From the Desk of Matt Fisher – ICYMI
By Matt Fisher, Esq
Twitter: @matt_r_fisher
Host of Healthcare de Jure – #HCdeJure
Tune in weekdays at 2pm, 10pm or 6am ET as Matt serves up the hottest healthcare issues of the day, all from a legal point of view. From public policies and Federal initiatives to privacy and security, join host Matt R. Fisher as he and his guests discuss a smorgasbord of topics, giving hospitals, physicians, vendors and patients a seat at the table. Matt’s virtual conversations can be listened to on demand or heard on air. So don’t miss a minute of what’s on the menu.
ICYMI, read the latest of Matt’s blogs. And don’t forget to join the conversation with Matt on #HCdeJure.
Why Security Must Go Beyond HIPAA
A common area of HIPAA that receives a lot of attention by organization is the Security Rule. The focus is driven by the requirement to implement various policies, procedures, and processes to secure the protected health information in each organization’s possession. Too often the compliance can take the form of just checking boxes ad not thinking about the impact of each element. Continue reading on HealthIT Answers.
Applying HIPAA to Digital Health
The aim of the recent Getting Back to Basics post was to re-establish the key fundamentals of how HIPAA operates. To summarize in a sentence, HIPAA applies to certain defined entities working or interacting with healthcare information related to an individual. It should absolutely be recognized that that statement is a gross over simplification of HIPAA, but should be sufficient to provide a grounding for this next step in the discussion of HIPAA’s scope. Continue reading on HealthIT Answers.
Getting Back to Basics: A HIPAA Primer
The constant discussions around the impact and operation of the regulations implementing the Health Insurance Portability and Accountability Act, or HIPAA (yes, there are 2 A’s and only 1 P) as it is more commonly referred to, have made it an interesting time to be a healthcare attorney and one focused a lot on the operation of HIPAA. Most of the time, reading articles or social media messages about HIPAA results in my palm smacking my forehead a lot in disbelief. As should be guessed, the numerous mentions of HIPAA result in a lot of misapplication of the law and regulations. Continue reading on HealthIT Answers.
Evolution of Patient Engagement
Remote patient (or physiologic per Medicare) monitoring (RPM) is an area of telehealth receiving a fair amount of attention. The basic premise of RPM is to record and obtain physiologic data about in an individual in their daily life that is then fed to the care team, which in turn enables management of an identified condition. The premise builds upon goals of improving health while also beginning to meet patients where they are. Continue reading on HealthIT Answers.
Healthcare Under Attack
Not a day can go by anymore without a report of at least one data breach (and likely more) or a cyber attack on a healthcare organization. The pace of attacks seemed to increase as the world shutdown in from COVID-19 and security concerns have only continued to increase. The landscape is somewhat frightening from a privacy and operational point of view. Before considering what can be done, it is important to understand the types of threats that are occurring. Continue reading on HealthIT Answers.
Listen in on one of Matt’s Healthcare de Jure episodes.