Podcasts about privacy practices

  • 33PODCASTS
  • 36EPISODES
  • 48mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Jun 28, 2024LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about privacy practices

Latest podcast episodes about privacy practices

Group Practice Tech
Episode 423: New HIPAA Privacy Final Rule to Support Reproductive Health Care Privacy

Group Practice Tech

Play Episode Listen Later Jun 28, 2024 14:29


Welcome solo and group practice owners! We are Liath Dalton and Evan Dumas, your co-hosts of Group Practice Tech.   In our latest episode, we're sharing information about updated HIPAA rules regarding privacy around discussions regarding reproductive health.   We discuss important dates to be aware of; the main bullet points of the Final Rule; the impact Notice of Privacy Practices; what is and is not acceptable to disclose, and when; understanding the implications of this rule; and related resources on this topic from PCT.   Listen here: https://personcenteredtech.com/group/podcast/   For more, visit our website. Resources HIPAA Privacy Rule Final Rule to Support Reproductive Health Care Privacy: Fact Sheet HIPAA Privacy Rule to Support Reproductive Health Care Privacy [Final Rule] PCT Resources PCT CE training: Law & Ethics Of Clinical Documentation For A Post Roe World (1 legal-ethical CE credit hour, on-demand training) Group Practice Care Premium weekly (live & recorded) direct support & consultation service, Group Practice Office Hours -- includes monthly session with therapist attorney, Eric Ström, JD PhD LMHC + assignable staff HIPAA Security Awareness: Bring Your Own Device training + access to Device Security Center with step-by-step device-specific tutorials & registration forms for securing and documenting all personally owned & practice-provided devices (for *all* team members at no per-person cost) + assignable staff HIPAA Security Awareness: Remote Workspaces training for all team members + access to Remote Workspace Center with step-by-step tutorials & registration forms for securing and documenting Remote Workspaces (for *all* team members at no per-person cost) + more

Group Practice Tech
Episode 418: 4 Things You Need to Know About Psychotherapy Notes

Group Practice Tech

Play Episode Listen Later May 27, 2024 28:53


Welcome solo and group practice owners! We are Liath Dalton and Evan Dumas, your co-hosts of Group Practice Tech.   In our latest episode, we share 4 important considerations for psychotherapy notes in a group practice context.   We discuss what notes are protected from release; how to quickly find out what your state's rules are; what to include in your Notice of Privacy Practices about psychotherapy notes; what psychotherapy notes are and are not; having policies in place for documentation; where misconceptions about documentation come from; and how to support your team with documentation.   Listen here: https://personcenteredtech.com/group/podcast/   For more, visit our website. Resources JD Supra Article: HIPAA. Psychotherapy Notes, and Other Mental Health Records HHS' Model Notice of Privacy Practices (NBB, see the customization instructions for state specific components & psychotherapy notes) PCT Resources PCT CE course: Rethinking Notes, Strategies for Making Documentation Simple & Meaningful (2 legal-ethical CE) -- great training for both leadership & all clinical staff Group Practice Care Premium weekly (live & recorded) direct support & consultation service, Group Practice Office Hours + assignable staff HIPAA Security Awareness: Bring Your Own Device training + access to Device Security Center with step-by-step device-specific tutorials & registration forms for securing and documenting all personally owned & practice-provided devices (for *all* team members at no per-person cost) + assignable staff HIPAA Security Awareness: Remote Workspaces training for all team members + access to Remote Workspace Center with step-by-step tutorials & registration forms for securing and documenting Remote Workspaces (for *all* team members at no per-person cost) + more HIPAA Risk Analysis & Risk Mitigation Planning service for mental health group practices -- care for your practice using our supportive, shame-free risk analysis and mitigation planning service. You'll have your Risk Analysis done within 2 hours, performed by a PCT consultant, using a tool built specifically for mental health group practice, and a mitigation checklist to help you reduce your risks.

The Compliance Divas Podcast
#112 HIPAA Hang Ups in Dental Practices

The Compliance Divas Podcast

Play Episode Listen Later Jun 28, 2023 24:15


Recent dealings with the Office of Civil Rights' HIPAA investigator provides insight on some of the first things the investigative lawyer looks for.  This episode will assist you in making sure you have basic elements in place for the HIPAA Privacy Rule, such as the Notice of Privacy Practices.How to make a complaint:  https://bit.ly/3JGWg35Model NPP required elements:  https://bit.ly/3ptpgo5Upcoming Changes to the NPP  https://bit.ly/3NzJd4LOCR Enforcement: https://bit.ly/3NTzVBU https://www.thecompliancedivas.com

Group Practice Tech
Episode 313: [HIPAA] Compliance Considerations for Your Practice Website

Group Practice Tech

Play Episode Listen Later Mar 31, 2023 34:18


Welcome solo and group practice owners! We are Liath Dalton and Evan Dumas, your co-hosts of Group Practice Tech. In our latest episode, we take a look at how to keep established and potential client info safe and secure on your website.  We discuss the BetterHelp debacle and lessons we can learn from it; contact forms on websites; what qualifies as PHI; where PHI gets collected through websites; how to set up a secure contact form; HIPAA friendly vs. secure email communication; requests for non secure communication; secure form options; what to include in HIPAA Notice of Privacy Practices; Good Faith Estimates; whether tracking technologies and Google Analytics are permissible; and what is and isn't included in Google's BAA. Listen here: https://personcenteredtech.com/group/podcast/ For more, visit our website. Relevant Resources & Info From Other Sources JD Supra article on the issues with Better Help & HIPAA lessons learned -- Better Keep Health Data Private, FTC Signals to On-Line Health Care Providers HHS Model Notice of Privacy Practices JD Supra's excellent explanation of Psychotherapy Notes HHS Office of Civil Rights  bulletin on Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates Google on HIPAA & Google Analytics Easy Opt Out of Google Analytics (on Google Analytics 4) PCT Resources   PCT's Google Workspace Configuration Learning Center  Free access! Including a free training, Making Practice Life Easier & More Efficient with Google Workspace, and checklist)  *see the tutorial in the Miscellaneous Tips section: Misc Tip: How to Create a Contact Form (and put it on your website too!) Need to select a secure form (or secure email) service? Use PCT's free Service Selection Workbook & Worksheet for Group Practices PCT's Sample Contact Form Conventional Non-Secure Communications Acknowledgement/Opt-In Language PCT's Group Practice Care Premium service with Group Practice Office Hours direct support and consultation service + support and team management systems to manage device security, remote workspace security, HIPAA and ethics trainings for group practices

Tech Over Tea
You Have Terrible Data Privacy Practices | Trafotin

Tech Over Tea

Play Episode Listen Later Feb 22, 2023 142:22


Today we're chatting with Trafotin, a small tech vtuber who covers a lot of the incredibly boring tech conferences and makes them actually enjoyable with fun commentary and tech bingo. ==========Guest Links========== YouTube: https://www.youtube.com/@Trafotin Mastodon: https://vt.social/@trafotin Twitter: https://twitter.com/trafotin Links: https://gitlab.com/trafotin/media/-/blob/master/links.md ==========Support The Show========== ► Patreon: https://www.patreon.com/brodierobertson ► Paypal: https://www.paypal.me/BrodieRobertsonVideo ► Amazon USA: https://amzn.to/3d5gykF ► Other Methods: https://cointr.ee/brodierobertson =========Video Platforms==========

Surveillance Report
Ex-Twitter Exec Exposes Awful Privacy Practices! - SR101

Surveillance Report

Play Episode Listen Later Aug 28, 2022 36:06


Twitter is in Hot water, Apple and Facebook are more private than Google?!, lots of data breaches – including some breached Authy accounts, and a lot more. (Sorry for Henry's clipping this week!) Welcome to the Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest security & privacy news. Support The Podcast Support us on Patreon: https://www.patreon.com/surveillancepod Monero: 46iGe5D49rpgH4dde32rmyWifMjw5sHy7V2mD9sXGDJgSWmAwQvuAuoD9KcLFKYFsLGLpzXQs1eABRShm1RZRnSy6HgbhQD Timestamps SR101 Sources: https://github.com/techlore/channel-content/blob/master/Surveillance%20Report%20Sources/SR101.md 00:00 Introduction00:21 Support us!01:16 Highlight Story03:47 Data Breaches10:04 Companies20:09 Research26:14 Politics27:40 Misfits30:02 Q&A34:46 Outro35:13 Support us! Main SitesTechlore Website: https://techlore.tech The New Oil Website: https://thenewoil.org/ Surveillance Report Podcast: https://www.surveillancereport.tech/ Odysee: https://odysee.com/@surveillancereport:2 PeerTube: https://apertatube.net/c/surveillancereport/videos

The Modern Therapist's Survival Guide with Curt Widhalm and Katie Vernoy
Who's in the Room? Siri, Alexa, and Confidentiality

The Modern Therapist's Survival Guide with Curt Widhalm and Katie Vernoy

Play Episode Listen Later Jan 17, 2022 29:19


Who's in the Room? Siri, Alexa, and Confidentiality Curt and Katie chat about how therapists can maintain confidentiality in a world of AI assistants and smart devices. What duty do clinicians have to inform clients? How can we balance confidentiality with the reality of how commonly these devices are involved in therapy? Can telehealth therapy be completely confidential and data secure? We discuss our shift in clinical responsibility, best practices, and how we can minimize exposure of clinical data to ensure the confidentiality our clients expect and deserve. In this podcast episode we talk about something therapists might not consider: smart devices and AI assistants We received a couple of requests to talk about the impact of smart devices on confidentiality and their compliance with HIPAA within a therapeutic environment. We tackle this question in depth: What are best practices for protecting client confidentiality with smart devices? Turning off the phone, or placing the phone on “airplane mode” Warning clients about their own smart devices and confidentiality risks The ethical responsibilities to inform about limits of confidentiality and take precautions It's all about giving clients choice and information What should therapists consider when smart devices and AI assistants are in the room? “It's not to say we have to be luddites, it's that we have to disclose the potential limits of confidentiality that clients have come to expect.”  – Curt Widhalm Whistle-blower reports on how often these devices are actually listening Turning off your phone is a lot cheaper than identity theft Consider your contacts, geolocation, and Wi-Fi connection Some of this, as we progress into a more technological world, might be unavoidable How do Alexa and Siri impact HIPAA compliance for therapists? The importance of end-to-end encryption for all HIPAA activities (and your smart device may not be compliant) The cost of HIPAA violations if identity theft can be traced back Understand the risks you are taking, do what you can, and remember no one is perfect What can modern therapists do with their smart devices? “Whether it's convenience or practicality that has you putting your client's contacts into your phone, we have to think beyond that because it really can harm our ability to keep that data safe.” – Katie Vernoy GPS location services can be left on for a safety reason, emergency services use GPS location Adjusting settings for voice activation, data sharing, when apps are running, locations, etc. Turning off and airplane mode are also options Always let the client know the limits of confidentiality Our Generous Sponsor for this episode of the Modern Therapist's Survival Guide: Buying Time LLC Buying Time is a full team of Virtual Assistants, with a wide variety of skill sets to support your business. From basic admin support, customer service, and email management to marketing and bookkeeping. They've got you covered. Don't know where to start? Check out the systems inventory checklist which helps business owners figure out what they don't want to do anymore and get those delegated asap. You can find that checklist at http://buyingtimellc.com/systems-checklist/ Buying Time's VA's support businesses by managing email communications, CRM or automation systems, website admin and hosting, email marketing, social media, bookkeeping and much more. Their sole purpose is to create the opportunity for you to focus on supporting those you serve while ensuring that your back office runs smoothly. With a full team of VA's it gives the opportunity to hire for one role and get multiple areas of support. There's no reason to be overwhelmed with running your business with this solution available. Book a consultation to see where and how you can get started getting the support you need - https://buyingtimellc.com/book-consultation/ Resources for Modern Therapists mentioned in this Podcast Episode: We've pulled together resources mentioned in this episode and put together some handy-dandy links. Please note that some of the links below may be affiliate links, so if you purchase after clicking below, we may get a little bit of cash in our pockets. We thank you in advance! Psychotherapy in Ontario: How Confidential is my Therapy? By Beth Mares, Registered Psychotherapist The Privacy Problem with Digital Assistants by Kaveh Waddell Hey Siri and Alexa: Let's Talk Privacy Practices by Elizabeth Weise, USA Today Patient and Consumer Safety Risks When Using Conversational Assistants for Medical Information: An Observational Study of Siri, Alexa, and Google Assistant, 2018 Hey Siri: Did you Break Confidentiality, or did I? By Nicole M. Arcuri Sanders, Counseling Today Alexa, Siri, Google Assistant Not HIPAA Compliant, Psychiatry Advisor Hey Alexa, are you HIPAA compliant? 2018 Person-Centered Tech   Relevant Episodes of MTSG Podcast: Which Theoretical Orientation Should You Choose? Is Your Practice Ready for Paid Digital Marketing? An Interview with John Sanders Waiving Goodbye to Telehealth Progress: An interview with Dr. Ben Caldwell, LMFT Malpractice is No Joke   Who we are: Curt Widhalm, LMFT Curt Widhalm is in private practice in the Los Angeles area. He is the cofounder of the Therapy Reimagined conference, an Adjunct Professor at Pepperdine University and CSUN, a former Subject Matter Expert for the California Board of Behavioral Sciences, former CFO of the California Association of Marriage and Family Therapists, and a loving husband and father. He is 1/2 great person, 1/2 provocateur, and 1/2 geek, in that order. He dabbles in the dark art of making "dad jokes" and usually has a half-empty cup of coffee somewhere nearby. Learn more at: www.curtwidhalm.com Katie Vernoy, LMFT Katie Vernoy is a Licensed Marriage and Family Therapist, coach, and consultant supporting leaders, visionaries, executives, and helping professionals to create sustainable careers. Katie, with Curt, has developed workshops and a conference, Therapy Reimagined, to support therapists navigating through the modern challenges of this profession. Katie is also a former President of the California Association of Marriage and Family Therapists. In her spare time, Katie is secretly siphoning off Curt's youthful energy, so that she can take over the world. Learn more at: www.katievernoy.com A Quick Note: Our opinions are our own. We are only speaking for ourselves – except when we speak for each other, or over each other. We're working on it. Our guests are also only speaking for themselves and have their own opinions. We aren't trying to take their voice, and no one speaks for us either. Mostly because they don't want to, but hey. Stay in Touch with Curt, Katie, and the whole Therapy Reimagined #TherapyMovement: www.mtsgpodcast.com www.therapyreimagined.com https://www.facebook.com/therapyreimagined/ https://twitter.com/therapymovement https://www.instagram.com/therapyreimagined/ Consultation services with Curt Widhalm or Katie Vernoy: The Fifty-Minute Hour Connect with the Modern Therapist Community: Our Facebook Group – The Modern Therapists Group   Modern Therapist's Survival Guide Creative Credits: Voice Over by DW McCann https://www.facebook.com/McCannDW/ Music by Crystal Grooms Mangano http://www.crystalmangano.com/ Transcript for this episode of the Modern Therapist's Survival Guide podcast (Autogenerated): Curt Widhalm 00:00 This episode of the modern therapist Survival Guide is sponsored by buying time Katie Vernoy  00:04 Buying Time has a full team of virtual assistants with a wide variety of skill sets to support your business. From basic admin support customer service and email management to marketing and bookkeeping, they've got you covered. Don't know where to start, check out the system's inventory checklist, which helps business owners figure out what they don't want to do anymore and get those delegated ASAP. You can find that checklist at buying time. llc.com forward slash systems stash checklist. Curt Widhalm  00:31 Listen at the end of the episode for more information. Announcer  00:34 You're listening to the modern therapist survival guide where therapists live, breathe, and practice as human beings. To support you as a whole person and a therapist. Here are your hosts, Curt Widhalm and Katie Vernoy. Curt Widhalm  00:50 Welcome back modern therapists. This is the modern therapist Survival Guide. I'm Curt Widhalm, with Katie Vernoy. And this is the podcast for therapists about all things therapy, the things that we consider the things that we don't. And stay is one of those days where we're going to be talking about some of the things that we might not consider. And this really comes with some of those smart devices in our homes, our offices, potentially even in our clients homes, and what it means for confidentiality, especially in terms of compliance with things like HIPAA, and who's always listening. And you know, Google a few years ago changed kind of their motto from do no evil to whatever it is. Now I just know that they're, they're no longer committing to not doing evil. But I want to start with kind of this idea of when we especially start with telehealth clients, but this is also going to be true when it comes to our in person sessions with things like smartphones and just kind of being cool in the modern era and having things like Amazon echoes or Google Docs, or any of these kinds of things in our offices of are those things always listening, and what does this mean for client data?   Katie Vernoy  02:07 That's a big intro. Yeah, I, I've worried about this for a while. And that's why I don't have a any kind of AI in my office, although after reading some of these articles I actually do because I have my phone in my office because I receive messages. And I do all kinds of stuff. So it's a little bit scary to think about what might be listening.   Curt Widhalm  02:33 So I mean, this is where I think any of us who have a Windows laptop, there's Cortana, if you have one of these Amazon devices, there's Alexa, if somebody you know, has Siri, these things are listening. And well, some of the tech stuff, you know, might say that they're only listening for key words that would activate them articles that we're looking at here is what we're going to dive into today. As far as does this mean that our sessions with clients are actually as confidential as we're talking about? And what does this mean for our own best practices as we go forward, having smart devices in our offices in our homes, and potentially even in our client's homes. And the way that this conversation initially came up was I was at a dinner party with some other therapists and talking about great dinner party talk that happens wherever I'm at with other therapists, which is,   Katie Vernoy  03:34 Yeah, only although therapists with me, I tend to   Curt Widhalm  03:37 Get people asking a lot ethics questions. And one of the questions that was up for discussion was our duties when it comes to talking with clients about confidentiality, particularly when it comes to telehealth. And I was describing that we have a responsibility to talk with our clients about the limits of confidentiality, that may include privacy in their own homes, if there's potentially somebody who's walking down the hallway, outside their bedroom or office door, wherever they're doing sessions from, and one of the other therapists at this party said, Well, what about any of the smart devices? Do you ever warn them about Google or Alexa or Siri actually listening? And that's what sparked this. So if you ever want a podcast episode, I am available for dinner parties for you to float ideas by.   Katie Vernoy  04:28 Okay, okay, there we go. And so this   Curt Widhalm  04:31 Has led to some research on our part here as far as what is our responsibility? And what do we need to do with our clients as it pertains to some of this AI discussion, even when we don't think that it's happening?   Katie Vernoy  04:47 Well, to me, when you propose this idea for the podcast, the first thing that came to mind was really around convenience versus confidentiality. Because when we're looking at a lot of these things, When we don't turn off voice activation, when we don't make sure that we're not connected to everything through our phones, and all of the contacts and everything within our phones, data is at risk. I mean, even if it says little as a GPA, GPS colocation, it could be a contact could be content that you're actually discussing. I mean, there's, there's a lot of different ways that folks use their phones kind of just live their lives and the convenience of having Google read through your emails, or, you know, whatever it is to be able to scan for things that need to go on your calendar, or to scan for things. You know, like, I love that I can, you know, in the before times when I was traveling, I loved that Google knew where I was flying to what flight I was on, and I would be able to get that information and notifications like you should be leaving for the airport right now. So I think it's something where the convenience of having the AI tracking us and listening to us and reading our emails, and all of that has sometimes trumped our need for privacy.   Curt Widhalm  06:09 The first article that I came across in this is an article from counseling today. This is publication of the American Counseling Association. This article was by Nicole R. Curry Sanders called Hey, Siri, did you break confidentiality? Or did I in this article, Dr. Curry Sanders actually cites an article from The Guardian newspaper, talking about an apple contractor who's a whistleblower. And this contractor is quoted as saying that they regularly hear confidential medical information, drug deals, recordings of couples having sex as a part of this contractors job providing quality control. So these devices are, at least historically have listened. Now, this flies in the face of what some of the tech articles that I'm seeing out there who say that these devices are only listening for those keywords that activate them, but that they're actually constantly on. And according to this contractors cited in this Guardian article, they are recording and sharing this information. So it's very theoretically easily believed that it's also listening in on your therapy sessions. If that's the case, with Apple having this information, everybody who's got an iPhone, that's either bringing it into your session, these devices are potentially listening to everything that's being discussed in your sessions, which is scary, because I imagine that most therapists are not talking about this as a potential breaking of the limits of confidentiality and the promise of confidentiality that makes therapy so sacred.   Katie Vernoy  07:55 And I think that as a society, we have kind of cosign on this lack of privacy, I mean, Siri, or Alexa or Google or whatever, potentially are, they're constantly listening to all of us. And that's part of life. And so are we, are we responsible above this risk that all of us are willing to take by having phones in our pockets,   Curt Widhalm  08:20 And I don't think many of us are, and we'll include the links to what we're talking about here in our show notes. You can find those over at MTS g podcast.com. The next thing that I'm looking at here is a blog post on psychiatry, advisor.com called Alexa Siri, Google Assistant are not HIPAA compliant, and it warns against. Obviously, we all at this point should know that you shouldn't be doing your notes onto one of these devices using some of these voice prompts. But if this article also warns about don't add clients to your schedule using one of these either because it's not an end to end encrypted sort of device, which is one of the requirements of HIPAA, and that HIPAA violations can cost people hundreds or 1000s of dollars. If identity theft can be traced back to them think of how convenient it is to just turn off your phone. So that way, and how much potential money this may end up saving you by just doing the simplest of things.   Katie Vernoy  09:28 Yes, yes, I again, but I still want to you know, we're I know we're   Curt Widhalm  09:34 Any good one ethics discussion should leave people anxious.   Katie Vernoy  09:39 But my question still stands. If I do my part because I am a HIPAA provider. I put my phone on Do Not Disturb or whatever I airplane mode. I put my phone on airplane mode. I don't have any other devices with listening capability in my room, and I only use my electronic health record for scheduling and communication and HIPAA compliant email, blah, blah, blah, like I do all the things, and my client still has a smartphone in their pocket, like do I actually need to warn them about that smartphone in their pocket, because they already theoretically are agreeing to this constant surveillance. By having that smartphone in their pocket,   Curt Widhalm  10:22 I think that we have a duty. And this is reflected in our ethics codes. And we have a duty to tell our clients even things that they may not consider as it pertains to therapy about, okay, where limits of confidentiality may lie? Well, there may be the constant surveillance of these devices in everyday life, but to further prompt them, at least, and especially in our first telehealth session with them that, hey, just in case you haven't considered this, your smart devices in the room may also be listening to your therapy session. And well, you know, it's not the same thing as a sibling or somebody else, brother, parents child's, you know, walking down the hallway, there is the potential that some of this information may be transmitted to people that you don't want to and if that's a consideration, if you want to unplug those devices in the general listening area right now, now would be the time to do so.   Katie Vernoy  11:24 Okay. I mean, that seems fair, I think there's going to be people talking about this, now that we've put this podcast episode out. So I think we also don't want to freak people out. I mean, I think about also there, yes, the data is being transmitted, but it's kind of like how much data are people actually looking at. I mean, it's, it's such an inundation of all of this surveillance data, that the likelihood of someone honing in on a therapy session feels small as part of quality control. And I'm not saying we shouldn't do anything about it, I'm just saying, I'm gonna. Curt Widhalm  11:59 Wave your argument away and saying that the likelihood of somebody breaking into your office and working at client files is also very small. But that does not absolve you of your responsibility to take the precautions to let our clients know about the limits of confidentiality,   Katie Vernoy  12:17 I think it's I think, in talking about it with clients, the way you just said, it sounded a little paranoid, you   Curt Widhalm  12:22 Are being listened to. Katie Vernoy  12:25 You're being listened to. It's I think there's potentially a clinical clinically relevant way to talk about it. I mean, I think, as you know, smart devices that have voice activation potentially can get activated by words that we use, you may want to turn those on, or turn them off their devices in your room, turn them off, turn off voice activation, whatever. But like, there are devices listening in your room, you may want to unplug them. You sounded a little paranoid. It's true. But But I think we want to I don't know, it just it feels a little bit. I don't know paranoid to me, I don't I don't know what   Curt Widhalm  13:03 Your paranoia is my legal precaution of that. And it doesn't have to be presented in that paranoid sort of way. It's just, you know, hey, it's known at this point, like little disclosure, here, we have a little you know, Alexa thing sitting in our living room, sometimes our TV activates it. And then we get little ads on the Alexa based on whatever show that's activated Alexa. So all of a sudden, we're getting, you know, Airbnb recommendations of, you know, wherever the TV show we just watched was located, it's not that much of a stretch of the imagination to think these things are listening, it's happened a couple of times with my phone, just in this episode, it doesn't have to be done in a paranoia sort of way. It's just kind of a, hey, if your privacy means that much to you, and you're gonna be talking about these sensitive things, you might want to consider shutting off those voice activated things in your room.   Katie Vernoy  13:55 Well, I mean, the other thing that we talked about before starting to record is also the the geolocation and potentially contacts on your phone. And so to me, I feel like, at some point there, if we are going to be in a technological society, there may be things that we just cannot avoid. And maybe I'm wrong. I mean, maybe do I do I just never turn on my phone when another person's in my office, like, I feel like being able to not have, you know, if someone's actually physically coming to my office, and our phones have crossed GPS, and all of our apps say like, Oh, they're in the same room, they must like the same things and then start feeding us all of the ads, on the things that either we've talked about, because voice activation is on, or the things that each other have searched for. I mean, it starts to get a little bit nutty, to like, basically be Luddites at the moments during which we're doing therapy.   Curt Widhalm  14:53 It's not to say that we have to be Luddites, it's that we have to disclose the potential So limits of confidentiality that clients may be coming to expect sharing on a Wi Fi network, if you're a well intentioned therapist who has a parent who wants to be, you know, on the Wi Fi network in your office while their kids doing therapy. That's one way that some of these algorithms work to match up people who should be connected on some of the social media sites, if you've got a client's phone number saved in your phone, and you've given third party apps, the permission to scan through your phonebook. These are other ways that you're potentially transmitting data to people that you have maybe lied to people about in your Notice of Privacy Practices that you give to your clients, if the information that you say that what you're doing with it, and how it's going to be shared. And you're sharing this information in inadvertent ways, I'm not aware of any court cases where a therapist has been taken to court on this, but I could see where a therapist could be held liable by having some of this data shared in ways that they never heard that their Notice of Privacy Practices, you know, they take their boilerplate language from somebody down the street, who took it from somebody down the street, who took it from somebody down the street, who took it from actually a paid layer that they actually were responsible with. So since we tend to copy and paste and borrow and pay homage to other people's paperwork, by just borrowing and stealing, and calling it our own, we may not actually be aware of everything in some of these Notice of Privacy Practices that we give out, if what you're doing is transmitting some of this client data, you at least should document that you've had some of these discussions with your clients, as a way of limiting your liability when it comes to having any of these kinds of devices around you. And if the conversation and your own anxieties hasn't pointed it out. So far, we all have these devices, this should be a regular part of the conversation. And should be something where especially talking about a lot of protected health information, especially if you're already a HIPAA covered entity, you have to be aware of this   Katie Vernoy  17:11 Going back to kind of the original thought that I had around this is that whether it's convenience, or practicality that has you put the contacts in your phone, for example, I think that we have to think beyond that. Because it really can harm our ability to keep those that data say I mean, I think about inadvertently, I have done a really good job at keeping my data away from Facebook, I don't take any of the things I don't log into anything with Facebook, I've tried to keep Facebook fairly separate, as well as I use a really old email. And it's not connected to my practice in any way. I'm not sure that anybody else wants to do that. But they're like, I don't share contacts with any of my social media. So my phone is never mind for those things I actively go through and, and deny those permissions. But to me, it could be very simple, even a slip of your of a button press so to speak, where you've shared all your contact to LinkedIn, Twitter, social media, any other social media platform that you allow all of the permissions on your phone, because it's easier because like, oh, well, I'll find my friends, I don't have to go search for them individually. I mean, there's so many ways that are very seductive, that we could do this in an inadvertent data sharing,   Curt Widhalm  18:33 You know, this is no commentary on you. But you identified yourself not as like a super tech savvy person. And yet, I would say that what you just described is more tech savvy than what most people would think about. And that's why we have some of the responsibilities that we do in talking with clients about how their health information may go beyond just our therapy sessions here. Some of these articles that we've seen talk about, you know, don't do things like write your notes, you know, pay Google write in this patient chart, X, Y, and Z. Like, those things would seem obvious, especially to a lot of our modern therapist community who would be like, yeah, that totally makes sense. But just actually having the presence of any of these devices around us, is, you know, a matter of lifestyle for some people and it's knowing to go in and how to shut off some of these things or be able to talk with some of our clients about this because something that's happened during the COVID pandemic and with a lot of telehealth is, we've also become de facto, it people when it comes to explaining to some of our clients just even how to make some of the telehealth stuff work. And so if you know our EHR platforms, and as simple as they get made before for user experiences, if people are still having trouble with those knowing to go in and where to look on a phone for here's where data gets shared back and forth with each other, well, that might be a little bit outside. The scope of what we want to talk about with clients, it's sometimes more simple as far as if you have these devices. And you don't want the conversation of what we're what we're talking about being shared with any of the apps on your phone. Best practice might be just to turn them off during our sessions. But if you leave them on, just know that we can't guarantee complete confidentiality, that's it.   Katie Vernoy  20:20 That seems fair. Um, one of the things that you said earlier, though, struck me because I think that you and I are like, obviously, we wouldn't, you know, kind of transcribe our notes or, you know, kind of do voice over notes on our phone. But that's kind of an accessibility issue for some folks who can't type or handwrite their notes. And I would be very curious on how to protect in that regard. You know, if I've got a voice recorder, that helps me to do my notes, is it within a HIPAA compliant platform that goes directly into my notes? I mean, this might be things that people need to research is how do all of my apps interact? And how do I make sure that I'm not there's not more than what I'm working on open and listening? Because I think that's hard. And I don't know that I wouldn't say I'm tech savvy, I think I actually am. But I think it's something where understanding how privacy and data works, and how things interact with each other how there's data handoffs, I think those types of things feel like they are beyond the scope of being a therapist, but I like what you're saying is like, then just turn these devices off. I guess the only problem is, I have clients that use their phone for their telehealth session. So I don't know if you know, I use simple practice. So I don't know simple practice, then make sure that other apps on the phone are not listening. I don't know if there's even a way to do that. And or if there is a way for people to, you know, like, do you go through and you just kind of disable each of the apps that you don't want to listen, I mean, it feels like there's, there's a challenge here to really having a practical solution, unless we can be certain that the platform that we're using for our video calls on the phone are actually is actually secure. And my assumption is that's the case, I just don't know what else is listening, if and if that's possible.   Curt Widhalm  22:11 And in preparation of this episode, I did not do a deep dive into how, you know, our EHR platforms when they are used on our devices, more popular EHR companies, simple practice, you mentioned those video sessions, if there is a HIPAA compliance, if they have signed a BA agreement with you, those are end to end encrypted communications. Now, what I did not do a deep dive on is does that also prevent other apps and things from also listening, if it is being used on this solitary device that your session is on TBD? You know, follow us on our social media, or whatever. And we'll sort through that through that. It does come back to this point. And especially as we can see some of these tech companies moving more and more into the healthcare space that they're going to make closer and closer approximate efforts to become HIPAA compliant. And this is always kind of a cautionary sort of thing, where I'm a part of a lot of Facebook groups, with therapists, a lot of online communities, and I see a number of people wanting to do things as inexpensively as possible. But without those ba agreements, as business associate agreements, you're not guaranteed to have the same a HIPAA protections if that data does get leaked out or shared in other ways. And so these are your responsibilities as therapists when it comes to confidentiality and this AI conversation.   Katie Vernoy  23:44 And there's a lot of different ways to try to do that. I was one of you were talking, I was thinking about a conversation I had with Roy Huggins from persons under attack, who unfortunately recently just died. And it's a very tragic loss for our profession. And just the way that he would talk about HIPAA compliance. And I'm sure Person Center tech will continue that work was that you have to understand the risks that you're taking, and do what you can and then be comfortable with a risk you're still taking because he's not be perfect. And so I think it's I think it's, it's hard because it can be very scary, because we can't necessarily get to a place where we've we've taken every single precaution. I mean, we could go to a black site, have everyone come in separate ways, no GPS phones are left at their houses, and then be in a room together and then leave. There might be other liability if nobody knows where you are, and you're alone in a room with a client. But I think as a society, I don't think we can protect ourselves from every single thing. But these are things that we can protect ourselves against. pretty simply, I mean, you just turn it off. Um, I think, and that's something that I don't know that a lot of people were thinking about this. Now,   Curt Widhalm  24:57 One of the questions on one of these articles got asked, I think is worth discussing here is for people who are working at sites that require you to have a cell phone on you for safety reasons, whether it be in the floor of a hospital male use system, if you're working for an agency where you go and visit clients houses or whatever, it's what did you see, in kind of the responses to those articles there,   Katie Vernoy  25:26 The main thing is to turn off voice activation, so that there's not a voice activation element. So it's not recording the content, making your phone, a regular cell phone and trying to get rid of some of the other, you know, kind of the smart elements of it, I think can be very helpful. The thing that you can't avoid, if you're trying to go for safety is really, you got to keep GPS on if you need to make an emergency call, they need to be able to ping your cell phone. And so I think there's there are some, some safety issues or not, there are some privacy issues that you can't avoid if you need to have a cell phone. And it's for safety reasons. But I think it's something where the voice assistant technologies, those things are maybe not that easy to find, but but you can, you know, there's some instructions in this, and I'll put this in the show notes so that you can find it. But you know, turning off those voice activation, making sure that you've made yourself as tight as possible. As far as any kind of data that's going out turning off, you know, all of the apps, making sure there's nothing running in the background, even going through your apps and having the permission set to only while the app is on, I think is helpful, because then if Facebook is tracking your location, and Instagram is tracking your location, and Google and whatever, if those are tracking your location all the time, then there's a lot of data being shared. But if you turn those, if you only have those on when you have those apps open, and you consciously close them before you go in my hope is that they're not also running in the background. I've also had something where I put my phone on really low battery use before where it only allows for phone. So it basically shuts down anything running in the background so that you don't have things going that you don't know about. But you know, if you're wanting safety going all the way to turning it off or airplane mode is going to maybe an advisable for safety.   Curt Widhalm  27:24 And in these conversations and what I would suggest is let your clients know what the limits of confidentiality are. And and this doesn't have to be a huge in depth pieces of conversations. Some of your clients may have more interest in what you're talking about, or paranoia depending on why you're seeing those clients. But we would love to hear your experiences with this kind of stuff or thoughts or considerations that you have. You can share those with us on our social media. You can find links to those in our show notes. And once again, those are over at MTS g podcast.com. You can join our Facebook group, the modern therapist group and spill your data to us and Mark Zuckerberg. And until next time, I'm Kurt Wilhelm with Katie Vernoy and Siri.   Katie Vernoy  28:17 Thanks again to our sponsor buying time   Curt Widhalm  28:20 Buying Time's VAs support businesses by managing email communications, CRM or automation systems, website admin and hosting email marketing, social media, bookkeeping and much more. Their sole purpose is to create the opportunity for you to focus on supporting those you serve while ensuring that your back office runs smoothly with a full team of VAs gives the opportunity to hire for one role and get multiple areas of support. There's no reason to be overwhelmed with running your business with this solution available.               Katie Vernoy  28:48 Book a consultation to see where and how you can get started getting the support you need. That's buyingtimellc.com/book-consultation once again, buying time llc.com forward slash book dash consultation.   Announcer  29:04 Thank you for listening to the modern therapist Survival Guide. Learn more about who we are and what we do at mtsgpodcast.com. You can also join us on Facebook and Twitter. And please don't forget to subscribe so you don't miss any of our episodes.

In House Warrior
Big Data, Privacy & Security With Kirk Nahra, a Partner at Wilmer Hale and Co-Chair of Both Their Big Data and Cybersecurity and Privacy Practices With Host Richard Levick of LEVICK

In House Warrior

Play Episode Listen Later Jan 6, 2022 32:15


Big Data, Privacy & Security: Kirk Nahra, a partner at Wilmer Hale and Co-Chair of both their Big Data and Cybersecurity and Privacy practices and a leading authority on privacy and cybersecurity matters for more than two decades, speaks with host Richard Levick of LEVICK. Kirk discusses privacy and security laws and trends for 2022; what to expect in state and international regulation; best practices for avoiding privacy and security investigations and how to navigate them when they occur; the unique challenges of privacy issues in health care; and career opportunities. He is a founding member and longtime board member of the International Association of Privacy Professionals (IAPP) and one of the few lawyers in the world ranked in Band 1 by Chambers in privacy and data security. He is also the winner of the 2021 Vanguard Award from the IAPP —one of the most prestigious in the privacy field.

She Said Privacy/He Said Security
Ethical Privacy Practices for Businesses

She Said Privacy/He Said Security

Play Episode Listen Later Nov 18, 2021 34:31


Alexandra Ross is the Senior Director of Senior Data Protection and Use & Ethics Counsel at Autodesk, where she provides legal, strategic, and governance support. She is also an Advisor to BreachRx and an Innovators Evangelist for The Rise of Privacy Tech (TROPT). Alexandra received the 2019 Bay Area Corporate Counsel Award for privacy and founded The Privacy Guru blog in 2014. She is also the author of the e-book, Privacy for Humans. Previously, Alexandra was Senior Counsel at Paragon Legal and Associate General Counsel for Walmart stores. She is a Certified Information Privacy Professional and practices in San Francisco, California. Alexandra earned her law degree from UC Hastings College of the Law and her bachelor's degree in theater from Northwestern University. In this episode… Technology is speedily moving forward in unprecedented and exciting ways. However, it's advancing faster than regulation can catch up — meaning consumers are typically unaware of the ways their data is being collected and stored. So, how can your business handle data in a way that builds trust? Doing the right thing means not just complying with the law. There is legislation under debate for structured data regulation — but if you want to build consumer trust, you should hop on the bandwagon before the law finally rolls around. It's important to think about the perceptions of consumers. Is the data you're collecting providing value to your customers? Are you actually managing their expectations and maintaining their privacy? In this episode of She Said Privacy/He Said Security, Jodi and Justin Daniels sit down with Alexandra Ross, the Founder of The Privacy Guru, to discuss how to create ethical privacy practices for your business. Alexandra talks about how privacy practices are changing as more businesses move their data to the cloud and the various ways ESG is impacting private equity and capital venture firms. She also shares some resources to deepen your awareness of the best privacy practices.

The Private Medical Practice Academy
Episode 50: How to Avoid a HIPAA Danger Zone: The Notice of Privacy Practices form

The Private Medical Practice Academy

Play Episode Play 35 sec Highlight Listen Later Nov 12, 2021 9:59


The Notice of Privacy Practices is a form that many patients toss in the garbage but that can you into a lot of trouble and costs an enormous amount of money.  HIPAA guarantees a variety of patient rights--including a patient's right to know how you're going to use their Protected Health Information (PHI.) As part of that,  you are required to describe your office's privacy practices in writing in an easy-to-read document called a Notice of Privacy Practices.The HIPAA guidelines state that you must “do your best” to get your patients to sign an acknowledgment that indicates that they havereceived a copy of your Notice of Privacy Practicesbeen made aware of a notice copy posted in your waiting area, orbeen informed that a copy is available on your practice's websiteWhat should you include in your privacy notice:Rights:  Your privacy notice must clearly spell out your patients' rights Choice: Patient privacy choices must also be clearly listedUse: You are required to tell your patients how you will use their informationDate and Sign: Although your patients are not required to sign and date your privacy notice, there must be a place for them to do so on the document Change: Your patients have the right to change the instructions on how you are authorized to utilize their information Here's a HIPAA-compliant sample Notice of Privacy Practices form.  How to use the form correctly:Timing: Every new patient packet must contain a complete copy of your privacy notice. Have patients review your privacy notice again at least every three years.Availability:   Post a copy of your Notice of Privacy Practices where your patients can easily see it. Signature: Make a “good faith” effort to document acknowledgment of your privacy notice by getting your patient to sign and date it.  Refusal to Sign: If they refuse to sign,  document the reasons.Language:  Your Notice of Privacy Practices form needs to be available in other language options as your practice represents.Who can Sign a Privacy Notice? Adults: All patients who are competent adults.Minors: The legal parent(s) may sign for non-emancipated children.Emancipated minor. The definition of an “emancipated minor” differs from state to state.  Know your state requirements to avoid getting into trouble.Next of Kin: The designated representative of a seriously ill or comatose patient.Legal guardian: The designated legal guardian of an incompetent patient.Executor or administrator: The legal executor or administrator of the estate of a deceased person. If you'd like to hear more tips on how to start, run and grow your practice and related medical businesses, please sign up for my newsletter at https://www.thepracticebuildingmd.com.    And, be sure to join my FB group, The Private Medical Practice Academy. Enroll in my course,  How To Start Your Own Practice and get the step-by-step process for opening your doors. Or join The Private Medical Practice Academy Membership for live group coaching, expert guest speakers and everything you need to know to start, grow and leverage your private practice

In the Public Interest
Inside Privacy Law: The Regulation of Personal Data

In the Public Interest

Play Episode Listen Later Jun 15, 2021 31:59


In today's interconnected world, personal information has never been more broadly collected and analyzed by governments and corporations alike, making it imperative that we understand, enforce and update privacy laws in order to safeguard individual privacy. In this episode, WilmerHale podcast co-host and Partner John Walsh welcomes two national leaders in privacy law of all kinds: Partner Kirk Nahra and guest Stacey Gray. Nahra is the co-chair of WilmerHale's Big Data and Cybersecurity and Privacy Practices. Among his other accolades, he is the winner of the 2021 Vanguard Award from the International Association of Privacy Professionals (IAPP)—one of the most prestigious in the privacy field—which recognizes one IAPP member each year who demonstrates exceptional leadership, knowledge and creativity in privacy and data protection. Gray is a Senior Counsel at the Future of Privacy Forum (FPF) and leads FPF's engagement on federal and state privacy legislation. Prior to leading FPF's legislative engagement, she spent several years focusing on the privacy implication of data collection in online and mobile advertising, platform regulation, cross-device tracking, Smart Homes, and the Internet of Things. Nahra and Gray talk with Walsh about the challenges of having states with different privacy laws and why that may ultimately drive a single national law. They also dive into consumer consent and the complexities of regulating the collection and sharing of personal data. The episode wraps up with tips for individuals and companies to keep in mind when considering privacy and personal data. Links: https://gdpr.eu/what-is-gdpr/ (General Data Protection Regulation (GDPR)) California Consumer Privacy Act (CCPA) https://fpf.org/ (Future of Privacy Forum) https://fpf.org/person/stacey-gray/ (Stacey Gray's bio) https://www.wilmerhale.com/en/insights/blogs/wilmerhale-privacy-and-cybersecurity-law (WilmerHale's Privacy and Cybersecurity Law blog) https://www.wilmerhale.com/en/people/kirk-nahra (Kirk Nahra's bio)

The Best Practices Show
Regulatory Changes that Every Practice Needs to Know with Linda Harvey

The Best Practices Show

Play Episode Listen Later Apr 30, 2021 37:59


Regulatory Changes that Every Practice Needs to Know Episode #297 with Linda Harvey A lot has happened in dentistry during the pandemic, including regulatory changes. And if you're wondering about the potential changes and how to prepare for them, today's expert can help! Kirk Behrendt and Linda Harvey talk about some of the policies, procedures, and protocols that were updated and what to be aware of. Know and understand the laws, and don't be resistant to change! For more advice on how to protect yourself and your practice, listen to Episode 297 of The Best Practices Show! Main Takeaways: Don't assume you're in compliance. Know and understand what's required. Don't be resistant to change. Every dentist needs to have adequate cyber risk insurance coverage. Know what your cyber risk insurance covers. You can't afford not to have a breach expert. Stay current on changes so you can have protocols in place. Take caution with PPE supply chain shortages. Quotes: “We learned quite a bit about COVID-19 . . . We learned how we had to protect ourselves. We learned that OSHA put dentistry at the top of the list when it came to high-risk categories for contracting airborne diseases in dental settings. So, we realized that there were actually laws that were already in place, such as OSHA's Respiratory Protection Standard, that now applied to us in dentistry.” (08:08—08:39) “There were a lot of folks that were capitalizing on the COVID-19 crisis, selling products that weren't fit to be used in a healthcare setting and masks that were counterfeit. So, we had to really step up a notch as far as our understanding and not just buy something because, ‘Oh, this looks like it's good. This looks like it's legitimate.' We couldn't trust that last year. And even earlier this year, we saw the same thing happening.” (10:07—10:32) “I happen to have an acquaintance who helped to author [OSHA's] Bloodborne Pathogens Standard. He was on that committee many years ago, and he feels like it's being picked back up. So, I feel like we're in that train. And if OSHA takes it a step further and starts an initiative called a Special Emphasis Program, that means that they may take time to go actually investigate offices and do random inspections. Whether they will target dentistry, or healthcare, or what area they will target, that's to be seen.” (12:38—13:07) “The likelihood is that you're more likely to get inspected if there's a complaint filed against the practice. Right now, OSHA does not have the manpower to go target dental offices. We know that they did in Tennessee probably five, maybe six years ago. But Tennessee is one of the 20-something states that has their own OSHA-approved plans, so they have some more restrictive and more stringent requirements than the federal law in some areas.” (14:07—14:31) “I think, oftentimes, we assume we're in compliance. And sometimes, when I start speaking about, let's just say the Bloodborne Pathogen Standard, and I take one little section that I want to really drill into, almost everybody in the room goes, ‘I had no idea we weren't doing that right.'” (14:47—14:59) “I was one of those individuals that lived through no gloves, masks, and glasses. I was cleaning teeth with no gloves, if you can just imagine how gross that is now. Right? But nevertheless, we had to make that change. And I was one of the last ones to change, quite honestly. I didn't want to wear damn gloves. I've known these patients for years. Why was I fearful of them? But then, I finally got it. You know, we had young children. So, this is the same way that we are now. We're making changes in our PPE, and we can't be resistant to that change. And we have to be open-minded about, ‘Well, maybe OSHA's going to say that we're going to have to continue wearing respirator masks, and that could be what's required.' We just don't know yet.” (15:13—15:50) “It's more than just having your Notice of Privacy Practices posted on your website or...

The Bid Picture - Cybersecurity & Intelligence Analysis
4: Screen Time Management and Personal Data Privacy Practices

The Bid Picture - Cybersecurity & Intelligence Analysis

Play Episode Listen Later Jan 22, 2021 47:28


In this episode, host Bidemi Ologunde explains effective personal data privacy practices from a pandemic perspective: how users can secure their online data by analyzing the devices they use and how their online searches, email and messaging platforms could affect their privacy.The second segment in the episode puts a spotlight on digital addiction, its causes and effects with respect to the ongoing global pandemic, and ways to empower users to have a healthier and more productive relationship with digital technology.Please send questions, comments, and suggestions to bidemi@thebidpicture.com. You can also get in touch on LinkedIn, Twitter, the Clubhouse app (@bid), and the Wisdom app (@bidemi).

MCLE ThisWeek Podcast
Evaluating Privacy Practices in the Remote World of COVID-19

MCLE ThisWeek Podcast

Play Episode Listen Later Jan 15, 2021 12:22


What are the privacy and security considerations you need to know to manage the threat and compliance environments in a workplace that has largely, and very recently, become remote? Learn more from Christopher E. Hart of Foley Hoag LLP in this podcast, excerpted from MCLE’s 5/1/2020 program, Cyber Security Threats & Best Practices in the Remote World of COVID-19: The 60-Minute Lawyer. The full program is available as an on demand webcast or an MP3 here. For more programs covering topics arising from the pandemic, simply search “COVID” in the keyword search box at www.mcle.org. Get 24/7 access to hundreds of related eLectures like this one—and more—with a subscription to the MCLE OnlinePass. Learn more at www.mcle.org/onlinepass.

Security Now (MP3)
SN 794: Cicada - Ongoing WordPress Attack, RCS Gets End-to-End Encryption

Security Now (MP3)

Play Episode Listen Later Nov 25, 2020 104:03


Ongoing WordPress attack, RCS gets End-to-end encryption. Chrome moves to release 87. Explicit Publication of Privacy Practices. Firefox 83 gets HTTPS-only Mode. Mozilla seeks consultation on implementing DNS-over-HTTPS. The comical announcement strategy of the Egregor Ransomware. Large-scale attacks targeting Epsilon Framework Themes in WordPress. Cybercrime gang installs hidden e-commerce stores on WordPress sites. 245,000 Windows systems still vulnerable to BlueKeep RDP bug. Google's Rich Communication Services is getting E2EE via Signal. Cicada, a Chinese state-sponsored advanced persistent threat group. We invite you to read our show notes at https://www.grc.com/sn/SN-794-Notes.pdf Hosts: Steve Gibson and Jason Howell Download or subscribe to this show at https://twit.tv/shows/security-now. You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: manscaped.com/twit extrahop.com/SECURITYNOW barracuda.com/securitynow

All TWiT.tv Shows (MP3)
Security Now 794: Cicada

All TWiT.tv Shows (MP3)

Play Episode Listen Later Nov 25, 2020 104:03


Ongoing WordPress attack, RCS gets End-to-end encryption. Chrome moves to release 87. Explicit Publication of Privacy Practices. Firefox 83 gets HTTPS-only Mode. Mozilla seeks consultation on implementing DNS-over-HTTPS. The comical announcement strategy of the Egregor Ransomware. Large-scale attacks targeting Epsilon Framework Themes in WordPress. Cybercrime gang installs hidden e-commerce stores on WordPress sites. 245,000 Windows systems still vulnerable to BlueKeep RDP bug. Google's Rich Communication Services is getting E2EE via Signal. Cicada, a Chinese state-sponsored advanced persistent threat group. We invite you to read our show notes at https://www.grc.com/sn/SN-794-Notes.pdf Hosts: Steve Gibson and Jason Howell Download or subscribe to this show at https://twit.tv/shows/security-now. You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: manscaped.com/twit extrahop.com/SECURITYNOW barracuda.com/securitynow

Security Now (Video HI)
SN 794: Cicada - Ongoing WordPress Attack, RCS Gets End-to-End Encryption

Security Now (Video HI)

Play Episode Listen Later Nov 25, 2020 104:03


Ongoing WordPress attack, RCS gets End-to-end encryption. Chrome moves to release 87. Explicit Publication of Privacy Practices. Firefox 83 gets HTTPS-only Mode. Mozilla seeks consultation on implementing DNS-over-HTTPS. The comical announcement strategy of the Egregor Ransomware. Large-scale attacks targeting Epsilon Framework Themes in WordPress. Cybercrime gang installs hidden e-commerce stores on WordPress sites. 245,000 Windows systems still vulnerable to BlueKeep RDP bug. Google's Rich Communication Services is getting E2EE via Signal. Cicada, a Chinese state-sponsored advanced persistent threat group. We invite you to read our show notes at https://www.grc.com/sn/SN-794-Notes.pdf Hosts: Steve Gibson and Jason Howell Download or subscribe to this show at https://twit.tv/shows/security-now. You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: manscaped.com/twit extrahop.com/SECURITYNOW barracuda.com/securitynow

Security Now (Video LO)
SN 794: Cicada - Ongoing WordPress Attack, RCS Gets End-to-End Encryption

Security Now (Video LO)

Play Episode Listen Later Nov 25, 2020 104:03


Ongoing WordPress attack, RCS gets End-to-end encryption. Chrome moves to release 87. Explicit Publication of Privacy Practices. Firefox 83 gets HTTPS-only Mode. Mozilla seeks consultation on implementing DNS-over-HTTPS. The comical announcement strategy of the Egregor Ransomware. Large-scale attacks targeting Epsilon Framework Themes in WordPress. Cybercrime gang installs hidden e-commerce stores on WordPress sites. 245,000 Windows systems still vulnerable to BlueKeep RDP bug. Google's Rich Communication Services is getting E2EE via Signal. Cicada, a Chinese state-sponsored advanced persistent threat group. We invite you to read our show notes at https://www.grc.com/sn/SN-794-Notes.pdf Hosts: Steve Gibson and Jason Howell Download or subscribe to this show at https://twit.tv/shows/security-now. You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: manscaped.com/twit extrahop.com/SECURITYNOW barracuda.com/securitynow

All TWiT.tv Shows (Video HD)
Security Now 794: Cicada

All TWiT.tv Shows (Video HD)

Play Episode Listen Later Nov 25, 2020 104:03


Ongoing WordPress attack, RCS gets End-to-end encryption. Chrome moves to release 87. Explicit Publication of Privacy Practices. Firefox 83 gets HTTPS-only Mode. Mozilla seeks consultation on implementing DNS-over-HTTPS. The comical announcement strategy of the Egregor Ransomware. Large-scale attacks targeting Epsilon Framework Themes in WordPress. Cybercrime gang installs hidden e-commerce stores on WordPress sites. 245,000 Windows systems still vulnerable to BlueKeep RDP bug. Google's Rich Communication Services is getting E2EE via Signal. Cicada, a Chinese state-sponsored advanced persistent threat group. We invite you to read our show notes at https://www.grc.com/sn/SN-794-Notes.pdf Hosts: Steve Gibson and Jason Howell Download or subscribe to this show at https://twit.tv/shows/security-now. You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: manscaped.com/twit extrahop.com/SECURITYNOW barracuda.com/securitynow

All TWiT.tv Shows (Video HI)
Security Now 794: Cicada

All TWiT.tv Shows (Video HI)

Play Episode Listen Later Nov 25, 2020 104:03


Ongoing WordPress attack, RCS gets End-to-end encryption. Chrome moves to release 87. Explicit Publication of Privacy Practices. Firefox 83 gets HTTPS-only Mode. Mozilla seeks consultation on implementing DNS-over-HTTPS. The comical announcement strategy of the Egregor Ransomware. Large-scale attacks targeting Epsilon Framework Themes in WordPress. Cybercrime gang installs hidden e-commerce stores on WordPress sites. 245,000 Windows systems still vulnerable to BlueKeep RDP bug. Google's Rich Communication Services is getting E2EE via Signal. Cicada, a Chinese state-sponsored advanced persistent threat group. We invite you to read our show notes at https://www.grc.com/sn/SN-794-Notes.pdf Hosts: Steve Gibson and Jason Howell Download or subscribe to this show at https://twit.tv/shows/security-now. You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: manscaped.com/twit extrahop.com/SECURITYNOW barracuda.com/securitynow

All TWiT.tv Shows (Video LO)
Security Now 794: Cicada

All TWiT.tv Shows (Video LO)

Play Episode Listen Later Nov 25, 2020 104:03


Ongoing WordPress attack, RCS gets End-to-end encryption. Chrome moves to release 87. Explicit Publication of Privacy Practices. Firefox 83 gets HTTPS-only Mode. Mozilla seeks consultation on implementing DNS-over-HTTPS. The comical announcement strategy of the Egregor Ransomware. Large-scale attacks targeting Epsilon Framework Themes in WordPress. Cybercrime gang installs hidden e-commerce stores on WordPress sites. 245,000 Windows systems still vulnerable to BlueKeep RDP bug. Google's Rich Communication Services is getting E2EE via Signal. Cicada, a Chinese state-sponsored advanced persistent threat group. We invite you to read our show notes at https://www.grc.com/sn/SN-794-Notes.pdf Hosts: Steve Gibson and Jason Howell Download or subscribe to this show at https://twit.tv/shows/security-now. You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: manscaped.com/twit extrahop.com/SECURITYNOW barracuda.com/securitynow

Follow the White Rabbit
Cybersecurity Tips and Best Privacy Practices with Roger Huang

Follow the White Rabbit

Play Episode Listen Later Nov 25, 2020 48:19


We go down the rabbit hole with Roger Huang, CEO of CyberSecure, a company that develops open-source cybersecurity tools. A deep dive into the Five Eyes alliance's complex history, China's digital yen, and best practices for protecting your privacy online.

Security Now (Video HD)
SN 794: Cicada - Ongoing WordPress Attack, RCS Gets End-to-End Encryption

Security Now (Video HD)

Play Episode Listen Later Nov 25, 2020 104:03


Ongoing WordPress attack, RCS gets End-to-end encryption. Chrome moves to release 87. Explicit Publication of Privacy Practices. Firefox 83 gets HTTPS-only Mode. Mozilla seeks consultation on implementing DNS-over-HTTPS. The comical announcement strategy of the Egregor Ransomware. Large-scale attacks targeting Epsilon Framework Themes in WordPress. Cybercrime gang installs hidden e-commerce stores on WordPress sites. 245,000 Windows systems still vulnerable to BlueKeep RDP bug. Google's Rich Communication Services is getting E2EE via Signal. Cicada, a Chinese state-sponsored advanced persistent threat group. We invite you to read our show notes at https://www.grc.com/sn/SN-794-Notes.pdf Hosts: Steve Gibson and Jason Howell Download or subscribe to this show at https://twit.tv/shows/security-now. You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: manscaped.com/twit extrahop.com/SECURITYNOW barracuda.com/securitynow

Tony Martignetti Nonprofit Radio
488: Data Privacy Practices – Tony Martignetti Nonprofit Radio

Tony Martignetti Nonprofit Radio

Play Episode Listen Later May 8, 2020 58:43


This week:  Data Privacy Practices  Let’s have a romp through the fields of data privacy and cybersecurity, musing as we frolic on just how important the right practices and policies are to your nonprofit. My guest is Jon Dartley, Of … Continue reading →

data privacy tony martignetti privacy practices nonprofit radio
Babe?
TEASER: Privacy Practices w/ Liz Goldwyn

Babe?

Play Episode Listen Later Oct 2, 2019 2:00


Liz Goldwyn gets real about online data, and how to protect yourself when it comes to sharing that data with corporations. To listen to the full bonus episode, visit patreon.com/babepodcast. See acast.com/privacy for privacy and opt-out information.

liz goldwyn privacy practices
Instant Message
#33: Facebook's Potentially Problematic Privacy Practices: A Recap

Instant Message

Play Episode Listen Later Jun 14, 2019 40:29


This week, WSJ broke news of internal Facebook Inc. emails that suggested the company lacked urgency to stop data leaks. With David out in Hong Kong at the Journal's Asia tech conference, Joanna and Christopher take you down Memory Lane with some of WSJ's reporters. After catching up on the news, they revisit a chat with Sam Schechner, who broke a story about how much information app makers share with Facebook-without telling you. Then they go back to a talk with Katie Bindley, who downloaded a pregnancy app then found herself targeted by maternity ads on Facebook and Instagram. Finally, they recap Facebook's most recent developer conference, in which the company promised users more privacy-but not privacy from Facebook.

Tech Talk Y'all
Episode 77: Thunderbirdin' It Up

Tech Talk Y'all

Play Episode Listen Later Apr 1, 2019 36:39


In This Episode: * US computer science grads outperforming those in other key nations (2:05) * How an 83-year-old found a new lease on life developing mobile apps (4:51) * FTC Seeks to Examine the Privacy Practices of Broadband Providers (7:15) * Google makes emails more dynamic with AMP for Email * Teens have less face time with their friends – and are lonelier than ever (12:02) * Here's everything Apple announced on Monday (15:09) * Asus software updates were used to spread malware, security group says * Doom Eternal Will Release On Google Stadia, More Games To Be Revealed Later Weird & Wacky Tech: * What’s a Quick Detour When You’re Having Fun? * Tesla car hacked at Pwn2Own contest * Drunken online shopping is big business — especially for Amazon Tech Recommendations: * Sanjay - Notes by Mozilla (https://github.com/mozilla/notes) * Adam - Google Meet (https://meet.google.com/_meet?authuser=1) * Shannon - CodeAcademy (https://www.codecademy.com/) Ad music is from "Partly Cloudy" by A Tape Full of Mistakes Weird & Wacky theme music is from "Brainwavves" by Strong Suit

HIPAA Talk
Where Do HIPAA, GLB, and ACA Compliance Requirements Intersect?

HIPAA Talk

Play Episode Listen Later May 3, 2017 8:20


This explains where HIPAA, Gramm-Leach-Bliley (GLB) and Personally Identifiable Information (PII) intersect and what health insurance agents must do in order to meet the requirements of the three. Also, answers the question, do agents need to send a Notice of Privacy Practices to comply with HIPAA? Jason Karn, Total HIPAA's chief compliance officer interviews David […]

compliance requirements hipaa intersect hipaa compliance personally identifiable information pii privacy practices
1st Talk Compliance
HIPAA Notice of Privacy Practices What To Do Now

1st Talk Compliance

Play Episode Listen Later Apr 11, 2017 4:56


Karen E. Davidson, Esq., a Founder of Mackarey & Davidson, P.C., Healthcare Attorneys to the Provider Community joins First Healthcare Compliance for a discussion of Notice of Privacy Practices under Omnibus. The post HIPAA Notice of Privacy Practices What To Do Now appeared first on First Healthcare Compliance.

founders davidson esq hipaa omnibus privacy practices first healthcare compliance
1st Talk Compliance
HIPAA Notice of Privacy Practices What To Do Now

1st Talk Compliance

Play Episode Listen Later Apr 11, 2017 4:56


Karen E. Davidson, Esq., a Founder of Mackarey & Davidson, P.C., Healthcare Attorneys to the Provider Community joins First Healthcare Compliance for a discussion of Notice of Privacy Practices under Omnibus. The post HIPAA Notice of Privacy Practices What To Do Now appeared first on First Healthcare Compliance.

founders davidson esq hipaa omnibus privacy practices first healthcare compliance
Pharmacy Podcast Network
HIPAA Breaches & Desk Audits - Pharmacy Compliance Guide - Pharmacy Podcast Episode 399

Pharmacy Podcast Network

Play Episode Listen Later Mar 3, 2017 31:17


HIPAA Breaches & Desk Audits What is a breach? In simple words, the loss of patient protected health information, either printed or electronic. How common are breaches within pharmacies? There are two types of pharmacies and pharmacy owners, The first are the ones who know they have had a breach The later are the ones who have had a breach and don't know about it How can I have a breach and not know about it? Simple, has your pharmacy clerk ever given a patient another patient's medication? That is a breach Can you give me examples of breaches? Pharmacy is robbed and the will call bin is stolen Pharmacy is robbed and the server is stolen Staff pharmacist has a laptop stolen Delivery driver has their vehicle stolen which is full of prescriptions to be delivered Billing manager has a jump drive with patient files for billing to work at home and loses it on the bus What do I do when a breach occurs? First, don't panic Get the facts Complete a Potential Breach Evaluation and a Risk Assessment Determine whether the breach is reportable or non-reportable to HHS/OCR Document everything  What are OCR Desk Audits Tested in 2016 Launched on January 1, 2017 Notification via U.S. Mail and Email Also conducting no notice on-site inspections What is the OCR asking for? Notice of Privacy Practices (date must be after 07/01/2013) Risk Analysis Risk Management Plan Disaster Recovery Plan/Contingency Plan Annual Privacy and Security Assessments Random Policies and Procedures On-Site Inspections Same as above, but in person First question is to the person at your counter, normally your clerk Can I have a copy of your Notice of Privacy Practice? They have to know the answer and provide the NOPP Penalties for Non-compliance Fines up to 1.5 Million Dollars  Is there help available to pharmacies? Yes, but you get what you pay for You can buy a set of policies and procedures, but if you have breach, especially a reportable breach: Will the consultant stay with you when you need them the most? Will they charge you extra? Will they provide the correct advice? How do you know how to pick a consultant? Ask your peers Ask hard questions about how they have handled client breaches and inspections Do you get detailed answers from the consultant? Do you referrals from multiple people? CONTACT: Office:  724-357-8380  Website:  www.rjhedges.com See omnystudio.com/listener for privacy information.

Pharmacy Compliance Guide
HIPAA Breaches & Desk Audits - Pharmacy Compliance Guide - Pharmacy Podcast Episode 399

Pharmacy Compliance Guide

Play Episode Listen Later Mar 3, 2017 31:17


HIPAA Breaches & Desk Audits What is a breach? In simple words, the loss of patient protected health information, either printed or electronic. How common are breaches within pharmacies? There are two types of pharmacies and pharmacy owners, The first are the ones who know they have had a breach The later are the ones who have had a breach and don’t know about it How can I have a breach and not know about it? Simple, has your pharmacy clerk ever given a patient another patient’s medication? That is a breach Can you give me examples of breaches? Pharmacy is robbed and the will call bin is stolen Pharmacy is robbed and the server is stolen Staff pharmacist has a laptop stolen Delivery driver has their vehicle stolen which is full of prescriptions to be delivered Billing manager has a jump drive with patient files for billing to work at home and loses it on the bus What do I do when a breach occurs? First, don’t panic Get the facts Complete a Potential Breach Evaluation and a Risk Assessment Determine whether the breach is reportable or non-reportable to HHS/OCR Document everything  What are OCR Desk Audits Tested in 2016 Launched on January 1, 2017 Notification via U.S. Mail and Email Also conducting no notice on-site inspections What is the OCR asking for? Notice of Privacy Practices (date must be after 07/01/2013) Risk Analysis Risk Management Plan Disaster Recovery Plan/Contingency Plan Annual Privacy and Security Assessments Random Policies and Procedures On-Site Inspections Same as above, but in person First question is to the person at your counter, normally your clerk Can I have a copy of your Notice of Privacy Practice? They have to know the answer and provide the NOPP Penalties for Non-compliance Fines up to 1.5 Million Dollars  Is there help available to pharmacies? Yes, but you get what you pay for You can buy a set of policies and procedures, but if you have breach, especially a reportable breach: Will the consultant stay with you when you need them the most? Will they charge you extra? Will they provide the correct advice? How do you know how to pick a consultant? Ask your peers Ask hard questions about how they have handled client breaches and inspections Do you get detailed answers from the consultant? Do you referrals from multiple people? CONTACT: Office:  724-357-8380  Website:  www.rjhedges.com See omnystudio.com/listener for privacy information.

R.J. Hedges Podcast
HIPAA Breaches & Desk Audits - Pharmacy Compliance Guide

R.J. Hedges Podcast

Play Episode Listen Later Mar 2, 2017 31:17


What is a breach? In simple words, the loss of patient protected health information, either printed or electronic. How common is breached within pharmacies? There are two types of pharmacies and pharmacy owners, The first are the ones who know they have had a breach The latter are the ones who have had a breach and don’t know about it How can I have a breach and not know about it? Simple, has your pharmacy clerk ever given a patient another patient’s medication? That is a breach Can you give me examples of breaches? Pharmacy is robbed and the will-call bin is stolen Pharmacy is robbed and the server is stolen Staff pharmacist has a laptop stolen The delivery driver has their vehicle is stolen which is full of prescriptions to be delivered Billing manager has a jump drive with patient files for billing to work at home and loses it on the bus What do I do when a breach occurs? First, don’t panic Get the facts Complete a Potential Breach Evaluation and a Risk Assessment Determine whether the breach is reportable or non-reportable to HHS/OCR Document everything What is OCR Desk Audits Tested in 2016 Launched on January 1, 2017 Notification via U.S. Mail and Email Also conducting no notice on-site inspections What is the OCR asking for? Notice of Privacy Practices (date must be after 07/01/2013) Risk Analysis Risk Management Plan Disaster Recovery Plan/Contingency Plan Annual Privacy and Security Assessments Random Policies and Procedures On-Site Inspections Same as above, but in person The first question is to the person at your counter, normally your clerk Can I have a copy of your Notice of Privacy Practice? They have to know the answer and provide the NOPP Penalties for Non-compliance Fines up to 1.5 Million Dollars Is there help available to pharmacies? Yes, but you get what you pay for You can buy a set of policies and procedures, but if you have breached, especially a reportable breach: Will the consultant stay with you when you need them the most? Will they charge you extra? Will they provide the correct advice? How do you know how to pick a consultant? Ask your peers Ask hard questions about how they have handled client breaches and inspections Do you get detailed answers from the consultant? Do you referrals from multiple people?

Help Me With HIPAA
Ep 51: Small Office HIPAA Compliance

Help Me With HIPAA

Play Episode Listen Later Apr 29, 2016 43:21


We often talk about doing the "work" of compliance. Some people seem to have the attitude that all I need to do some is annual staff training and hand out a Notice of Privacy Practices to do small office HIPAA compliance. When we try to explain there is more to it than that we often get pushback about the requirements. We always hear comments like: we don't have time, we don't have resources, we can't be expected to do this. So, how DO you do small office HIPAA compliance? Today we are going to talk to someone who is definitely doing the work of HIPAA compliance in a small office.  We are doing an interview with Erien Fryer of Medical Direct Care in Clarksville, TN to discuss small office HIPAA compliance issues, obstacles, and how to just get it done. For more details go to HelpMeWithHIPAA.com/51

Cyber Law and Business Report on WebmasterRadio.fm
Future of Privacy Forum on Privacy in the Sharing Economy

Cyber Law and Business Report on WebmasterRadio.fm

Play Episode Listen Later Jul 8, 2015 50:47


Future of Privacy Forums Joe Jerome, who recently was on to discuss privacy and the internet of things, joins us to discuss the Future of Privacy Forums latest Study of Privacy Practices in Sharing Economy

Software Engineering Institute (SEI) Podcast Series
Integrating Privacy Practices into the Software Development Life Cycle

Software Engineering Institute (SEI) Podcast Series

Play Episode Listen Later Dec 22, 2009 17:28


Addressing privacy during software development is just as important as addressing security. Listen on Apple Podcasts.