Illness, Disability, and Workplace Performance: A Guide for Employers
Episode 384 -- Third-Party Risks and Sanctions
Building a Team of Trusted Advisors
ERGs: Valuable or Vulnerable?
Navigating U.S.-China Relations: Lessons From History for Today’s Global Economy
Work This Way: A Labor & Employment Law Podcast | How Employers Can Protect Intellectual Property with Bryan Baysinger of Maynard Nexsen
Regulatory Rollback: Impact of the CFPB's Withdrawal of Overdraft and Deposit Account Fee Guidance on Financial Institutions and Related Litigation Risks — The Consumer Finance Podcast
Protect Yourself and Your Business with Indemnification Understanding
False Claims Act Insights - An FCA Perspective on Artificial Intelligence in the Healthcare Industry
Data Driven Compliance: The Failure to Prevent Fraud Offense: Insights for US General Counsels with Mike DeBernardis
AI Today in 5: August 22, 2025, The Angst Episode
The Privacy Insider Podcast Episode 17: Security, Cyber-Intel, and a Sense of Humor with Nir Rothenberg of Rapyd
Demystifying Wage and Hour Audits: One-on-One with Courtney McFate
Compliance Tip of the Day: Using AI to Embed Your Compliance Program
Daily Compliance News: August 22, 2025, The WADA Returns Edition
Culture Crafters: Building a Culture of Accountability in the Face of Disasters
Hot Topics in International Trade - The Daunting Task of Export Compliance With Braumiller Law Group
New FLSA Notice Standard, DOL’s PAID Program, Axed Wage and Hour Penalties - #WorkforceWednesday® - Employment Law This Week®
Cuando la marca viaja en turista y sin registro
Compliance Tip of the Day: Trust and Verify
Host Nick Healey welcomes to the show Deb Wade, who serves as the medical staff coordinator at a large rural hospital, to discuss the confidentiality and privilege protections that medical staff routinely encounter as they...more
Arecent report put the odds of an asteroid hitting the earth in December 2032 at 3.1%—which is 3,100 times more likely than an organization resolving an enforcement action with the U.S. Department of Health and Human...more
In today's digital age, the health care industry faces a growing threat from scammers who don't have to use sophisticated cyberattacks; they can use the most routine task to steal information from unwitting and...more
The Cybersecurity and Infrastructure Agency (CISA) is seeking comment on a proposed rule to implement reporting requirements for critical infrastructure entities, including health care entities, on cyberattacks and ransomware...more
Report on Patient Privacy 23, no. 12 (December, 2023) Northwell Health in New York and Cook County Health in Chicago each experienced impacts from a breach at Nevada-based transcription company Perry Johnson & Associates...more
Newly enacted Assembly Bill 1184 (“AB 1184”) will effectuate revisions to the Confidentiality of Medical Information Act that will require significant changes to the operational practices and risk management assessments of...more
Ransomware Particularly Inflicts Health Care and Life Sciences Organizations - Ransomware is a malicious cyber threat vector that employs encryption malware to prevent users from accessing their systems and data unless...more
Our Virtual Regional Healthcare Compliance Conferences provide updates on the latest news in regulatory requirement, compliance enforcement, and strategies to develop effective compliance programs. Watch, listen, and ask...more
Elizabeth Barry Heddleston Associate Now is a great time for healthcare providers to assess their compliance with HIPAA’s right of access requirements. Not only is this a hot area of enforcement, patients’ rights to access...more
Users of Universal Health Services (UHS), one of the largest healthcare systems in the country, recently lost access to electronic medical records when UHS suffered a ransomware attack and took its systems offline to...more
Given the choice between credit card data and digital health records, cybercriminals prefer the latter. A stolen credit card can be canceled. Electronic protected health information (ePHI) with its treasure-trove of...more
Access to healthcare information (or lack thereof) has always been touted as one of the key factors/necessities to realizing the promise of technology in the delivery of healthcare. Despite various legislative, judicial,...more
Most health care providers are aware that the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) and its accompanying negotiations provide for the privacy and security of patients’ health care...more