From the Desk of Matt Fisher – ICYMI
By Matt Fisher, Esq
Twitter: @matt_r_fisher
Host of Healthcare de Jure – #HCdeJure
Tune in weekdays at 2pm, 10pm or 6am ET as Matt serves up the hottest healthcare issues of the day, all from a legal point of view. From public policies and Federal initiatives to privacy and security, join host Matt R. Fisher as he and his guests discuss a smorgasbord of topics, giving hospitals, physicians, vendors and patients a seat at the table. Matt’s virtual conversations can be listened to on demand or heard on air. So don’t miss a minute of what’s on the menu.
ICYMI, read the latest of Matt’s blogs. And don’t forget to join the conversation with Matt on #HCdeJure.
Start the Year Strong: Privacy and Security Checkpoints
The turn of the calendar to a new year frequently brings renewed energy and excitement to various activities. While the new energy may feel like it is in short supply given the repetitive feeling for the beginning of 2022 as a result of yet another COVID19 surge, hopefully focusing on something other than the virus can offer a means of creating some of the typical optimistic approaches to the new year. Continue reading on HealthIT Answers.
A Broken Record: Just Give Access
The ongoing enforcement effort from the HHS Office for Civil Rights (OCR) around the HIPAA right of access continues to run in full swing. The continuous enforcement actions reflect a number of different issues. One, organizations are still not appropriately responding to requests or implementing appropriate policies for responding. Two, OCR understands the reality of non-compliance and is attempting to drive better action on respecting rights under the regulations. Three, a murky situation is not clearing up despite heightened attention to the right of access. Continue reading on HealthIT Answers.
Vendors and HIPAA
An important part of establishing strong security for an organization rests with how it interacts with its vendors. The creation of a chain of entities creating, interacting with, storing, or otherwise handling sensitive patient information starts at the top, but can easily and frequently go down many layers. Given the layered approach, every time an organization introduces a new sublayer that organization must keep security as a forefront consideration. The risks associated with vendors not appropriately deploying security measures can be seen with the increasing number of data breaches resulting from an issue at the vendor level. Given that reality, what should or should not happen at each vendor level? Continue reading on HealthIT Answers.
Listen in on one of Matt’s Healthcare de Jure episodes.