Compliance & Legal

4 steps to move from cybersecurity to cyber resilience
05:05 pm September 29, 2022
As the number and severity of cyberattacks, including ransomware attacks, increase, many healthcare organisations are realising that they need to not only protect against cyberattacks, but also to plan for cyber resilience – being able to recover quickly and remain operational in case of an attack. Creating a more cyber-aware organisation...
Quick guide to HIPAA-compliant communication between healthcare providers
Sponsored
By 05:19 pm August 08, 2022
In healthcare, collaborative communications are critical for success. Members of a care coordination team must work together closely and share information with one another to ensure positive patient outcomes – while still staying compliant with HIPAA regulations. Using non-compliant channels for communication between care teams can result in...
6 actions payers can take to prepare for the No Surprises Act
Sponsored
By 04:49 pm August 08, 2022
The No Surprises Act, which seeks to increase transparency regarding medical billing and patient cost-sharing responsibility, was signed into law in late 2020 and went into effect January 2022. Although the No Surprises Act seeks to relieve some of the worries patients have about cost of care, it creates increased pressure on healthcare payers and...
Securing healthcare APIs for the 21st Century Cures Act
04:22 pm July 11, 2022
Healthcare organizations are facing a crucial deadline to address network and API security requirements tied to the 21st Century Cures Act. Healthcare providers and payers must give patients easier access to their health data and put security in place to guard that data – or face noncompliance penalties.
Beyond healthcare compliance: Are you doing enough to ensure visibility across your entire network? [Executive Brief]
06:00 pm July 05, 2022
With more hackers than ever targeting healthcare organizations to get access to patient data, healthcare IT professionals need a complete and accurate inventory of all devices on their network. In an increasingly complex environment, knowing not only how many devices are connected to your network, but also what applications they’re running,...
Healthcare API Interoperability: An implementation guideline
05:53 pm May 27, 2022
The lack of interoperability in healthcare ecosystems is a critical issue for U.S. healthcare. The recent issuance of the Interoperability and Patient Access final rule (CMS-9115-F) by the Centers for Medicare & Medicaid Services (CMS) addresses this by driving interoperability and providing patients with access to their own health information...
Healthcare APIs – Looking beyond compliance
05:51 pm May 27, 2022
Recently, as part of a shift to more patient-centered, value-driven healthcare, regulations such as the Interoperability and Patient Access final rule (CMS-9115-F) and the 21st Century Cures Act have been put into place to help put patients first and empower them to control their data and take a more active role in their own care. APIs make...
Doctor talking to executive.
01:00 pm February 19, 2020
The Health Insurance Portability and Accountability Act (HIPAA) requires covered entities (i.e., health care providers, health plans, and health care clearinghouses) to safeguard the privacy and security of individuals’ PHI. As healthcare providers and other covered entities continue to outsource tasks to business associates, third-party...
Whitepaper cover.
11:59 am September 10, 2019
On any given day, providers utilize countless systems and applications that are essential to their regular workflow. With sensitive patient information residing in and passing through these systems, provider organizations must have continuity and consistency in delivering reasonable freedom of access while avoiding unintended, consequential...
Whitepaper cover.
11:55 am September 10, 2019
The complexity of protecting health data in the current threat environment is ushering in the next era of cybersecurity that incorporates machine-learning capabilities within identity management. But what makes it essential for IT administrators and data owners to enforce security policies and reduce risky behavior?