Click here to go to the previous page
Responding to Data Breaches--from A to Z
Program Code:
M-29
Date:
Monday, October 17, 2011
Time:
3:00 PM to 4:00 PM
EST
CO-PRESENTER
:
Ms. Keefe provides regulatory and transactional guidance to a variety of health care organizations
including proprietary and not-for-profit health systems, academic medical centers, health insurance and
managed care organizations and vendors to the health care industry. She counsels her clients on federal
and state health care reform, managed care contracting, fraud and abuse, electronic medical records,
health information privacy and security, facility licensing, medical staff issues, regulatory compliance and
government reimbursement programs, including Medicare Advantage, Part D and state Medicaid
programs.
Ms. Keefe served as Deputy General Counsel at Independence Blue Cross where she was head of the
health insurer’s managed care law group and as General Counsel of Keystone Health Plan East. She is
also a frequent speaker on health law issues for trade and professional associations including the
American Health Lawyers Association and the Pennsylvania Bar Institute.
|
PRESENTER
:
Theodore Kobus,
Esq., Chair, Technology, Media, and Intellectual Property Practice Group,
Marshall Dennehey Warner Coleman & Goggin
Ted advises and speaks with clients, trade groups and organizations
regarding Data Security and Privacy issues and breaches,
as they relate to various industries including healthcare companies,
insurance companies, educational institutions, retail stores,
restaurants, financial organizations, and technology companies. Ted and his group have counseled clients involved in significant breaches implicating state and federal laws, international
laws, and other regulations and requirements. Teds
group has dealt with Offi ces of Attorneys General, state insurance
departments, Offi ce of Civil Rights/Health and Human Services, Secret Service, FBI, local police and forensics professionals as part
of their handling of data breaches.
|
Description
Everyone is using laptops, CDs, DVDs, jump drives, external drives, virtual servers,emails, FTP sites, Blackberries, IPhones...and the list goes on and on. Has this technology
really made our daily lives easier? We cannot turn on the television or open a newspaper without seeing a report about lost, stolen, misdirected, or missing data. It seems like the
cyber liability landscape changes every day. Nationally known technology/IP and HIPAA regulatory attorneys will provide different perspectives on what this means for health care organizations, and what needs to be done without hitting the panic button.
LEARNER OUTCOMES:
-
Analyze and apply the different laws and regulations governing breach preparation and response
-
Consider the efforts and costs involved when responding to a breach
-
Recognize issues and utilize tools to protect against the regulatory fallout following a breach