes these laws. Download your cheat sheet here and follow along. You'll learn about: 1935: National Labor Relations Act 1938: Fair Labor Standards Act 1947: Taft Hartley Labor Act 1959: Labor Management Reporting and Disclosure Act 1963: Equal Pay Act 1964: The Civil Rights Act 1967: Age Discrimination in Employment Act 1972: Equal Employment Opportunity Act 1990: Americans with Disabilities Act 1993: Family Medical Leave Act 1996: Health Insurance Portability and Accountability Act (HIPAA) 2020: Affordable Care Act These laws are long and wordy. There's a lot to them so if you want to learn more about each of these laws, I recommend you research the laws further. The goal for this episode is to summarize the laws and break them down so you have a basic understanding if you were asked a question on the RD Exam. Be sure to listen as I give a shout-out to a listener who just passed the RD Exam. When you pass the RD Exam, I'd love to congratulate you on the podcast too. And if you have a question you want featured on the RD Exam Made Easy Podcast, please let me know. You can send me a message on instagram @jananichollrd.
- News Item -- On June 24, 2022, the U.S. Supreme Court handed down its decision in Dobbs v. Jackson Women's Health Organization. - The Court expressly overruled Roe v. Wade (1973) and Planned Parenthood v. Casey (1992) - Each state is now able to adopt its own laws regarding the practice of abortion - Overview - An important reminder: Roe was a privacy case - The Court was trying to balance three separate constitutional principles - A woman's right to privacy - The State's interest in protecting the health of a pregnant person - The State's interest in protecting the life of a viable fetus - Roe was an extension of two earlier privacy cases: Griswold v. Connecticut (1965), which established a federal "right to privacy" with respect to a married woman's ability to obtain contraceptives from her doctor, and Eisenstadt v. Baird (1972), which extended that same right to unmarried women. - How Might Cybertraps Arise? - Suspicious Circumstances - It is often difficult to tell the different between a spontaneous miscarriage and a self-medicated abortion - Approximately 30% of all pregnancies end in a spontaneous miscarriage - Criminal Investigations - Abortion is now banned in six states - Alabama - Arkansas - Mississippi - Missouri - Oklahoma - South Dakota - It is a crime to perform abortions and in most states, to "aid and abet" someone having an abortion - The Health Insurance Portability and Accountability Act (HIPAA) does not prevent a doctor or medical organization reporting personal health data if they think a crime has been committed - Family Educational Rights & Privacy Act (FERPA) is very similar in this regard. - If someone reports that an abortion has occurred, local law enforcement or a local prosecutor could initiate a criminal investigation - Law enforcement can: - subpoena data from online account - conduct forensic exams of digital equipment - Civil litigation - A handful of states, led by Texas, have created systems that deputize enforcement to private citizens - Under that scheme, an individual located anywhere in the country can file a lawsuit alleging that another person performed an illegal abortion or aided and abetted a person in obtaining one - If the lawsuit is successful (by "a preponderance of the evidence"), the defendant can be ordered to pay a minimum of $10,000 as well as costs and attorneys fees - All of the usual civil litigation rules apply, including discovery of relevant evidence (apps, browser history, social media, cell phone records, etc.) - Risks for Educators - Social media posts that are contrary to state law - Requests for advice from students - What Data Is Collected? - Cybertraps for Expecting Moms & Dads - Erratic protection of personal data across the country - Communications - Email - Messaging - Health Care Data - Health Care Providers - Employers - Financial Records - Bank accounts - Credit cards - Online payment apps (Paypal, Stripe, etc.) - Browsers and Search Engines - Social Media - Selfie-incrimination - Tagging - Apps - Fertility - Health, General - Smartwatches - Can pinpoint the start of pregnancy from biometric information - Geolocation - Cellphone tower pings - Apps - Location tracking (Foursquare) - Geo-announcements (Twitter) - Location tracking by Google Maps, Waze, or iMaps - Governmental Tracking Tools - License plate readers - Biometrics - Other Looming Constitutional Issues - The Right to Travel - Some states are considering laws that would prohibit their citizens from traveling out-of-state for abortions - Criminal enforcement would be difficult (although surveillance tools are growing increasingly powerful) - Civil enforcement presents many fewer constitutional questions - Free Speech/Freedom of the Press - Some state legislators have also expressed interest in trying to prohibit web sites from publishing certain information about abortion (self-medication, availability of out-of-state services, etc.) within their states - As a practical matter, it's challenging to block such content (VPNs, TOR browers, etc.) - Such efforts would call into question the fundamental structure of the internet - Resources - #2022-07-20 Data privacy, abortion limits set to collide post-Roe [https://rollcall.com/2022/07/20/data-privacy-abortion-limits-set-to-collide-post-roe/](https://rollcall.com/2022/07/20/data-privacy-abortion-limits-set-to-collide-post-roe/) - #2022-07-13 In a Post-Roe World, the Future of Digital Privacy Looks Even Grimmer [https://www.nytimes.com/2022/07/13/technology/personaltech/abortion-privacy-roe-surveillance.html](https://www.nytimes.com/2022/07/13/technology/personaltech/abortion-privacy-roe-surveillance.html) - #2022-07-08 How to protect your privacy in a post-Roe America [https://mashable.com/article/how-to-protect-online-privacy-post-roe-abortion](https://mashable.com/article/how-to-protect-online-privacy-post-roe-abortion) - #2022-07-08 Protecting digital privacy post-Roe [https://whyy.org/episodes/protecting-digital-privacy-post-roe/](https://whyy.org/episodes/protecting-digital-privacy-post-roe/) - #2022-07-06 How online searches and texts can put you at risk in a post-Roe world, and how to protect yourself - #2022-07-02 Data privacy concerns make the post-Roe era uncharted territory [https://www.npr.org/2022/07/02/1109565803/data-privacy-abortion-roe-apps](https://www.npr.org/2022/07/02/1109565803/data-privacy-abortion-roe-apps) - #2022-06-30 Deleting Your Period Tracker Won't Protect You [https://www.nytimes.com/2022/06/30/technology/period-tracker-privacy-abortion.html](https://www.nytimes.com/2022/06/30/technology/period-tracker-privacy-abortion.html) - #2022-06-29 The future of privacy rights in a post-Roe world [https://www.axios.com/2022/06/29/privacy-right-roe-v-wade-dobbs-v-jackson-online-data](https://www.axios.com/2022/06/29/privacy-right-roe-v-wade-dobbs-v-jackson-online-data) - #2022-06-28 Why some fear that big tech data could become a tool for abortion surveillance [https://www.pbs.org/newshour/economy/why-some-fear-that-big-tech-data-could-become-a-tool-for-abortion-surveillance](https://www.pbs.org/newshour/economy/why-some-fear-that-big-tech-data-could-become-a-tool-for-abortion-surveillance) - #2022-06-27 The Biggest Privacy Risks in Post-Roe America [https://www.theverge.com/23185081/abortion-data-privacy-roe-v-wade-dobbs-surveillance-period-tracking](https://www.theverge.com/23185081/abortion-data-privacy-roe-v-wade-dobbs-surveillance-period-tracking) - #2022-06-24 What police could find out about your illegal abortion [https://www.vox.com/recode/23059057/privacy-abortion-phone-data-roe](https://www.vox.com/recode/23059057/privacy-abortion-phone-data-roe)
Data analytics leaders are key to their organizations. Join the conversation with amazing leaders who share their powerful perspectives. These days, data & analytics leaders hold key importance for guiding their organizations toward digital transformation and evolution. They are the lighthouses that help direct their organizations toward the incredible value that is unlocked through the leverage of properly-run data and analytic programs. But, they are also are humans, and just like many of us, they must work through conflict, company politics, time zone changes and other challenges. Please join us for our new monthly Leadership Perspective Series where we talk to some of the greatest data & analytics leaders across the globe. These quick, slide-free discussions will highlight the leader's perspectives, challenges and triumphs. What are they working on? How do they keep their heads above water? What creative approaches they are using to bring a data-driven culture to the forefront of their organizations? This month we will feature Laura Merrick, Sr. Director of eSolutions at Medical Home Network (MHN). Laura's area of excellence is where data meets adoption to drive transformation that improves patient outcomes in the Healthcare industry. In this candid, slide-free session she will share insights and personal stories around that journey. Laura will also touch upon MHN's mission to adopt the HL7® FHIR® (Fast Healthcare Interoperability Resources) standard and to provide an open, flexible and extensible Healthcare Interoperability architecture built upon the Google Cloud Healthcare API. ABOUT LAURA: Laura Merrick is an experienced Program and Product Manager with a demonstrated history of working in the hospital & health care industry. She has strong program and project management professional skills in Nonprofit Organizations, U.S. Health Insurance Portability and Accountability Act (HIPAA), Public Speaking, Healthcare Information Technology (HIT), and Healthcare Management.
There has been a flurry of executive and Congressional action after the Dobbs v. Jackson Women's Health Organization Supreme Court case that overturned Roe v. Wade. Leila Abolfazli, Director of Federal Reproductive Rights at the National Women's Law Center, sits down to talk with us about executive and Congressional measures being taken on abortion rights in the United States.The executive order issued by the Biden administration is split into four main sections that: 1) directs the Department of Health and Human Services (HHS) on actions to take; 2) convenes private, pro-bono attorneys and Bar associations in an effort to represent patients, providers, and other third parties who lawfully seeking or providing reproductive health care; 3) asked the Federal Trade Commission (FTC) to protect people's online data when seeking information about or seeking abortion care; and 4) outlines other laws that HHS can support, including strengthening the Health Insurance Portability and Accountability Act (HIPAA) and creating an HHS-Gender Policy Council taskforce that coordinates federal agency response to abortion. You can find additional information about this executive order here.Congress held five hearings after the release of the Dobbs v. Jackson Women's Health Organization ruling in the House Oversight Committee, House Energy and Commerce Committee, House Judiciary Committee, Senate Judiciary Committee, and Senate Health, Education, Labor, and Pension Committee. The House passed a bill called the Ensuring Access to Abortion Act, which would ensure protection of those crossing state lines to receive an abortion. In addition, the House passed the Women's Health Protection Act which would cement a federal right to abortion. The Respect for Marriage Act passed in the House would protect same-sex marriage, while the Right to Contraception Act passed in the House would protect the right to birth control access. Lastly, the Senate voted on emergency funding for Title X clinics—family planning clinics across the United States that provides millions of people with basic healthcare. LinksNational Women's Law Center on TwitterNational Women's Law Center on FacebookJennie in DC Abortion Resources Tweet Thread I Need An A Abortion Fund Donation Finder Plan C Pills Support the show
Clio, the legal tech services giant, provides options that can help firms comply with federal Health Insurance Portability and Accountability Act (HIPAA) compliance. As many lawyers know – or come to learn – healthcare information can be a third rail. HIPAA regulations create unique knots to untangle when you get anywhere near sensitive healthcare information. What's a HIPAA “covered entity,” and how does it affect responsibilities for health records, data protection, and sharing? What level of security and encryption are required? And how do new HITECH act vendor data handling regulations affect you? If you're representing doctors buying or selling a practice, or representing a nursing home or health provider, it can get messy in a minute. Attorneys can struggle to comply with all the regulations. But incorporating a comprehensive, firm-wide compliance tech solution can help. (Plus, learn how to stop misspelling HIPAA, because we've all done it). Got questions or ideas? Don't forget to hit us up at NewSolo@legaltalknetwork.com Topics: Guest Joshua Lenon, lawyer and data protection officer at Clio, explains how tech solutions can help lawyers meet HIPAA healthcare data requirements. HIPAA regs can sneak into all sorts of legal work, including the buying and selling of medical practices or a medical malpractice case. …and HIPAA regs are constantly evolving. Are you keeping up? Additional Resources: HIPAA HITECH Act What is PHI Clio Clio and HIPAA Clio HIPAA add-on cost Standard Fusion Clio Cloud Conference Clio Twitter
Clio, the legal tech services giant, provides options that can help firms comply with federal Health Insurance Portability and Accountability Act (HIPAA) compliance. As many lawyers know – or come to learn – healthcare information can be a third rail. HIPAA regulations create unique knots to untangle when you get anywhere near sensitive healthcare information. What's a HIPAA “covered entity,” and how does it affect responsibilities for health records, data protection, and sharing? What level of security and encryption are required? And how do new HITECH act vendor data handling regulations affect you? If you're representing doctors buying or selling a practice, or representing a nursing home or health provider, it can get messy in a minute. Attorneys can struggle to comply with all the regulations. But incorporating a comprehensive, firm-wide compliance tech solution can help. (Plus, learn how to stop misspelling HIPAA, because we've all done it). Got questions or ideas? Don't forget to hit us up at NewSolo@legaltalknetwork.com Topics: Guest Joshua Lenon, lawyer and data protection officer at Clio, explains how tech solutions can help lawyers meet HIPAA healthcare data requirements. HIPAA regs can sneak into all sorts of legal work, including the buying and selling of medical practices or a medical malpractice case. …and HIPAA regs are constantly evolving. Are you keeping up? Additional Resources: HIPAA HITECH Act What is PHI Clio Clio and HIPAA Clio HIPAA add-on cost Standard Fusion Clio Cloud Conference Clio Twitter
‘Gumdrop' was the first ‘pit bull' to be adopted in Denver after the 30-year ban was repealed. But he wasn't the last. ‘The Denver Animal Shelter found homes for 100 pit bulls in 2021, enough to make the newly legalized dogs the second-most adopted breed at the shelter.' These are some of the stories making headlines in animal protection:* Manatee County, FL, “approved a new ordinance that prevents the killing of feral cats. The changes are a result of a Manatee County woman's loss and efforts to save other cats from the same fate” when her neighbor had the community cats she cared for trapped and killed.* 1,062,127 animals found homes during the “Home 4 the Holidays” pet adoption drive between Thanksgiving and New Year's Day. That's 1,062,127 animals who no longer face the needle.* The Labrador Retriever was named the “most popular” dog breed for the 31st year in a row. But it's not really true. Despite AKC press releases making that claim and headlines parroting it, mixed breed dogs always take the top spot. And it isn't even close.* On the heels of the McPlant burger at McDonald's and Chipotle's vegan chorizo, KFC adds plant-based “chicken” at all U.S. locations. * “Gumdrop” was the first so-called “pit bull” to be adopted in Denver in 30 years after the ban was repealed. But he wasn't the last. “The Denver Animal Shelter found homes for 100 pit bulls in 2021, enough to make the newly legalized dogs the second-most adopted breed at the shelter.” Banning dogs based on how they look is immoral. It is also ineffective. That's not just opinion; it's science: 50% of dogs labeled as pit bulls lacked DNA breed signatures of breeds commonly classified as pit bulls; Dogs targeted for breed discriminatory laws are not more likely to bite, do not bite harder, and such bans do not result in fewer dog bites or bite-related hospitalization rates; and, Enforcement of the ban is expensive with no measurable impact on public safety. Bans also negatively impact surrounding communities and rescue groups who have to take on the burden for such regressive and selfish policies in order to save the lives of these dogs. “When a city has a breed-specific ban, good dogs die. It's that simple.”* As companies seek to bring employees back to the office, human resources professionals are reporting increased calls for their pets to come, too: “more job seekers are looking at pet-friendly benefits and policies in evaluating a potential employer.” This is not just good for dogs, it is good for the bottom line. Studies have found that the presence of dogs in the workplace reduces stress, increases social interactions, leads to improved performance (including fewer errors), longer work hours, reduced absenteeism, and reduced turnover.* The New Hampshire Legislature is set to decide whether to create a committee that will study how to curtial rental housing discrimination for tenants whose families include dogs and cats. Protecting those tenants will not only keep families together, reduce shelter intakes, and increase adoptions, it will benefit landlords, public health, and local businesses.* Last May, the Green River City Council in Wyoming was asked to vote on getting rid of the gas chamber to kill animals at its local pound. Not one city councilmember seconded the motion and it failed to pass. But after a series of public protests by local citizens, the Mayor has directed staff to come up with a plan to replace gas killing.* New Jersey legislators were set to pass a bill that would have allowed courts to order defendants in animal cruelty cases to pay for the costs of animal care and if they fail to do so, forfeit the animals, before conviction. Unfortunately, the bill would have also allowed New Jersey shelters/pounds to kill those animals once they are granted full custody. Seizing animals being subjected to violence and then allowing pounds to commit the ultimate form of violence on them – killing – is a gross betrayal, not only adding insult to a life of injury, but taking us further – not closer – to the goal of animal protection. The No Kill Advocacy Center's requested amendments to further protect animals were not adopted, but the bill ultimately failed to pass.* The director of the Memphis, TN, pound is violating the law by refusing to provide the medical records of animals to citizens who request them in order to hide why some animals are dying in their kennels and why others are being deliberately killed. She claims she is doing it to protect the “privacy” rights of animals under the federal Health Insurance Portability and Accountability Act (HIPAA), but such a claim is absurd. One reason why is that a Federal Court has already ruled that, “There is no veterinarian privilege, no animal equivalent of the Health Insurance Portability and Accountability Act, and no case law suggesting that humans and animals are entitled to the same level of privacy.”Food for thought:* In Part 3 of our podcast history of U.S. animal sheltering, Jennifer and I tell the story of the creation of the first No Kill community. We also discuss the subsequent spread of the No Kill Equation model of sheltering nationwide — efforts that continue to spare the lives of millions of animals every year.* A new study finds that people who live with dogs drive more — and the more dogs they have, the more miles they drive. A fair number of those car trips are to recreate with dogs, like hiking, walking, and playing off-leash. For purposes of reducing traffic, carbon emissions, and improving the quality of life for dogs and dog lovers, urban planners are urged to make their cities more dog-friendly.* Shelters are stressful places for dogs and they can also be stressful places for potential adopters. Several recent studies, however, demonstrate how to make shelters more welcoming for both: 1. Give dogs the ability to see other dogs; 2. Doggy roommates; 3. Lots of treats; and 4. Sniff holes.* Cats often fare poorly, too. Making a shelter cat happy is simple according to a recent study: lots of cuddles.As more people turn to rescue and adoption and more shelters embrace progressive policies, the number of communities placing over 95% and as high as 99% of the animals is increasing. * Fremont County, CO, had its best year ever. It reported a 99% placement rate for dogs, 98% for cats, and it placed all but one other animal. * Ames, IA, also reported a 99% placement rate for dogs, 98% for cats, and 96% for rabbits and other animal companions.* Flathead, MT, reported a 96% placement rate for dogs and 94% for cats.These communities and the data nationally prove that animals are not dying in pounds because there are too many, because there are too few homes, or because people don't want the animals. They are dying because people in those pounds are killing them. Replace those people, implement the No Kill Equation, and we can be a No Kill nation today.And, finally, a legal fight is being heard in a Boston, MA, courtroom between a rescue group which wants to amputate a young dog's leg because of complications from a prior fracture and ongoing infection and the dog's foster mom, who wants to adopt Kirklin and first try surgery to save the leg (at her own expense).According to media reports, the foster mom, “took it upon herself to get a second opinion from other veterinarians. Prior to something as drastic as an amputation, she would like to have the plate [in the dog's leg] surgically removed to see if that allows the leg to completely heal.” The foster mom also said that Kirklin “made big strides in recent weeks since he started taking antibiotics. ‘It's almost like you can't even tell there was an issue… The improvement is tremendous.'”To stop the amputation, she “hired an attorney to take the rescue organization to court and win ownership of Kirklin. ‘We came with our hands open, saying we would pay for surgery and pay for care of the dog'... The dog is perfectly fine. Just let us adopt…”In a statement, the rescue group disputes that the dog is fine. They note that they, “paid for surgery to try to save his limb and a metal plate was installed. Following surgery, Kirklin was required to be on restricted rest for several months so that his bones could fuse, and he could continue to utilize his front leg,” but the plate failed. They further note that, “The veterinary partners that we rely on as an organization have advised that amputation of the leg is the most clear-cut pathway to recovery. He is suffering in great pain but his happy-go-lucky nature and pain medication masks this. The bottom line is that Kirklin is suffering from a painful infection that could become systemic and life threatening… While it breaks our heart to see dogs who have undergone injuries that result in amputations, those of us who know dogs know that they adjust very quickly to life on three legs, especially when it is a front leg.”The rescue group's attorney argued in court that, “It's not her decision because she doesn't own the dog. If this foster is allowed to just arbitrarily say, ‘No, it's my rules now,' that will bring down the entire foster system.”Both sides have compelling arguments and both sides seem to be motivated by what they believe is in the best interest of the dog. And that suggests how the court should rule. Rather than decide the issue of “ownership” of the dog, the court could decide what is in the best interest of the dog.Animals have rights independent of the people they are connected to — or at least they should. Thankfully, more and more of our laws are enshrining those rights into law: in cruelty, divorce, and probate cases. But animals need more legal recognition. They need legal personhood, which will protect them in all cases where an animal's best interest might be in conflict with that of the people around him/her, as courts do for children and other at-risk groups. A guardian ad litem appointed by the court to be Kirklin's attorney would give him such a voice.“Both sides made their arguments in court this week, but the [court] has yet to issue a decision.” And before it does, it would be a good idea to hear from Kirklin, too. This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit news.nathanwinograd.org/subscribe
There's so much misinformation related to just about any and everything related to COVID-19. And now with more employers requiring masks, COVID vaccination proof or testing, the debates and half-truths are only intensifying. HIPAA has become the new buzzword in connection to COVID and employee rights and protections. But how much of the discussion has been accurate?On today's episode, nurse attorney Irnise Williams educates us on the protections HIPAA offers employees for COVID related matters. In addition, nurse attorney Irnise Williams explains: Key info about the Health Insurance Portability and Accountability Act (HIPAA) including: what private health information HIPAA generally protectswhich employers and companies are subject to HIPAAwhat employee COVID related information is not protectedNecessity and prevalence of mandatory vaccinations and immunization status disclosures.How vaccines, including the ones for COVID-19, work. Potential COVID-19 liability for employers. Legality of employer mask, vaccine, and/or testing mandates. Resources available for business owners seeking growth and sustainability. CONTENT WARNINGSNone.GUESTAttorney Irnise WilliamsThe Law Office of Irnise F. Williams, LLC- https://iwilliamslaw.com/- Facebook: https://www.facebook.com/yournurselawyer- Instagram: https://www.instagram.com/yournurselawyer/RESOURCESCenters for Disease Control - https://www.cdc.gov/coronavirus/2019-ncov/index.html National Institutes of Health COVID-19 - https://covid19.nih.gov/ Occupational Safety and Health Administration Coronavirus Disease - https://www.osha.gov/coronavirusFOR MORE INFORMATION Listen and subscribe to SheConfidential on your favorite podcast app. Visit https://sheconfidential.com/ for complete episode details including guest information and discussion highlights Follow on Instagram and Facebook @she.confidentialNOTEThe information provided on SheConfidential pertaining to your health or wellness, relationships, business/career choices, finances, or any other aspect of your life is not intended to be a substitute for individual consultations, professional advice, diagnosis or treatment rendered by your own provider.ACKNOWLEDGEMENTSEpisode artwork and video production by Eye AM Media https://www.eyeammedia.com/. Follow on Instagram @eyeammedia
Let's start with a basic question: are you affiliated with a Health Insurance Portability and Accountability Act (HIPAA) covered entity? If so, remember, such entities must comply with standards for electronic transactions, not just privacy. When you're asked about your vaccine status, do you claim a HIPAA violation? Is your vaccine status only your business, and no one else's? If not, whose business is it, really? Is it your employers' business, or that of the airline or cruise ship company through which you're booking a trip? With the recent surge in the coronavirus pandemic, brought about by the new Delta variant, as odd as it may seem to some, more and more people are claiming a HIPAA violation when asked about their vaccine status. Reporting on this latest coronavirus conundrum during the next edition of Talk Ten Tuesdays will be Terry Fletcher, a nationally recognized professional physician coder and auditor. The live broadcast will also feature these other segments:Coding Report: Laurie Johnson, senior healthcare consultant with Revenue Cycle Solutions, LLC, will have the Talk Ten Tuesdays Coding Report, along with the broadcast's weekly Listeners Survey.News Desk: Timothy Powell, compliance expert and ICD10monitor national correspondent, will anchor the Talk Ten Tuesdays News Desk.TalkBack: Erica Remer, MD, founder and president of Erica Remer, MD, Inc., and Talk Ten Tuesdays co-host, will report on a subject that has caught her attention during her popular segment.Town Hall: Your questions will be answered live during this special interactive broadcast.
On this episode of CISO Tradecraft, you will hear about the most prominent Cyber Security Laws and Regulations: The Health Insurance Portability and Accountability Act (HIPAA) advocates the security and privacy of personal health information Administrative Safeguards Physical Safeguards Technical Safeguards The Sarbanes-Oxley Act (SOX) is designed to provide transparency on anything that could cause material impact to the financials of a company Cyber Risk Assessment Identify Disclosure Controls and Policies Implementing Cyber Security Controls Using a Reliable Framework (NIST CSF / ISO 27001) Monitor and Test SOX Controls The Gramm Leach Bliley Act (GLBA) requires Financial Institutions to protect Personally Identifiable Information (PII) The Federal Information Security Management Act (FISMA) requires executive agencies in the federal government to address cyber security concerns Plan for security Assign responsibility Periodically review security controls on systems Authorize systems to Operate The Payment Card Industry Data Security Standards (PCI-DSS) is a framework required to protect payment card information The General Data Protection Regulation (GDPR) - Data Compliance and Privacy law for European citizens Consent Data Minimization Individual Rights The California Consumer Protection Act (CCPA) - Data Compliance and Privacy law for California residents. This law provides Californians the right to know what data is collected or sold, the right to access data, the ability to request its deletion, and the ability to opt out of it being collected or sold. The Cybersecurity Maturity Model Certification (CMMC)- combines various cybersecurity standards and best practices and maps these controls and processes across maturity levels for Department of Defense contractors.
A chat with Brian Stark, President & CEO of Banta Medical Services, a Life Sciences consulting firm, about how digital solutions greatly extend our reach; however, it is key that the digital solutions can capture and feed back the critical data elements promptly to pave the way for life-saving preemptive action and assist providers in maintaining effective patient care. "One piece of small data can paint a big picture." - Brian StarkBrian T. StarkCo-Founder, President & CEOBanta Medical Service www.bantamedicalservices.comMr. Brian Stark is a high octane, wounded warrior Army intelligence operative, who gets things done and never gives up. Fueled by inspiration and his faith, he is dedicated to empowering people with the medical resources that they need to live a happy, healthy & productive life. Mr. Stark has over 15 years of leadership and corporate management success in both DOD (active duty U.S. Army) and private Industry. Mr. Stark has unique experience and cross-training within management and technical multidisciplinary fields; to include deployable information technology endeavors, the intelligence community, healthcare support, telemedicine services and biosciences research support. His management roles, leadership decision making abilities, top-tier organizational policy influence, organizational budget influences, and leadership intuitiveness have proven successful innovative techniques for organizational health and operational readiness. He has provided senior-level operational and technical advice and oversight for specialized DOD intelligence programs, as well as program support to DOD, Homeland Security, NASA, and CDC. He has served as an organizational strategic manager for near-term and long-term strategies. Throughout his career, he has consistently demonstrated his commitment in developing and maintaining the highest standards of an organization's health and success. Mr. Stark is highly experienced in corporate-level policy development and implementation, program management, federal government contracting and procurements, medical recruiting, Health Insurance Portability and Accountability Act (HIPAA) requirements, Medical Billing & Coding (ICD-9 & 10) familiarization, and served as an executive level compliance advisor to the CEO of a 300+ employee, with over 250 locations, which specialized in medical and bioscience support to the federal government. Mr. Stark is very active in his community and public health organizations. He is a participating member of the American College of Healthcare Executives (ACHE), Healthcare Information and Management Systems Society (HIMSS), and serves as a committee member for the Healthcare Sector within the Texas Eagle Ford Shale Consortium. Mr. Stark is also an alumnus of the Wounded Warrior Project.#digital #digitaltransformation #closinghealthcaregaps #wearables #prescriptive #data #smalldata
Healthcare Practice Group member Maggie K. Martin explains the Health Insurance Portability and Accountability Act (HIPAA) and how it comes into play for patients and healthcare providers alike. From the current state of patient access to talk of a vaccine passport and a proposed new rule under consideration, Maggie discusses HIPAA's impact and the latest legislation being considered that may affect healthcare policies and patients' rights.About Maggie K. MartinConnect with Crowe & Dunlevy:Website | Facebook | Twitter | LinkedIn
In this episode of Serious Privacy, K Royal and Paul Breitbarth provide an update on recent happenings in both Europe and the US, some of which are surprising and the other makes no waves across the ocean.First, an unexpected agreement on the ePrivacy Regulation by the EU Members States. This does not mean that the regulation is passed - on the contrary, the Parliament and the European Commission are nearly at polar opposites. They will now enter what is called the “trialogue” where the various parties have to reach an agreement. The ePrivacy Regulation has been in discussion for years with the original intent to enter into effect alongside the EU General Data Protection Regulation (GDPR), but alas, such did not happen. Meanwhile, there is not a draft adequacy decision for the United Kingdom - there are two. In a never-before-seen event, the EU Commission issued two draft decisions - one for the GDPR and one for the law enforcement directive. The European Data Protection Board will now issue an opinion, which is not binding. However, the interim agreement for trade between the EU and UK will expire June 30, 2021 and cannot be extended. So a decision must be made. On the other side of the ocean, the US is seeing some movement in the Health Insurance Portability and Accountability Act (HIPAA), which does not happen often. Current proposed revisions include proposed enhancements to patient rights, but two other recent happenings include 1) a law passed (HR7898) to provide a cybersecurity safe harbor if a practice has implemented cybersecurity practices and 2) a recent safe harbor for cybersecurity tech donations. Further, they briefly reviewed enforcement waivers due to COVID 19 that have been issued by the Department of Health and Human Services. As always, if you have comments or feedback, please contact us at seriousprivacy@trustarc.com.
What’s the difference between 831(b) and 401(k) planners? Not much, just a different tax code. Both allow clients to put away profits today to weather tomorrow’s storms. In this episode, Toby Mathis of Anderson Advisors talks about captive insurance with Van Carlson, CEO and founder of Strategic Risk Alternatives (SRA). Van has more than 25 years of experience within the risk management industry. He began his career with Farmers Insurance Group as an agent. Now, he focuses SRA on risk management primarily and facilitates SRA to assess and solve for clients’ risks. Van’s primary goal is to continue the upward growth of SRA and develop new products to bring to market. Highlights/Topics: S. Tax Code and Americans: The tax code is used for tax planning, but should be used for its original purpose to be a risk mitigation tool. Umbrella Policy and Casualty Insurance: You find out how good of a policy you have when you need it. An umbrella policy isn’t over the top, but it doesn’t cover everything. COVID-19: Read the fine print of policies and seek advice from agents. Pandemic coverages are not considered a coverage under the Business Interruption Endorsement. Captive Insurance: Set up your own insurance company—you own it and you're paying premiums you deduct. The insurance company doesn't have to pay tax on premiums. Who is it for and what type of risk could it insure? Risk is not a problem. Business owners that are advanced in their thought processes and more forward-thinking recognize and understand asset protection and the risk it takes. Actual Physical Loss: Business Interruption Policy pays for your employees and building loans, unless it doesn't have direct physical loss. Right to Defend on Liability Policies: Even if there's no coverage but you get sued, general liability policies cover the legal defense. Lawsuits are going to be the next big thing when people, guests, and patients, not employees, contract COVID. Rules and Regulations: Two tax codes allow you to defer income out of your business. 401(k) for the retirement of yourself and employees, and 831(b) to build up reserves, take profits today and in the future. Four-Part Test: Do transfer risk, risk distribution, insure only things that can happen by accidents (not business risks), and act in a principal’s insurance to elect under 831(b). Gross Revenue: Cap it because if your gross revenue goes up, your premium increases. The more gross revenue you have, the more exposure you have for claims. Cancel Culture: Detrimental to businesses; have cash on hand because banks aren't going to help you out all of a sudden. Declare a Dividend: Take it out as a long-term dividend rate and shut it down, pull out capital gains, or put it to work. Investment Agreement: What can be done with the reserves? There are rules, but for the most part, clients just leave it to the bank and go forward with the risk. Brand Damage: Dependent on third-party vendors, you can’t go and unlock your door, open it, and open for business. Get there, reach in, and obtain client information. Resources: Strategic Risk Alternatives (SRA) https://strategicriskalternatives.com/ SRA’s Email mailto:info@strategicriskalternatives.com 831(b) https://www.captive.com/articles/the-basics-of-the-831(b)-election-for-captives 401(k) https://www.irs.gov/retirement-plans/401k-plans Business Interruption Insurance Policy https://www.investopedia.com/terms/b/business-interruption-insurance.asp Errors and Omissions (E&O) https://www.investopedia.com/terms/e/errors-omissions-insurance.asp Health Insurance Portability and Accountability Act (HIPAA) https://www.hhs.gov/hipaa/for-professionals/privacy/laws-regulations/index.html Paycheck Protection Program (PPP) https://www.sba.gov/funding-programs/loans/coronavirus-relief-options/paycheck-protection-program Toby Mathis https://andersonadvisors.com/tobymathis-2/ Anderson Advisors https://andersonadvisors.com/ Anderson Advisors Tax and Asset Protection Event https://andersonadvisors.com/asset-protection/ Anderson Advisors on YouTube https://www.youtube.com/channel/UCX5nh607M8hSBLiMB9MgbIQ
In this episode, Ashley sat down for a chat with Ariel about her career path, experience and transition to leadership. Ashley and Ariel discuss topics such as career influence, time management, leading a team, and the impacts of the pandemic.Guest - Ariel Weintraub: Ariel Weintraub joined MassMutual in the fall of 2019 as the Head of Security Operations & Engineering, where she is responsible for the Global Security Operations Center, Security Engineering, Security Intelligence and Identity & Access Management. Prior to joining MassMutual, Ariel served as Senior Director of Data & Access Security within Cybersecurity Operations at TIAA where she led a three-year business transformation program to position IAM as a digital business enabler. Prior to TIAA, Ariel held the position of Global Head of Vulnerability Management at BNY Mellon and was part of the Threat & Vulnerability Management practice at PricewaterhouseCoopers (PwC).Ariel holds a Masters of Science in Cybersecurity from New York University (NYU) Tandon School of Engineering and a Bachelors of Science in Business Administration from the University of Southern California (USC) Marshall School of Business. Ariel has a passion for empowering women, especially the next generation of female cybersecurity leaders and serves on the Board for the Executive Women’s Forum (EWF) and the ISACA One in Tech Foundation.Host - Ashley McArthur: Ashley McArthur is a Cyber Risk Senior Consultant within the Deloitte Risk & Financial Advisory practice with a focus on Data Privacy. Ashley has a wide array of experience from over 11 years in the healthcare industry with a background in privacy monitoring, data governance, compliance and privacy programs, to information security, data analytics, and risk management. She has experience with regulations such as the Health Insurance Portability and Accountability Act (HIPAA) and the California Consumer Privacy Act (CCPA). She has coordinated training, workflow and operational readiness during acquisitions, led and supported enterprise-wide compliance and privacy initiatives including audit readiness, program maturity and process controls. Ashley also analyzed large data sets to direct corporate strategy initiatives, implemented Artificial Intelligence (AI) software and process controls for data governance and data classification.Support the show (https://www.ewf-usa.com/)Support the show (https://www.ewf-usa.com/)
Wes Morris, Clearwater, and Kirk J. Nahra, WilmerHale, discuss the recently-issued Health Insurance Portability and Accountability Act (HIPAA) proposed rule. The podcast discusses key changes made by the proposal, including changes to the minimum necessary standard for care coordination and other information disclosure changes. Sponsored by Clearwater.
For companies operating in or around healthcare, compliance with the Health Insurance Portability and Accountability Act (HIPAA) is required. Many companies aren’t sure how to navigate this complex federal law and non-compliance can bring steep penalties. Kevin Henry, Founder and CEO of Accountable has solved that problem, providing online training for such employees. Accountable participated in the Techstars Austin accelerator program, making them the only Fort Worth-based startup with Techstars backing.
The Health Information Portability and Accountability Act (HIPAA) is meant to protect the medical privacy of individuals. Over the years the penalties have gotten larger and enforcement has cracked down on breaches. This episode talks about one company that had a really bad six month stretch of preventable breach events. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five —————— Where you can find Security In Five —————— Security In Five Reddit Channel r/SecurityInFive Binary Blogger Website Security In Five Website Security In Five Podcast Page - Podcast RSS Twitter @securityinfive iTunes, YouTube, TuneIn, iHeartRadio,
When we say this podcast is all about the Health Insurance Portability and Accountability Act (HIPAA), we don’t expect anyone to get super excited. But if it’s been awhile since you thought about your practice’s HIPAA compliance, or if you’ve never even had a plan in place, this podcast could not be coming at a […]
* Use coupon code PODCAST25 for 25% off this webcast * Webcast URL: https://www.theknowledgegroup.org/webcasts/hipaa-privacy-rule/ The current COVID-19 pandemic has created unprecedented challenges for health care providers and their business associates. This public health emergency has changed the way health care providers operate and deliver health care, including the increasing reliance on telehealth. Privacy officers for covered entities and their business associates need to keep abreast of notices and guidances issued by Department of Health and Human Services regarding compliance with Health Insurance Portability and Accountability Act (HIPAA) during this public health emergency. With the constantly evolving regulatory developments and changes in health care delivery emerging in this area, potential risks and challenges are expected to rise alongside other existing issues, making compliance even more important. In this LIVE Webcast, privacy law experts Scott Pink (O'Melveny & Myers LLP) and Christine Moundas (Ropes & Gray LLP) will provide the audience with an in-depth analysis of the recent trends in the HIPAA Privacy Rule in light of the COVID-19 pandemic. Speakers will present significant recent regulatory developments and compliance issues posed by this crisis. They will also provide best practices to stay compliant. For any more information please click on the webcast URL at the top of this description.
It isn't often enough that Kristin gets to talk tech with a powerhouse female in healthcare. Joining her on this show is June Noto discussing her career and how technology and compliance has and continues to shift in mental health and addiction services.June Ann Noto is the Vice President of Information Technology, Human Resources and Administrative Services at the New Jersey Association of Mental Health and Addiction Agencies, Inc. (NJAMHAA). For the past 20 years, Ms. Noto has directed the Community Information Technology Project, which is a joint public/private venture of NJAMHAA and the NJ Division of Mental Health and Addiction Services (DMHAS), providing technology leadership, advocacy and support to more than 200 human services organizations.Before joining NJAMHAA, Ms. Noto was the Director of Information Management at CPC Behavioral Healthcare, (Eatontown, NJ). Prior to starting her career in the not-for-profit arena, she held several technical positions for companies such as McGraw-Hill, Fairchild Publishing and Royal Doulton. With a diverse information technology (IT) background spanning more than 40 years, Ms. Noto has a record of leadership and achievement in automating business processes to improve efficiency, reduce costs and improve outcomes, while aligning the technology vision to the strategic plan and mission of the organization. Most recently working on implementing electronic health record collaborations in NJ and focusing on compliance issues related to cyber security, HIPAA and 42CFR Part II, Ms. Noto participates with several workgroups and committees and hosts numerous conferences and educational opportunities as a part of the IT Project offerings.She has participated on the Office of the National Coordinator’s Communities of Practice, Specialty Practice Workgroup, and had been appointed as a NJ Health IT Champion by the NJ Health Information Commission. Ms. Noto was the first to implement a behavioral health electronic records collaborative in New Jersey, as well as implement the nation’s first statewide behavioral health benchmarking initiative in New Jersey. She was involved in gaining provider buy-in on the Decision Support 2000+ initiative and became a voting member for the HL7 Standards for the Behavioral Healthcare Profiles committee convened by the Substance Abuse and Mental Health Services Administration and the Center for Mental Health Services. Ms. Noto has presented at several conferences hosted by the Center for Mental Health Services, the Coalition of Mental Health Consumer Organizations, the New Jersey Association of Community Providers, ASAH Private School Association, the NJ Primary Care Association, the NJ Center for Non-Profits and NJAMHAA on topics of compliance with the Health Insurance Portability and Accountability Act (HIPAA), IT planning, security, business continuity, Software as a Service (SaaS), cloud computing, and Cyber Security.Ms. Noto has authored articles for Mental Health Weekly, Behavioral Healthcare magazine, NJAMHAA News and the IT Project’s quarterly newsletter, Bits & Bytes.
Welcome to Cannabis Nursing. Nurse Laura provides patient education during which she works to integrate traditional medicine, plant-based medicine and alternative therapies to help the whole person. She also works with dispensary staff and providers to offer education and application of the science of cannabinoid medicine to best help our community. Nurse Laura is an experienced Board Member with a demonstrated history of working in the health wellness and medical cannabis industry. She is skilled in Facility Operations, Nursing Education, Wellness Coaching, U.S. Health Insurance Portability and Accountability Act (HIPAA), Team Building, Technical Leadership and Healthcare Information Technology (HIT). Strong is a business development professional who graduated from University of Phoenix. application of the science of cannabinoid medicine to best help our community. Enjoy this certainly out of the box interview,
Positive Connections Radio visits First Responders First, Episode 24.Join me on location with James "Kansas" Cafferty and members of a new residential program exclusive only to First Responders seeking help with mental health issues. Meet Austin Gillespie-Director of Admissions and Care Vaughan-Director of Outreach and Public Relations.Our mission at First Responders First is to provide unsurpassed top-quality medical, psychological and emotional care in a safe confidential environment to all First Responders, thus resulting in the restoration of careers, relationships and their lives.Located in the breathtaking mountains of the Angeles National Forest, First Responders First is an 1100-acre executive state-of-the-art substance and alcohol abuse treatment program created exclusively to serve First Responders. This one-of-a-kind, first in the nation recovery center, focuses specifically on trauma-related issues (Post Traumatic Stress Disorder, Acute Stress, and Adjustment Disorder) as well as other mental health challenges that tie directly to the addictive process. We also offer a complete detoxification program.Client confidentiality is protected by the law under the Health Insurance Portability and Accountability Act (HIPAA), which our treatment center is legally mandated to follow. Your information is confidential during your intake and stay with First Responders First, unless you give consent to release or it is authorized under qualifying regulations.Our top-quality medical care is of priority at First Responders First. Our outstanding medical director, Joshua Flatow M.D. (board certified psychiatrist), leads our team of highly-credentialed compassionate clinicians. Upon arrival, each First Responder will receive a complete medical examination and evaluation as well as an individualized plan of treatment, and then the healing begins.WWW.FirstRespondersFirst.comwww.mhnrnetwork.comwww.positiveconnectionsradio.com
The U.S. Department of Health and Human Services recently released a notice of enforcement discretion announcing changes in how the agency will assess civil monetary penalties for violations of the Health Insurance Portability and Accountability Act (HIPAA). In this episode, Rebecca Schaefer discusses the impact of this revised regulatory interpretation, how the new standard may impact pending disputes, and overall trends affecting HIPAA judgments and settlements. Presenters: Rebecca Schaefer and Eric Matava Download Presentation Materials
We're excited to have Ann Marie DePalma, RDH, back on our show again (previously heard on episode 90)! We met up with her at the Yankee Dental Congress in very chilly Boston where we got to talking about how your office can stay on the up and up with technology and health care compliance. The big topic this episode is the Health Insurance Portability and Accountability Act (HIPAA), which dictates how patient information is directed throughout the American health care system and protects that patient information from theft or fraud. Any dental office that processes patient medical and insurance information—so literally every dental office—needs to be compliant with HIPAA to ensure our patients are secure and that charts are properly archived and transmitted. In this episode, Ann Marie discusses the dos and don'ts of HIPAA compliance, how you can make your office as cyber-secure as possible, and making sure your fellow staff are fully trained on the software they're using. EPISODE HIGHLIGHTS: Interview starts: - Getting used to and properly using computer technology at the office to prevent accidental exposure of patient or clinic info. - The utmost importance of keeping patient-related emails encrypted when sending. - Get a professional for IT in your office, and why you should consider setting up two separate networks. - Some of the security violations Ann Marie has seen in her time and why they happened. - Why offices frequently fall behind technology training. - Should your office go paper-free or chart-free? - WATCH OUT FOR THE HIPAA POLICE. QUOTES: “Most practices are surviving in their software; they're not using it.” “They're only using a very small portion of what technology can provide.” LINKS: Ann Marie's email - amrdh@aol.com Thank you to Paradise Dental Technologies aka PDT for providing sponsorship for this episodes CE credits! THIS EPISODE COUNTS FOR CE! - but read the disclaimer below as it might not count for your state. Go here to take the test and get your CE Credit! Approved Pace Program Provider FAGD/MAGD Credit Approval Does Not Imply Acceptance By A State Or Provincial Board of Dentistry Or AGD Endorsement. 1/1/18- 12/31/19 Provider #373236 Be sure to thank the sponsor for CE for this episode by heading over to www.PDTDental.com and picking up a new instrument or telling them thank you in person at one of the conferences! Email us - Michelle@ataleoftwohygienists.com or Andrew@ataleoftwohygienists.com A Tale of Two Hygienists homepage - https://ataleoftwohygienists.com/ AToTH on Facebook - https://www.facebook.com/aTaleOfTwoHygienists/ AToTH on Instagram - https://www.instagram.com/ataleoftwohygienists AToTH on LinkedIn - https://www.linkedin.com/company/atoth/?originalSubdomain=ca
We’re excited to have Ann Marie DePalma, RDH, back on our show again (previously heard on episode 90)! We met up with her at the Yankee Dental Congress in very chilly Boston where we got to talking about how your office can stay on the up and up with technology and health care compliance. The big topic this episode is the Health Insurance Portability and Accountability Act (HIPAA), which dictates how patient information is directed throughout the American health care system and protects that patient information from theft or fraud. Any dental office that processes patient medical and insurance information—so literally every dental office—needs to be compliant with HIPAA to ensure our patients are secure and that charts are properly archived and transmitted. In this episode, Ann Marie discusses the dos and don’ts of HIPAA compliance, how you can make your office as cyber-secure as possible, and making sure your fellow staff are fully trained on the software they’re using. EPISODE HIGHLIGHTS: Interview starts: - Getting used to and properly using computer technology at the office to prevent accidental exposure of patient or clinic info. - The utmost importance of keeping patient-related emails encrypted when sending. - Get a professional for IT in your office, and why you should consider setting up two separate networks. - Some of the security violations Ann Marie has seen in her time and why they happened. - Why offices frequently fall behind technology training. - Should your office go paper-free or chart-free? - WATCH OUT FOR THE HIPAA POLICE. QUOTES: “Most practices are surviving in their software; they’re not using it.” “They’re only using a very small portion of what technology can provide.” LINKS: Ann Marie’s email - amrdh@aol.com Thank you to Paradise Dental Technologies aka PDT for providing sponsorship for this episodes CE credits! THIS EPISODE COUNTS FOR CE! - but read the disclaimer below as it might not count for your state. Go here to take the test and get your CE Credit! Approved Pace Program Provider FAGD/MAGD Credit Approval Does Not Imply Acceptance By A State Or Provincial Board of Dentistry Or AGD Endorsement. 1/1/18- 12/31/19 Provider #373236 Be sure to thank the sponsor for CE for this episode by heading over to www.PDTDental.com and picking up a new instrument or telling them thank you in person at one of the conferences! Email us - Michelle@ataleoftwohygienists.com or Andrew@ataleoftwohygienists.com A Tale of Two Hygienists homepage - https://ataleoftwohygienists.com/ AToTH on Facebook - https://www.facebook.com/aTaleOfTwoHygienists/ AToTH on Instagram - https://www.instagram.com/ataleoftwohygienists AToTH on LinkedIn - https://www.linkedin.com/company/atoth/?originalSubdomain=ca
You heard many headlines, mass shootings happening across our nation. More people want to prevent these atrocities, law enforcement does too. However, this issue can create problems because some of those mass shootings aren’t carried away by ideological or fanatics of some sort. Investigations have concluded people with extreme mental illnesses have committed these crimes. In some cases, family members of those responsible failed to see the signs of an imminent attack. Those with mental illnesses didn’t wake up one day and said, “Hey, I’m mentally ill, let’s go and hurt people.” In fact, many people with mental illnesses will never hurt another human being. In his book, author Gavin de Becker, “The Gift of Fear,” explains humans have developed a tremendous tool which can guarantee their survival. Some of us, police officers, call FEAR a “gut-feeling” or instinct. Gut-feelings is a predecessor of reasonable suspicion. You know something is wrong, but you don’t exactly what’s going on. What do you do? You ask more questions, dig deeper, and find what were you looking for. The same is for our court system, lawmakers believe if you just feel someone is a threat, then we must take their guns away. These lawmakers started new laws, known as Red Flag Gun Laws. What Are Red Flag Gun Laws? “Extreme Risk Protection Order” (ERPO), also known as Red Flag Gun Laws, is a legislative statute. Red Flag Gun Laws allow law enforcement to strip anyone with mental illnesses from possessing firearms while undergoing evaluation. Police officers will have submit an application for a warrant with a judge. After the judge finds credible and substantial facts, any person is a danger to themselves and others, officers might seize firearms for an unknown time frame. Is this really a violation of their due process rights? Well, the idea is complicated. In some states, ERPOs can only be filed by police, while in other states like California or Maryland, spouses, roommates and close relatives can ask courts to remove firearms out of safety concerns. While removing firearms can be seen as a violation of our second amendment right, many law enforcement officers expressed their desire for a fair due process and using “the totality of the circumstances” before taking firearms away according to “Policing Matters” podcast. While reading some comments, many highlighted, for example, some officers weren’t satisfied with states who lack mental health resources. As police officers, we encounter mentally ill people who are in distress or seeking help. Nevertheless, depending on where you patrol, some of those resources aren’t there. Which leaves those sick people finding relief by using legal and illegal controlled substances. Even the Health Insurance Portability and Accountability Act (HIPAA) could be detrimental preventing crimes. Physicians or mental health professionals may inform law enforcement when they believe a person might be a risk for violence. If one of those professionals knew a person might be planning an attack, police could investigate. In a brochure published by the American Hospital Association, they specify hospitals don’t have to share information if they don’t feel is necessary. “A hospital may not disclose patient information to avert a serious threat to health or safety if the information was obtained in the course of treatment to affect the propensity to commit criminal conduct; counseling or therapy; or through the individual’s request for such treatment, counseling, or therapy.” Another officer expressed concerns about taking property from mentally ill people. This officer stated it was better evaluate the ill person at a mental facility than just taking weapons away. This officer made a good point, mentally ill people who have clearly shown violent tendencies will find a way to harm others. Other weapons could be vehicles, knives, improvised explosive devices, etc. Again, we're going back, a reform is needed for our current mental health laws and accommodations for mentally ill people. Many states already had provisions in their laws which helped law enforcement officers seize firearms. My home state of Texas, in clearly specifies in the Health and Safety Code, Chapter 573, guidelines for officers for firearms confiscations from mentally ill people. When there is a substantial risk of serious harm to the person or to others unless the person is immediately restrained and believes that there is not sufficient time to obtain a warrant before taking the person into custody. The officer can take the distressed person into custody for evaluation. Substantial risk is justified by current behavior or evidence of severe emotional distress and deterioration in mental condition to the extent that the person cannot remain at liberty. These facts can be obtained from a credible person or officer’s observations. The officer shall immediately transport the person to a hospital, mental health facility, or jail where mental health professional must evaluate the person who was detained. The statue then expands to the seizing of the firearms by saying: A peace officer may immediately seize any firearm found in possession of the person. After seizing a firearm under this subsection, the peace officer shall comply with the requirements of Article 18.191, Code of Criminal Procedure. Then officers shall issue a receipt to the detained person stating which weapons were taken accompanied by a written notice of the procedure for the return of firearms. The agency then needs to notify via mail, no later than the 15th day, to the closest relative how this person can retrieve the guns being held by the law enforcement agency. As you see, in Texas, officers will seize firearms but will attempt to return those guns for safekeeping. This statue emphasizes due process as well as our right to bear arms. People are medically treated, but property won’t be kept by government officials. Texas goes even further by protecting people’s rights. If patients couldn’t get anyone to take his/her guns for safekeeping. The agency must sell any weapons through an authorized gun dealer, and all proceeds of any sale must go into the rightful owner’s account! Let me walk you through an example, let’s say you just went through a traumatic event like a burglary or an extreme domestic violence case. Based on Texas law, if you suffer an emotional disturbance, like PTSD, where your family or law enforcement believe your best course of action is a mental health facility. Law Enforcement officers will seize any guns at home, but immediately transfer them to any person you designate. If you are evaluated and medical professionals believe this was an isolated incident, all weapons can lawfully be returned back. Though, in those states with Red Flag Gun Laws, this process could take longer, placing you at risk. Think about this, if you just went over any of those scenarios and you feel you ex might come over and attack you at night. Would be safer for you to defend herself, and not cookie-cut specific circumstance as with Red Flag Gun Laws indicate? Every situation is different, and each jurisdiction should have the freedom to analyze, investigate, and conclude our best action for each person who is suffering mental distress episodes for the safety of the community. Although, research in Connecticut shown Red Flag Gun Laws had reduced suicides since 1999 when this law was enacted. Taking this information into consideration, Red Flag Gun Laws should also consider our rights of into account not only numbers. Many people believe if they seek help for their depression and possible suicide thoughts, their second amendment will be dismissed and their weapons will be confiscated. Currently, Title 18 U.S.C. Section 922(g)(4) stated a person who is committed to a mental institution voluntarily won’t find themselves disqualified for the ownership of firearms. Consequences of Red Flag Gun Laws Back in 2018, Maryland law enforcement officers attempted an execution of a seizure warrant on a man with mental health problems. While speaking with the subject, one officer began executing the order. This conversation prompted a confrontation which ended his life. One officer shot the homeowner because he didn’t want to let go of his gun. Many people just miss their court date after being legally declared in good mental condition, and they can obtain their guns back. Legal fees lost work dates, or life changes can be a complication for these people. Going through our court system isn’t free! My opinion More information plus acknowledgment from our public officials is needed to help people with permanent or temporary mental illnesses. As police officers, we can’t take people’s rights away, neither should government nor state's legislature should do it without due process. Police officers are placed at risk when these laws are enacted because we will be executing those legal documents. More states should base their Red Flag Gun Laws like Texas Legislature has done. Here in Texas, we believe in the protection of the public. Also, we believe in the protection of each individual’s rights. Gun laws are a complicated issue: “A well regulated Militia, being necessary to the security of a free State, the right of the people to keep and bear Arms, shall not be infringed.” Resources: 1. de Becker, Gavin. The Gift of Fear. Narrated by: Thomas Stechschulte. Audible, 2017. Audiobook. 2. Should police be allowed to seize guns from the mentally ill? [Audio blog interview]. (2019, March 22). Retrieved March 24, 2019, from http://bit.ly/2Cwx2BN Show: “Policing Matter” 3. RECEIPT AND NOTICE OF RIGHTS FOR SEIZED FIREARMS Incident#. http://www.houstoncit.org/wp-content/uploads/2013/09/Receipt-and-Notice-of-Rights-final-draft-3in-1.pdf 4. Texas Law for Court Ordered Drug Rehab and Involuntary …. https://careplanpro.com/texas-law/ 5. https://www.texastribune.org/2018/06/18/texas-gun-red-flag-laws-santa-fe-greg-abbott/ 6. https://www.atf.gov/file/58791/download 7. https://gunresponsibility.org/solution/erpo/ 8. https://www.ammoland.com/2018/12/anti-gun-bills-to-be-introduced-in-texas/#axzz5j6iKiSBK 9. https://www.ammoland.com/2019/01/texas-already-has-extreme-risk-protection-order-laws/#axzz5j6iKiSBK 10. https://www.denverpost.com/2019/02/25/gun-laws-red-flag-colorado/ 11. https://www.aha.org/system/files/2018-03/guidelinesreleasinginfo.pdf
The majority of businesses today are data driven in some form or fashion. Organizations in various industries rely on their unique data to drive processes, innovate, and of course house valuable information. This holds true for every department in a given business, be it finance, sales or service. For businesses in more dynamic industries like health care, data may even house health sensitive information, crucial for clinical trials and other special needs. Thanks to new compliance regulations like the General Data Protection Regulation (GDPR), and the Health Insurance Portability and Accountability Act (HIPAA), data is now protected more than ever. However, as regulations and new protection tools develop, avenues of intrusion also evolve. Businesses must adapt new technology, and take strategic steps to ensure their data is secure across multiple departments. For companies like United BioSource (UBC), implementing JD Edwards for data protection was a key to that security.
Chiropractic clinics use EMR (electronic medical record) software to manage patients, billings, insurance and keeping track of costs in one tool like a centralized hub. What it doesn't do is manage the sales and marketing component of the business. Kelsey Bratcher, an automation wizard and co-founder of AutomaticPracticeProfits, tells us of alternative tools and explains in this episode how implementing a CRM (Customer Relations Management), setting up a marketing technology and configure these all up in automation can improve your business performance and attract more clients. “Software into chiropractic industry is frustrating as you cannot put anything or out of it in an order that would make sense.” Kelsey Bratcher explains that popular EMRs are closed systems where you are unable to integrate certain tools that can significantly help you out with clinic operations, training, marketing and sales. In this interview, you'll learn: Alternative tools that a new practitioner can use to jump start his business which can also help existing clinics get more leads and maybe switch in a more cost effective way to run the marketing component of the business. The importance of automation in the marketing world in handling communication with possible leads and existing clients. Tools you can use to handle seminars and gather data of attendees and use these data for your business analytics. The benefits and disadvantages of having landing pages and click funnels, and again, alternatives to these tools and how to optimize its functions. How testimonials are a boon to any business. Crucial Takeaways: As clinic management software (EMR) are “closed” tools to managing an office, the opportunity to integrate an automation tool to enhance processes such as booking patients is out of the question. Having an independent automated system outside of an EMR significantly improve patient follow-ups, giving patient education, setting appointments, marketing and advertising seminars to name a few. Automated system programs can generate data through integrated tools regarding attendees, for instance, in seminars: number of sign-ups, attendees, people who booked an appointment and no shows. Where data gathered can be used to marketing subsequent events such as trainings, seminars and could be used to reinject no-shows into the process and so on. Clinic management systems are inadequate tools for lead generations and sales and do not have the capability to get new patients easily. There is a vast number of tools that can sell services without storing any medical information so that your Health Insurance Portability and Accountability Act (HIPAA) does not come into question CRM software like Infusionsoft, which performs automation among other things, has other more cost-effective and, technically speaking, has steep learning curve alternative, Pipedrive, that Kelsey will discuss into detail with tools that you can integrate on it as needs present. Adding testimonials through surveys to a website is extremely effective into building your business. Surveys contain personal information which you can use as testimonials and, with a CRM, can be posted on your website in an automated manner. Kelsey advices not to use a dollar store hosting like GoDaddy as you are not going to get good tools and resources to run your website. If, for other reason, you want to stay on a dollar store hosting you can switch out DNS service to optimize your website and improve performance. There are tools that you can be integrated into clinic management software alternatives like Pipedrive that can use VoIP (Voice over Internet Protocol) which are more cost-effective instead of buying a hardware service for your company's calling and SMS text
Today’s interview is with Jeffrey Cochran, Human Resource Consultant (https://www.hrperspectives.org/), and will cover Human Resource Law compliance. Jeffrey specializes in working with small companies. The initial interview covered legal classifications for work performed, https://www.ctrchg.com/0002-wwc-are-you-a-solopreneur-or-an-employee/, and assessing if one is a solopreneur or actually an employee. Jeffrey will talk about the alphabet soup of government regulations. He starts with a caution to all employers when it comes to Human Resource law, if it isn’t documented it doesn’t exist and never occurred. It is important to keep good records. Today’s conversation will go back and forth between strategic and tactical considerations. Future podcasts will drive to deeper detail. One point of confusion is that not only can there be differences between federal, state, and local laws a given law may have contradictory terms within it. Laws frequently don’t get vetted properly before being passed. Having an expert familiar with the regulations and their variances can give one peace of mind. Common regulatory cutoffs are based on the number of employees a company has. But going against even this approach is the Fair Labor Standards Act (FLSA) which requires compliance if any of the following criteria are met: • If a Federal, State, or Local organization • If a medical service organization • educational institutions from pre-school to university • revenues for an annual report. If over $500,000 in revenue These criteria can change over time so it is important to keep track of FLSA and other HR laws. FLSA has an exempt/non-exempt test which looks primarily at whether or not hourly employees are being paid properly, e.g., overtime. Keep in mind the break point between hourly and salary can change over time. This means an employee may have been categorized as exempt, “salary,” but an increase in the point that separates hourly from salary may throw that employee into the non-exempt, “hourly,” category. This means overtime may need to be paid where it wasn’t before. A ripple effect may be re-organizing the company to save money. Jeffrey recommends following the guidelines for larger organizations even if you currently are exempt. This way, when you do grow past that tipping point your organization is already in compliance and an HR upheaval is avoided. Employee count is important as well. One to fourteen being the size of “small business.” The Immigration Reform and Control Act (IRCA) requires filing an I-9 for every employee hired. It declares they are legal to work in the United States. It is easy to fill it out incorrectly. Fines can range from $178 to $3563. The Employment Retirement Income Security Act (ERISA) requires giving any retirement plan or benefits program information to all employees. This helps protect employees. The Federal Insurance Contribution Act (FICA) is another area. Using a qualified payroll company should take care of this. The Equal Employment Opportunity Commission (EEOC) insure employees aren’t discriminated against. This includes the Equal Pay Act (EPA) saying that male and female employees must be paid the same amount for the same job. To explain the current pay discrepancy between men and women requires a separate podcast where we can dive deeper. Experience and/or tenure can be one explanation, i.e., a male employee may have 10 years with a company and the female employee with similar position may have only 1 year. Keep in mind that once your company exceeds 100 employees the EEOC collects information on position/salary/gender looking for discrimination. They do not look at tenure. Make sure to have your documentation in order. Having a defined payroll structure prior to hiring helps avoid a lot of issues associated with EEOC. Fast-moving companies may want to consider retaining a fractional HR consultant who can take care of these issues and you can stay focused on your core competencies. Family-owned businesses need to make sure that relatives and non-relatives are treated equally in terms of employment and compensation. Other acts include: • The Fair and Accurate Credit Transaction Act - dispose carefully of consumer credit information • The Employee Polygraph Protection Act - can’t use a lie-detector on employees except in certain extreme circumstances. • The Health Insurance Portability and Accountability Act (HIPAA) - protects medical information of individuals. If information is gained through another legal entity, e.g., workman’s compensation, then you can’t talk about it. ⁃ It’s best to keep medical information in separate files from, say, employee reviews, to insure medical information is kept confidential. • Workmen’s Compensation - even with 1 employee Workmen’s Comp must be paid. All states, except for Ohio, allow companies to provide Workmen’s Compensation Insurance through private insurance. Ohio’s plan is state funded. With 11 employees OSHA requires posting your OSHA 300 Log. It shows the accidents you’ve had over that last 12 months. All fo the above gets added to as the number of employees increases. With 15 or more employees ADA, GINA, and Title 7 are added: • Americans With Disabilities Act (ADA) - can get a job if they can do the job with or without reasonable accommodations. Having a good job description is important. Pregnant women can be included in ADA. It’s primarily designed, though, for a chronic situation. If a substantial material cost would be incurred for the disabled person to work then there is no requirement to employ them. General access to a facility does require being ADA-compliant. • Genetic Information Non-Disclosure Act (GINA) - an employer cannot discriminate against an employee based on genetic information, e.g., a family history of cancer. • Title 7 - Prohibits sexual harassment and other forms of sex discrimination in the work place. It also covers race, religion, color, and national origin. This works in conjunction with the Equal Pay Act (EPA) mentioned above. With 20 or more employees: • Age Discrimination and Employment Act (ADEA) - Employees or applicants 40 or older cannot be discriminated against. • Consolidated Omnibus Budget Reconciliation Act (COBRA) - Continuation of benefits. If company-funded health plan can continue for 18 months with plan by paying full premium. Irony is there’s no requirement to have insurance until 50 employees but if you have 40 or more and are providing insurance then you must have COBRA. Must give notification you provide COBRA when an employee joins and when they leave. It’s important to inform the employee as dictated by COBRA guidelines. Jeffrey has a schedule document he updates with changes to any of the laws and makes sure his clients are aware of the information. Jeffrey works as a fractional HR consultant and gives them full-service at a much lower cost than having a full-time HR person. With 50 or more employees • The Affordable Care Act (ACA) - have to apply affordable insurance to all employees. The insurance is considered affordable if its cost is less than 9.9% of their total monthly income for the lowest plan. If too good of a plan is provided your company will be assessed a Cadillac tax. • Family Medical Leave Act (FMLA) - Family member or significant other may require an employee to take leave. This act protects their position. This has been covered to include military assignments. There is an Intermittent FMLA. It all can be quite time consuming. If you have multiple locations there has to be 50 or more at a given location for FMLA to apply. If multiple locations within 75 miles of each other and a total of 50 or more employees across those locations then FMLA applies. • Affirmative Action Program (AAP) - are specific to government contracts and subcontractors as well as some other employers. Working with an HR consultant can minimize the time you need to spend on HR legal concerns while keeping your costs down. Jeffrey mentioned in passing concerns when you have 100 or more employees. That will be addressed in a future podcast. He wrapped up the interview by reviewing all the points covered.’ For more information you can contact Jeffrey at: https://www.hrperspectives.org/ (c) 614-565-8073 jcochran@hrperspectives.org For more information on the “8 Steps From Chaos To Clarity and Calm: CEO Advanced Training” go to https://www.ctrchg.com/ceo-advanced-training/ Your feedback is important. Choose from the following options: • place a review in iTunes, • click on “leave a comment” below, • send any comments along with your name and the show number to support@ctrchg.com or • call us at 614-388-8917 and leave a message including your name, the podcast number and podcast title. Listen to future episodes for our reply.
In this episode, Dr. Christina Armstrong and Dr. Julie Kinn discuss ethical issues in the use of mobile apps in clinical care. As clinicians, it is critical for us to think potential ethical scenarios through so that we can prevent any ethical blunders. To view captions for this podcast, please access this episode via our YouTube channel (https://www.youtube.com/watch?v=WJ1dkedkL-M) DHA Connected Health Defense Health Agency https://health.mil/podcasts dha.connected-health@mail.mil Twitter: @DHAConnected (https://twitter.com/DHAConnected) Facebook: https://www.facebook.com/DHAConnectedHealth Next Generation Behavioral Health is produced by the Defense Health Agency (https://health.mil/). Learn more about Military Health Podcasts at http://t2health.dcoe.mil/military-health-podcasts. Music by BenSound (http://bensound.com). References for this episode: American Psychological Association (2010). Ethical Principles of Psychologists and Code of Conduct. Washington, DC: American Psychological Association. American Psychological Association. (2013) Guidelines for the Practice of Telepsychology: Joint Task Force for the Development of Telepsychology Guidelines for Psychologists. American Psychologist, 68 (9), 791-800. Armstrong, C. M., Edwards-Stewart, A., Ciulla, R. P., Bush, N. E., Cooper, D. C., Kinn, J. T., Pruitt, L. D., Skopp, N. A., Blasko, K. A., & Hoyt, T. V. (2017). Department of Defense Mobile Health Practice Guide, third edition. Connected Health Branch, Defense Health Agency, U.S. Department of Defense. Health Insurance Portability and Accountability Act (HIPAA), 42 U.S.C. § 300gg; 29 U.S.C. § 1181 et seq.; 42 U.S.C. 1320d et seq. (1996). Health Insurance Portability and Accountability Act (HIPAA) Security Rule, 45 C.F.R. Parts 160, 164 (Subparts A and C). Health Information Technology for Economic and Clinical Health Act 2 U.S.C. § 300jj et seq.; § 17901 et seq. (2009). Joint Task Force for the Development of Telepsychology Guidelines for Psychologists (2013). Guidelines for the practice of telepsychology, American Psychologist, 68, 791-800. Jones, N., & Moffitt, M. (2016). Ethical guidelines for mobile app development within health and mental health fields. Professional Psychology: Research and Practice, 47(2), 155-162. Karcher, N. R., & Presser, N. R. (2016). Ethical and legal issues addressing the use of mobile health (mHealth) as an adjunct to psychotherapy. Ethics & Behavior, 00, 1-22.
Carson Martinez: Health Data Privacy 101 (Ep. 134) Bio Carson Martinez (@CarsonMart) is the Future of Privacy Forum’s Health Policy Fellow. Carson works on issues surrounding health data, particularly where it is not covered by the Health Insurance Portability and Accountability Act (HIPAA). These non-HIPAA health data issues include consumer-facing genetics companies, wearables, medical “big data”, and medical device surveillance. Carson also assists with the operation of the Genetics Working Group. Carson was previously an Intern at Intel with the Government and Policy Group, working on health, technology, and policy. Before joining Intel, she was an intern for the International Neuroethics Society, and a Research Assistant for both the Data-Pop Alliance and New York University. Carson graduated from Duke University with a Master’s Degree in Bioethics and Science Policy with a concentration in Technology and Data Policy. She earned her Bachelor’s Degree in Neuroscience with minors in Philosophy and Psychology from New York University. Carson is also a Certified Information Privacy Professional/United States (CIPP/US). Resources Future of Privacy Forum When Breath Becomes Air by Paul Kalanithi News Roundup Trump considers re-joining the Trans-Pacific Partnership Erica Werner, Damian Paletta and Seung Min Kim reported for the Washington Post that President Trump has ordered officials to look into the possibility of re-joining the Trans-Pacific Partnership –that’s the trade partnership between eleven nations, including Japan, Vietnam and Singapore. The Obama administration had signed the agreement, and Mexico and Canada are participating. But Trump backed out. Now he wants back in, presumably to gain negotiating leverage against China. U.S./UK Accuse Russians of hacking home routers There are fresh allegations today from British and American officials regarding Russia’s spying program. Apparently, Russians may have hacked routers belonging to small businesses and home offices. British intelligence, the National Security Council, DHS and the FBI made the announcement saying they had “high confidence” that Russia led cyberattacks into internet service providers, network routers, government and critical infrastructure. You can find the report in Forbes. FCC’s Pai won’t investigate Sinclair Remember the viral video from a few weeks ago in which news anchors on Sinclair TV stations around the country were reading the exact same script? Well, despite the request from 11 Democratic Senators plus Bernie Sanders, who is an Independent, to investigate Sinclair for distorting new coverage, FCC Chairman Ajit Pai has declined. He cites the First Amendment. The FCC’s inspector general is currently investigating Pai for improperly paving the way for Sinclair’s acquisition of Tribune Media. Brett Samuels reports in The Hill. Apple warns employees about leaking Mark Gurman reports in Bloomberg on a leaked memo from inside Apple to employees warning them about leaks. The company threatened legal action and criminal charges and indicated that it caught 29 leakers last year, 12 of which were arrested. New paper finds women find chilly environment in tech companies A new paper out of the Clayman Institute for Gender Research and Stanford University finds that more women are earning STEM degrees. But they are finding the tech companies in which they find jobs to be stifling environments. Contributing to the chilly environments women technologists often find themselves in are the overt usage of gender stereotypes, an exclusive “geek” culture and other factors that discourage some women from advancing in tech.
In this episode, Margaret Westbrook discusses privacy issues that may affect health care providers when filing proofs of claim in the bankruptcy court. Given the potential for public access of these records, it is important that filing entities be aware of disclosure requirements under both the Health Insurance Portability and Accountability Act (“HIPAA”) and the federal rules of bankruptcy procedure. This episode will discuss these privacy requirements in greater detail and suggest certain best practices to ensure information is properly redacted to limit the risks of identity theft for individuals and potential damages for filing entities in breach of privacy rules. Presenter: Margaret R. Westbrook Download Presentation Materials
In the second episode of our series on the national opioid crisis, Gina Bertolini discusses the overlay of recent guidance concerning privacy laws such as the Health Insurance Portability and Accountability Act (HIPAA) and the Confidentiality of Substance Use Disorder Patient Records (Part 2) regulations and how they are interpreted with regard to opioid treatment. While the HIPAA Privacy Rule generally restricts the sharing of patient information, there are certain circumstances particularly relevant in the drug overdose and treatment context that allow for permissive disclosure without prior authorization. Presenter: Gina L. Bertolini Download Presentation Materials
The JP Morgan Healthcare Conference was held in San Francisco from January 8th = 11th 2018. in this interview Andre Berger MD, CEO of National ACO a best in class performing Next Generation Model ACO chats with Stephen Bernstein, Global Head of the Healthcare Practice at McDermott, WIll & Emery LLP. Follow on twitter via @McDermottLaw. More about Stephen: Stephen W. Bernstein specializes in e-health, “big data,” deployment of electronic health record systems and health-related matters affected by the internet and the Health Insurance Portability and Accountability Act (HIPAA), as well as private equity investments, mergers, acquisitions, affiliations and joint ventures involving technology, hospitals and physicians. Stephen is the global head of McDermott's Health Practice. Enjoy!
The 'go-to' investor healthcare conference of the year is the JP Morgan Healthcare Conference held in San Francisco from January 8th = 11th 2018. in this interview Andre Berger MD, CEO of National ACO a best in class performing Next Generation Model ACO chats with Stephen Bernstein, Global Head of the Healthcare Practice at McDermott, WIll & Emery LLP. Follow on twitter via @McDermottLaw. More about Stephen: Stephen W. Bernstein specializes in e-health, “big data,” deployment of electronic health record systems and health-related matters affected by the internet and the Health Insurance Portability and Accountability Act (HIPAA), as well as private equity investments, mergers, acquisitions, affiliations and joint ventures involving technology, hospitals and physicians. Stephen is the global head of McDermott's Health Practice. Stephen has particular experience working with regional electronic health record collaborations as well as pharmaceutical, biotech, device companies, technology companies, health care providers and insurers concerning uses of health information for clinical and database research, product/disease registries and marketing matters, electronic health record development and implementation, including the ways these endeavors relate to personalized medicine. Enjoy!
Learn how to effectively use AWS automation for healthcare compliance. In this session, Verge Health (SaaS provider for practitioner management, organizational compliance, and patient and employee safety) discusses how they moved their risk management platform, supporting over 13,000 hospitals, to AWS. Because Verge Health, as a partner to healthcare organizations, is subject to Health Insurance Portability and Accountability Act (HIPAA), it worked with AWS Partner Network (APN) Advanced Partner Cloudticity to significantly increase their security, availability, performance, HIPAA compliance, and agility, while simultaneously reducing cost through fully automated DevSecOps on AWS. The session focuses on resilient architecture for HIPAA compliance, automated migration techniques for data and VPN connections, and the automation of daily tasks, such as deployments and patching.
In this episode, Dana Kuhn, CEO of Patient Services Inc. (PSI), joins host Suzette DiMascio, CHE, CMCE, CPC, for an in-depth discussion on how nonprofit organizations are helping financially disadvantaged patients access and afford specialty pharmacy treatment. Dana Kuhn, Ph.D., founded Patient Services, Inc. 27 years ago. Before the passage of important health care legislation such as the Health Insurance Portability and Accountability Act (HIPAA), the Medicare Modernization Act (MMA), and the Affordable Care Act (ACA), there was PSI.
Dan Goldman (@danielg280), Mayo Clinic and Advisory Board member to the Mayo Clinic Center for Social Media, discusses the Health Insurance Portability and Accountability Act (HIPAA) and social media. The Mayo Clinic has been at the forefront of the use of social media for marketing communication since the dawn of social networking. Most other healthcare… The post Mayo Clinic Lawyer Explains HIPAA and Social Media appeared first on Eric Schwartzman.
Many patients with cancer are apprehensive about genetic testing. They fear it will result in discrimination by health insurance companies and employers. In her lecture, “Legal Issues in Genetic Testing for Hereditary Breast and Ovarian Cancer,” Kaylene Ready, a certified genetic counselor, describes two key laws that protect against genetic discrimination: Genetic Information Non-discrimination Act (GINA) and the Health Information Portability and Accountability Act (HIPAA).
Many patients with cancer are apprehensive about genetic testing. They fear it will result in discrimination by health insurance companies and employers. In her lecture, “Legal Issues in Genetic Testing for Hereditary Breast and Ovarian Cancer,” Kaylene Ready, a certified genetic counselor, describes two key laws that protect against genetic discrimination: Genetic Information Non-discrimination Act (GINA) and the Health Information Portability and Accountability Act (HIPAA).
James M. Jordan is the former Chief Privacy Leader and Senior Counsel for E-Commerce & Information Technology of General Electric Company, where he led GE's pioneering initiative to implement Binding Corporate Rules for the transfer of personal data from Europe. His law firm, Jordan Legal Counsel, P.C., serves as co-counsel to Crowell & Moring's Privacy and Data Protection Group, focusing on privacy and personal data protection issues. He teams with lawyers from the firm's European offices to assist clients in complying with the European Union Data Protection Directive, ePrivacy Directive and eCommerce Directive, implementation of global privacy programs, and cross-border transfers of personal data pertaining to employees, customers and suppliers. He also advises clients on compliance with U.S. laws pertaining to privacy, electronic marketing and e-commerce, including the FTC Act, CANSPAM Act, Fair Credit Reporting Act (FCRA), Gramm-Leach-Bliley Act (GLBA), Children's Online Privacy Protection Act (COPPA), Health Insurance Portability and Accountability Act (HIPAA), Privacy Act of 1974, and state identity theft and security breach disclosure laws.
Black Hat Briefings, Las Vegas 2005 [Audio] Presentations from the security conference
In the last year, there have been 45 security incidents compromising the personal information of 9.3 million individuals. What can we do given our current situation? How are we going to successfully secure personal information moving forward? This panel will discuss the future of personal information and its implications on privacy. Joseph Ansanelli is CEO of Vontu, a software company focused on the insider threat. Joseph has spoken to Congress twice in the past twelve months as an advocate of privacy and consumer data standards. Mr. Ansanelli has successfully co-founded and led two other companies and has an extensive track record of developing innovative solutions into successful companies. His first venture, Trio Development's Claris Organizer, was ultimately acquired by Palm, Inc. Mr. Ansanelli holds four patents and received a B.S. in Applied Economics from the Wharton School at the University of Pennsylvania Rich Baich, CISSP, CISM, Chief Information Security Officer, ChoicePoint. Mr. Baich has been working in the Information Security Business for over 10 years and has extensive experience working with government and commercial executives providing risk management and consultative council while developing, improving and implementing security architecture, solutions and policies. He has held security leadership positions as the Cryptolog Officer for the National Security Agency (NSA), Sr. Director Professional Services at Network Associates (now McAfee) and after 9/11 as the Special Assistant to the Deputy Director for the National Infrastructure Protection Center (NIPC) at the Federal Bureau of Investigation (FBI). Rich is the author of a security executive leadership guidebook, Winning as a CISO. The book is the first-of-its-kind to detail and provide the roadmap to transform security executives from a technical and subject matter expert to a comprehensive well-rounded business executive. He holds a BS from United States Naval Academy, MBA / MSM from University of Maryland University College, and has been awarded the National Security Telecommunications and Information Systems Security (NSTISSI) 4011 Certification and the NSA sponsored Information Systems Security (INFOSEC) Assessment Methodology (IAM) Certification. Adam Shostack is a privacy and security consultant and startup veteran. Adam worked at Zero-Knowledge building and running the Evil Genius group of advanced technology experts, building prototypes and doing research into future privacy technologies, including privacy enhancing networks, credentials, and electronic cash. He has published papers on the security, privacy, as well as economics, copyright and trust. Shostack sits on the Advisory Board of the Common Vulnerabilities and Exposures initiative, the Technical Advisory Board of Counterpane Internet Security, Inc and others. Adam is now an independent consultant. Paul Proctor is a vice president in the security and risk practice of Gartner Research. His coverage includes Legal and Regulatory Compliance, Event Log Management, Security Monitoring (Host/Network IDS/IPS), Security Process Maturity Risk Management Programs, Forensics and Data Classification. Mr. Proctor has been involved in information security since 1985. He was founder and CTO of two security technology companies and developed both first- and second-generation, host-based intrusion-detection technologies. Mr. Proctor is a recognized expert in the field of information security and associated regulatory compliance issues surrounding the Health Insurance Portability and Accountability Act (HIPAA), Sarbanes-Oxley, and the Gramm-Leach-Bliley Act (GLBA). He has authored two Prentice Hall books and many white papers and articles. Mr. Proctor is an accomplished public speaker and was recognized for his expertise by being appointed to the original Telecommunications Infrastructure Protection working group used by Congress to understand critical infrastructure protection issues prior to the terrorist attack of Sept. 11. Previously, he worked for SAIC, Centrax, CyberSafe, Network Flight Recorder and Practical Security.
Black Hat Briefings, Las Vegas 2005 [Video] Presentations from the security conference
In the last year, there have been 45 security incidents compromising the personal information of 9.3 million individuals. What can we do given our current situation? How are we going to successfully secure personal information moving forward? This panel will discuss the future of personal information and its implications on privacy. Joseph Ansanelli is CEO of Vontu, a software company focused on the insider threat. Joseph has spoken to Congress twice in the past twelve months as an advocate of privacy and consumer data standards. Mr. Ansanelli has successfully co-founded and led two other companies and has an extensive track record of developing innovative solutions into successful companies. His first venture, Trio Development's Claris Organizer, was ultimately acquired by Palm, Inc. Mr. Ansanelli holds four patents and received a B.S. in Applied Economics from the Wharton School at the University of Pennsylvania Rich Baich, CISSP, CISM, Chief Information Security Officer, ChoicePoint. Mr. Baich has been working in the Information Security Business for over 10 years and has extensive experience working with government and commercial executives providing risk management and consultative council while developing, improving and implementing security architecture, solutions and policies. He has held security leadership positions as the Cryptolog Officer for the National Security Agency (NSA), Sr. Director Professional Services at Network Associates (now McAfee) and after 9/11 as the Special Assistant to the Deputy Director for the National Infrastructure Protection Center (NIPC) at the Federal Bureau of Investigation (FBI). Rich is the author of a security executive leadership guidebook, Winning as a CISO. The book is the first-of-its-kind to detail and provide the roadmap to transform security executives from a technical and subject matter expert to a comprehensive well-rounded business executive. He holds a BS from United States Naval Academy, MBA / MSM from University of Maryland University College, and has been awarded the National Security Telecommunications and Information Systems Security (NSTISSI) 4011 Certification and the NSA sponsored Information Systems Security (INFOSEC) Assessment Methodology (IAM) Certification. Adam Shostack is a privacy and security consultant and startup veteran. Adam worked at Zero-Knowledge building and running the Evil Genius group of advanced technology experts, building prototypes and doing research into future privacy technologies, including privacy enhancing networks, credentials, and electronic cash. He has published papers on the security, privacy, as well as economics, copyright and trust. Shostack sits on the Advisory Board of the Common Vulnerabilities and Exposures initiative, the Technical Advisory Board of Counterpane Internet Security, Inc and others. Adam is now an independent consultant. Paul Proctor is a vice president in the security and risk practice of Gartner Research. His coverage includes Legal and Regulatory Compliance, Event Log Management, Security Monitoring (Host/Network IDS/IPS), Security Process Maturity Risk Management Programs, Forensics and Data Classification. Mr. Proctor has been involved in information security since 1985. He was founder and CTO of two security technology companies and developed both first- and second-generation, host-based intrusion-detection technologies. Mr. Proctor is a recognized expert in the field of information security and associated regulatory compliance issues surrounding the Health Insurance Portability and Accountability Act (HIPAA), Sarbanes-Oxley, and the Gramm-Leach-Bliley Act (GLBA). He has authored two Prentice Hall books and many white papers and articles. Mr. Proctor is an accomplished public speaker and was recognized for his expertise by being appointed to the original Telecommunications Infrastructure Protection working group used by Congress to understand critical infrastructure protection issues prior to the terrorist attack of Sept. 11. Previously, he worked for SAIC, Centrax, CyberSafe, Network Flight Recorder and Practical Security.