This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
AI Adoption and Governance: Nearly three-quarters of organizations are using or considering AI for compliance functions, but many struggle to develop governance structures for this rapidly evolving technology. Kelly , partner and chair of Barnes & Thornburg’s Healthcare Department and Healthcare Industry practice.
We can’t give up the digital transformations we’ve made in our organizations but we also can’t ignore the looming threat of security threats and ransomware attacks. It involves a comprehensive approach that integrates strong governance policies, advanced technology, and vigilant human oversight.
This point has been reinforced through several subsequent HHS publications – most notably a recent Fact Sheet that answers questions about ransomware and whether or not a ransomware attack is a reportable breach under the HIPAA Breach Notification Rule. Privacy Rule HIPAA Safeguards.
People click on links in emails promising “free $100 Amazon gift cards” that secretly install malware, spyware, or ransomware. That starts by having effective policies and procedures to govern the use and access of PHI within your organization. Do you take the time to do real duediligence on what they deliver?
Government mandates were an impetus for change, starting with the Health Information Technology for Economic and Clinical Health (HITECH) Act, enacted as part of the American Recovery and Reinvestment Act (ARRA) of 2009 to “promote the adoption and meaningful use of health information technology” (Office of Civil Rights (OCR), 2017).
Hospitals, for example, have increasingly been the target of malware and ransomware attacks. Third-Party Vendor Assessment: Duediligence is required to thoroughly vet third-party vendors and their cybersecurity practices. Traditional security measures are better positioned to manage AI-related threats from cyber-criminals.
We organize all of the trending information in your field so you don't have to. Join 26,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content