Harnessing “Big Data” to Create Value
In the wake of the recent breaches at Epsilon and Sony and the scrutiny Apple and Google are facing for their geolocation data tracking practices, there has been little media focus on the benefits of...
View ArticleOMG! Does Your Doctor’s Facebook Status Violate HIPAA?
Co-authored by: Cory Fox Recently, the Federation of State Medical Boards (“the Federation”) released its Model Policy Guidelines for the Appropriate Use of Social Media and Social Networking in...
View ArticleCourt Overturns Presuit Patient Authorization Requirement Under Florida...
On September 25, 2013, the Northern District Court of Florida, Tallahassee Division, ruled that Florida Statute § 766.1065 violated the Health Insurance Portability and Accountability Act of 1996...
View ArticleHealthcare Privacy – 2013 Year in Review
Authors: Lynn Sessions, Kimberly Wong, Cory Fox and Anne Foster. On January 25, 2013, the U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR) published the long-awaited...
View ArticleObama Administration Recognizes Cyber Threats to U.S. Critical Infrastructure...
Many cybersecurity experts have warned that the United States is already engaged in covert cyber warfare against hostile actors around the world. The latest cybersecurity Executive Order reflects...
View Article2015 BakerHostetler Security Incident Response Report Provides Insight Beyond...
There is no longer a debate – security incidents are inevitable. Organizations are working to be better prepared to respond when the first sign of an incident is detected (often at 4:30 p.m. on a...
View ArticleHarnessing “Big Data” to Create Value
In the wake of the recent breaches at Epsilon and Sony and the scrutiny Apple and Google are facing for their geolocation data tracking practices, there has been little media focus on the benefits of...
View ArticleOMG! Does Your Doctor’s Facebook Status Violate HIPAA?
Co-authored by: Cory Fox Recently, the Federation of State Medical Boards (“the Federation”) released its Model Policy Guidelines for the Appropriate Use of Social Media and Social Networking in...
View ArticleCourt Overturns Presuit Patient Authorization Requirement Under Florida...
On September 25, 2013, the Northern District Court of Florida, Tallahassee Division, ruled that Florida Statute § 766.1065 violated the Health Insurance Portability and Accountability Act of 1996...
View ArticleHealthcare Privacy – 2013 Year in Review
Authors: Lynn Sessions, Kimberly Wong, Cory Fox and Anne Foster. On January 25, 2013, the U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR) published the long-awaited...
View ArticleObama Administration Recognizes Cyber Threats to U.S. Critical Infrastructure...
Many cybersecurity experts have warned that the United States is already engaged in covert cyber warfare against hostile actors around the world. The latest cybersecurity Executive Order reflects...
View Article2015 BakerHostetler Security Incident Response Report Provides Insight Beyond...
There is no longer a debate – security incidents are inevitable. Organizations are working to be better prepared to respond when the first sign of an incident is detected (often at 4:30 p.m. on a...
View ArticleDeeper Dive: Integrating Physician Practices into a Health System’s HIPAA...
The healthcare industry shift to a value-based business model is resulting in greater alignment between hospitals and physicians to provide quality, outcomes driven care in order to receive payment for...
View ArticleBusiness Associates in the Crosshairs: Catholic Health Care Services Settles...
Catholic Health Care Services of the Archdiocese of Philadelphia (CHCS) recently agreed to enter into a $650,000 resolution agreement and a two-year corrective action plan (CAP) with the Office for...
View ArticleDeeper Dive: Frequency and Severity
All industries are affected by cyberattacks, but how often and to what extent they occur vary greatly by industry type. Industry Type As for frequency, the healthcare industry in 2016, for the third...
View ArticleSAMHSA Updates Privacy Regulations to Reflect Advancements in Healthcare
On Jan. 3, 2018, the Substance Abuse and Mental Health Services Administration (SAMHSA) issued its final rule regarding the Confidentiality of Substance Use Disorder Patient Records Part 2. These...
View ArticleFDA Regional Incident Preparedness and Response Playbook Provides Guidance to...
Earlier this month, the Mitre Corporation, on behalf of the Food and Drug Administration (FDA), released the Medical Device Cybersecurity Regional Incident Preparedness and Response Playbook (the...
View ArticleHHS Issues Cybersecurity Guidance for Healthcare Organizations
BakerHostetler will post a series of blogs to fully explore the recommendations and guidance Health and Human Services provides healthcare organizations in its report. Cyberattacks continue to rise...
View ArticleWhat Can We Learn From the Healthcare Data Breach ‘Wall of Shame’?
In addition to dealing with the public outcry and regulatory scrutiny resulting from a healthcare data breach, covered entities under the Health Insurance Portability and Accountability Act (or their...
View ArticleBest Cybersecurity Practices for Healthcare Organizations – Ransomware...
This article is part of a series of blog posts exploring the recommendations and guidance Health & Human Services (HHS) provides to healthcare organizations in its “Cybersecurity Best Practices”...
View Article