By: Alaap Shah and Marshall Jackson
Data is going digital, devices are going mobile, and technology is revolutionizing how care is delivered. It seems to be business as usual, as your health care organization continues to digitize its operations. You have even taken measures to help guard against the “typical” risks such as lost laptops, thumb drives and other electronic devices. However, unbeknownst to you, hackers sit in front of their computers looking for ways into your network so that they may surreptitiously peruse through confidential financial records and sensitive ...
Blog Editors
Recent Updates
- Listen: DOJ’s Bulk Sensitive Data Transfer Rule: Key Insights for Health Care Compliance Teams – Diagnosing Health Care
- FDA Launches Home Innovation Challenge for Medical Device Technologies
- FDA Meeting Invites Stakeholders to Weigh in on Dietary Supplement Ingredients
- California Targeted in House Committee Investigation of Hospice Fraud
- HHS OIG Issues Favorable Advisory Opinion Regarding Surgical Supply Discounts to Ambulatory Surgery Centers in Exchange for Software Purchases