PHI Disclosure Management Blog
Your go-to source for Protected Health Information (PHI) disclosure management best practices, success stories, trends and events from the perspectives of our in-house experts.
HIM Workforce Training Webinar Recap
As part of the MRO webinar series this year, I recently presented HIM Workforce Training: Developing an Engaged Team. During this presentation, I discussed best practices for training and retaining your employees based on the evolving health information management...
HIM Life in a COVID World: Health Information Management Webinar Recap
MRO recently kicked off the 2020 webinar series, focusing on best practices related to industry trends and challenges, leadership development and regulatory changes that affect the secure and compliant exchange of protected health information (PHI). My colleague...
Information Blocking: MRO’s Webinar Series Recap
Recently, MRO hosted a webinar series on the 21st Century Cures Act focusing on the Information Blocking Rule and Interoperability. I joined other industry experts to provide highlights of the rule, take a closer look at the technical requirements, and analyze the...
Recent Guidance on Contacting COVID-19 Patients for Blood Donations
The Office for Civil Rights (OCR) at the US Department of Health and Human Services (HHS) recently issued guidance on how providers can contact former COVID-19 patients regarding opportunities for blood and plasma donations. Though healthcare providers can use...
MRO’s Special Webinar Series: Information Blocking
MRO’s four-part special webinar series regarding the Interoperability Rule will teach attendees how this rule helps healthcare data and systems become more standardized, so that data can be exchanged seamlessly. Even if you and your organization are already making...
Security Awareness: How to Remain Safe While Working from Home
Due to the COVID-19 pandemic, many of us are now working from home. Unfortunately, cyber criminals will continue to target individuals and organizations with phishing campaigns in the hopes of exploiting vulnerable systems and services.