X
GO
RSS
09

How to Avoid the Dangers of Identity Theft

posted on
By Larry Reed Technical Writer, Design Rush Identity theft occurs when a malicious third party deliberately assumes your identity for the purpose of obtaining some sort of an advantage over you, or otherwise cause you harm. Identity thieves may use your information to make purchases, apply for loans, file tax returns, take control of your […]
Read More
| Categories: Compliance | Tags: Cybersecurity, data encryption, data security, identity theft, phishing, two-factor authentication | View Count: (14)
Margaret C. Scavotto, JD, CHC President, Management Performance Associates Today I am going to tell you about the best compliance culture idea I have ever heard: Pet Posters. That’s right: Using employee pet photos to create posters promoting compliance. This idea is clever, charming, motivating, effective – and the brainchild of Connie Rhoads, Vice President […]
Read More
| Categories: Compliance | Tags: Compliance, compliance, compliance department, compliance program, corporate compliance and ethics week | View Count: (12)
By Adam Turteltaub adam.turteltaub@corporatecompliance.org It’s not always easy walking into the room as a compliance officer.  Employees often tense up and wonder “what now.” It doesn’t have to be that way, and Amsterdam-based Susan Du Becker, Global Compliance Enablement for Cisco, has identified how to build a more positive relationship.  Turning things around, she explains, […]
Read More
| Categories: Compliance | Tags: Podcasts, compliance, corporate culture, ethics, investigations | View Count: (12)
09

It’s the Culture, Stupid

posted on
  By David D. Dodge david@sprtsoc.com About a year and a half ago USA Gymnastics (USAG) released Deborah Daniels’ report which called for a cultural shift in the National Governing Body (NGB).  Ms. Daniels’ investigation was commissioned by USAG following widespread reports of allegations of sexual abuse by its team doctor, Larry Nassar.  Ms. Daniels, […]
Read More
| Categories: Compliance | Tags: Hot Topics, conduct, culture, dallas mavericks, Deborah Daniels, larry nassar, U.S. Olympic Committee, usa gymnastics | View Count: (25)
Do You Know the Difference Between HIPAA Versus the Common Rule?
The HIPAA Privacy Rule establishes the conditions under which protected health information may be used or disclosed by covered entities for research purposes. The Common Rule is a federal policy regarding Human Subjects. Implementation of the Final Rule related to the Common Rule is January 21, 2019. Do you know what the differences are between these two regulations?
Read More
| Categories: AIHC Free CEU Articles, AIHC Professional Articles | Tags: DOD, HHS, OCR, Providers, HIPAA, Security, Privacy, HIPAA Covered Entities, Compliance, Common Rule, Training, Continuing Education | View Count: (387)
28

Telehealth, HIPAA, and Cybersecurity

posted on
Telehealth, HIPAA, and Cybersecurity
Telehealth is an increasingly important tool for healthcare organizations to provide patients with more accessible and affordable care options. However, in the excitement of developing telehealth programs, organizations should not lose sight of privacy and security regulations that apply to these new services. After all, protected health information under HIPAA can include data that is transmitted during the provision of telehealth services.
Read More
| Categories: AIHC Free CEU Articles, AIHC Professional Articles, HIPAA Privacy and Security | Tags: CMS, NIST, Providers, ONC, Medicare and Medicaid, HIPAA, security, Privacy, HIPAA Covered Entities, Compliance, Healthcare Employees, Emergency Preparedness, Telehealth, Training, Health IT, Telemedicine, Continuing Education | View Count: (289)
28

This is what a Social Security scam sounds like

posted on
Earlier this month, we told you about a growing scam: people pretend to be from the Social Security Administration (SSA) and try to get your Social Security number or your money. That scam is now growing exponentially. To compare: in 2017, we heard from 3,200 people about SSA imposter scams, and those people reported losing nearly $210,000. So far THIS year: more than 35,000 people have reported the scam, and they tell us they’ve lost $10 million. Here’s what one of those scam calls sound like:
Read More
| Categories: Cybersecurity | Tags: | View Count: (36)
27

Netflix phishing scam: Don’t take the bait

posted on
Phishing is when someone uses fake emails or texts to get you to share valuable personal information – like account numbers, Social Security numbers, or your login IDs and passwords. Scammers use your information to steal your money, your identity, or both. They also use phishing emails to get access to your computer or network. If you click on a link, they can install ransomware or other programs that can lock you out of your data.
Read More
| Categories: Cybersecurity | Tags: | View Count: (58)
21

NCQA Launches New Population Health Management Programs

posted on
NCQA BlogNCQA Blog - Our mission has always been to improve the quality of health care for all Americans. Toward this end, we are launching two programs that take a more holistic approach to care: Population Health Program Accreditation, which assesses how an organization applies population health concepts to programs for a defined population, and Population Health Management Prevalidation, […]NCQA Launches New Population Health Management ProgramsAlec Bose
Read More
| Categories: Health Care Plans | Tags: | View Count: (41)
NCQA BlogNCQA Blog - In 2013, the Carolina Blood and Cancer Care Associates began to transform to a patient-centered medical home, earning NCQA Recognition as a Patient-Centered Specialty Practice and then as an Oncology Medical Home. In the video below, Dr. Kashyap Patel says the transformation improved quality, saved money, boosted patient satisfaction and inspired his staff. We also […]Carolina Blood and Cancer Care Associates’ Patient-Centered TransformationLawrence Green
Read More
| Categories: Health Care Plans | Tags: | View Count: (71)
Page 4 of 61 First 23[4]56 Last
Search
Blog Subscription
Name

Categories
Articles by Month
AIHC Facebook Feed
HHS
CMS - Centers for Medicare & Medicaid Services
Disclaimer

Articles written by the American Institute of Healthcare Compliance are under Copyright Notice: © 2016-2019 American Institute of Healthcare Compliance, Inc. All Rights Reserved. Views expressed through RSS feeds or remarks made on this blog or website are solely those of the original authors and other contributors and do not necessarily represent those of the American Institute of Healthcare Compliance and/or staff.