SlideShare a Scribd company logo
1 of 15
Rethinking Compliance
A Symposium Synopsis
Provided by:
I attended University of the
Cincinnati’s 28th Annual
Corporate Law Center
Symposium- Rethinking
Compliance.
The Symposium had a lot of great
speakers, great information, and
food for thought. Here are some
memorable quotes from the
speakers:
• On average, 205 days lapse
between when a data security
breach occurs and it is discovered.
• Staff training is not about
teaching the law, it more about
teaching staff to re-think.
• If an unencrypted laptop is
stolen, the OCR wants to talk. The
laptop should have been encrypted
a long time ago.
• Deliberate disregard and
indifference is the same as
knowing.
• If no one is following
company policy, it is a red flag.
• Billing and HIPAA are my
biggest worries.
• The health care industry sends
3% of its technology budget on
security, while all other industries
spend an average 10%.
• 90% of breaches are caused
by failure to safeguard.
• 123456 and ‘password’ are
still the most common
passwords to be breached.
• Encryption is not enough. It
was on these surfaces and
hackers go in.
• Most people want to do the
right thing. It is a matter of
people knowing the right thing.
Information Privacy
• Security Risk Analysis
• Training
• Assessment – Breach
Response
• Tracking – Monitoring
For health plan, providers,
and Business Associates
www.gettinslaw.com 513-400-3895 mbgettins@gettinslaw.com

More Related Content

What's hot

Ilta 2011 balancing km with data privacy facilitated by dave cunningham aug...
Ilta 2011 balancing km with data privacy   facilitated by dave cunningham aug...Ilta 2011 balancing km with data privacy   facilitated by dave cunningham aug...
Ilta 2011 balancing km with data privacy facilitated by dave cunningham aug...
David Cunningham
 

What's hot (9)

Cybersecurity and Legal lessons after Apple v FBI
Cybersecurity and Legal lessons after Apple v FBICybersecurity and Legal lessons after Apple v FBI
Cybersecurity and Legal lessons after Apple v FBI
 
Due Diligence Considerations for Scientists, Commanders, and Politicians As T...
Due Diligence Considerations for Scientists, Commanders, and Politicians As T...Due Diligence Considerations for Scientists, Commanders, and Politicians As T...
Due Diligence Considerations for Scientists, Commanders, and Politicians As T...
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
 
Ilta 2011 balancing km with data privacy facilitated by dave cunningham aug...
Ilta 2011 balancing km with data privacy   facilitated by dave cunningham aug...Ilta 2011 balancing km with data privacy   facilitated by dave cunningham aug...
Ilta 2011 balancing km with data privacy facilitated by dave cunningham aug...
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
 
What is ethical hacking
What is ethical hackingWhat is ethical hacking
What is ethical hacking
 
Information Assurance And Security - Chapter 3 - Lesson 2
Information Assurance And Security - Chapter 3 - Lesson 2Information Assurance And Security - Chapter 3 - Lesson 2
Information Assurance And Security - Chapter 3 - Lesson 2
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
 
Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...
Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...
Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...
 

Similar to Rethinking Compliance

CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...
CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...
CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...
Health IT Conference – iHT2
 
How to Communicate the Actual Readiness of your IT Security Program for PCI 3...
How to Communicate the Actual Readiness of your IT Security Program for PCI 3...How to Communicate the Actual Readiness of your IT Security Program for PCI 3...
How to Communicate the Actual Readiness of your IT Security Program for PCI 3...
RedZone Technologies
 
CHIME LEAD San Francisco 2015 - Opening Keynote "What is Cyber Security and W...
CHIME LEAD San Francisco 2015 - Opening Keynote "What is Cyber Security and W...CHIME LEAD San Francisco 2015 - Opening Keynote "What is Cyber Security and W...
CHIME LEAD San Francisco 2015 - Opening Keynote "What is Cyber Security and W...
Health IT Conference – iHT2
 
Get the FUD out of Cybersecurity! ISACA CSXNA 2016 in Las Vegas
Get the FUD out of Cybersecurity! ISACA CSXNA 2016 in Las VegasGet the FUD out of Cybersecurity! ISACA CSXNA 2016 in Las Vegas
Get the FUD out of Cybersecurity! ISACA CSXNA 2016 in Las Vegas
Shawn Tuma
 
A Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfA Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdf
uzair
 

Similar to Rethinking Compliance (20)

Digital Transformation and Data Protection
Digital Transformation and Data ProtectionDigital Transformation and Data Protection
Digital Transformation and Data Protection
 
CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...
CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...
CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...
 
Digital Transformation and Data Protection in Automotive Industry
Digital Transformation and Data Protection in Automotive IndustryDigital Transformation and Data Protection in Automotive Industry
Digital Transformation and Data Protection in Automotive Industry
 
How to Communicate the Actual Readiness of your IT Security Program for PCI 3...
How to Communicate the Actual Readiness of your IT Security Program for PCI 3...How to Communicate the Actual Readiness of your IT Security Program for PCI 3...
How to Communicate the Actual Readiness of your IT Security Program for PCI 3...
 
CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...
CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...
CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...
 
CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...
CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...
CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...
 
CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorBanning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
 
CHIME LEAD San Francisco 2015 - Opening Keynote "What is Cyber Security and W...
CHIME LEAD San Francisco 2015 - Opening Keynote "What is Cyber Security and W...CHIME LEAD San Francisco 2015 - Opening Keynote "What is Cyber Security and W...
CHIME LEAD San Francisco 2015 - Opening Keynote "What is Cyber Security and W...
 
Where security and privacy meet partnering tips for CSOs and privacy/complian...
Where security and privacy meet partnering tips for CSOs and privacy/complian...Where security and privacy meet partnering tips for CSOs and privacy/complian...
Where security and privacy meet partnering tips for CSOs and privacy/complian...
 
Get the FUD out of Cybersecurity! ISACA CSXNA 2016 in Las Vegas
Get the FUD out of Cybersecurity! ISACA CSXNA 2016 in Las VegasGet the FUD out of Cybersecurity! ISACA CSXNA 2016 in Las Vegas
Get the FUD out of Cybersecurity! ISACA CSXNA 2016 in Las Vegas
 
(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice
 
10 Steps for Taking Control of Your Organization's Digital Debris
10 Steps for Taking Control of Your Organization's Digital Debris 10 Steps for Taking Control of Your Organization's Digital Debris
10 Steps for Taking Control of Your Organization's Digital Debris
 
Common and Concerning Risks In IT
Common and Concerning Risks In ITCommon and Concerning Risks In IT
Common and Concerning Risks In IT
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
A Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfA Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdf
 

More from Gettins' Law LLC

Hipaa cartoons
Hipaa cartoonsHipaa cartoons
Hipaa cartoons
Gettins' Law LLC
 
Contract terms and clauses with special meanings
Contract terms and clauses with special  meaningsContract terms and clauses with special  meanings
Contract terms and clauses with special meanings
Gettins' Law LLC
 
Facts, questions, and answers for franchisors
Facts, questions, and answers for franchisorsFacts, questions, and answers for franchisors
Facts, questions, and answers for franchisors
Gettins' Law LLC
 

More from Gettins' Law LLC (7)

Popquiz slide
Popquiz slidePopquiz slide
Popquiz slide
 
Wendy' Employee Rules Before and After
Wendy' Employee Rules Before and AfterWendy' Employee Rules Before and After
Wendy' Employee Rules Before and After
 
Health Care Mobility: Staying Securely Connected
Health Care Mobility: Staying Securely ConnectedHealth Care Mobility: Staying Securely Connected
Health Care Mobility: Staying Securely Connected
 
Hipaa cartoons
Hipaa cartoonsHipaa cartoons
Hipaa cartoons
 
Contract terms and clauses with special meanings
Contract terms and clauses with special  meaningsContract terms and clauses with special  meanings
Contract terms and clauses with special meanings
 
Release of Claims
Release of ClaimsRelease of Claims
Release of Claims
 
Facts, questions, and answers for franchisors
Facts, questions, and answers for franchisorsFacts, questions, and answers for franchisors
Facts, questions, and answers for franchisors
 

Recently uploaded

Catheterization Procedure by Anushri Srivastav.pptx
Catheterization Procedure by Anushri Srivastav.pptxCatheterization Procedure by Anushri Srivastav.pptx
Catheterization Procedure by Anushri Srivastav.pptx
AnushriSrivastav
 
Liver Function Test.ppt MBBS A healthcare provider draws a small amoun
Liver Function Test.ppt MBBS A healthcare provider draws a small amounLiver Function Test.ppt MBBS A healthcare provider draws a small amoun
Liver Function Test.ppt MBBS A healthcare provider draws a small amoun
ssuser77fe3b
 
Cytotec 200mcg tab in Riyadh (+919101817206// Get Abortion Pills in Saudi Arabia
Cytotec 200mcg tab in Riyadh (+919101817206// Get Abortion Pills in Saudi ArabiaCytotec 200mcg tab in Riyadh (+919101817206// Get Abortion Pills in Saudi Arabia
Cytotec 200mcg tab in Riyadh (+919101817206// Get Abortion Pills in Saudi Arabia
jaanualu31
 
ITM HOSPITAL The hospital has also been recognised as the best emerging hosp...
ITM  HOSPITAL The hospital has also been recognised as the best emerging hosp...ITM  HOSPITAL The hospital has also been recognised as the best emerging hosp...
ITM HOSPITAL The hospital has also been recognised as the best emerging hosp...
jvomprakash
 
Healthcare Market Overview, May 2024: Funding, Financing and M&A, from Oppenh...
Healthcare Market Overview, May 2024: Funding, Financing and M&A, from Oppenh...Healthcare Market Overview, May 2024: Funding, Financing and M&A, from Oppenh...
Healthcare Market Overview, May 2024: Funding, Financing and M&A, from Oppenh...
Levi Shapiro
 
Obat aborsi Jakarta Timur Wa 081225888346 Jual Obat aborsi Cytotec asli Di Ja...
Obat aborsi Jakarta Timur Wa 081225888346 Jual Obat aborsi Cytotec asli Di Ja...Obat aborsi Jakarta Timur Wa 081225888346 Jual Obat aborsi Cytotec asli Di Ja...
Obat aborsi Jakarta Timur Wa 081225888346 Jual Obat aborsi Cytotec asli Di Ja...
icha27638
 

Recently uploaded (20)

The Power of Technology and Collaboration in Research - Rheumatology Research...
The Power of Technology and Collaboration in Research - Rheumatology Research...The Power of Technology and Collaboration in Research - Rheumatology Research...
The Power of Technology and Collaboration in Research - Rheumatology Research...
 
GENETICS and KIDNEY DISEASES /
GENETICS and KIDNEY DISEASES            /GENETICS and KIDNEY DISEASES            /
GENETICS and KIDNEY DISEASES /
 
Catheterization Procedure by Anushri Srivastav.pptx
Catheterization Procedure by Anushri Srivastav.pptxCatheterization Procedure by Anushri Srivastav.pptx
Catheterization Procedure by Anushri Srivastav.pptx
 
Young & Hot ℂall Girls Kolkata 8250077686 WhatsApp Number Best Rates of Kolka...
Young & Hot ℂall Girls Kolkata 8250077686 WhatsApp Number Best Rates of Kolka...Young & Hot ℂall Girls Kolkata 8250077686 WhatsApp Number Best Rates of Kolka...
Young & Hot ℂall Girls Kolkata 8250077686 WhatsApp Number Best Rates of Kolka...
 
Young & Hot ℂall Girls Mumbai 8250077686 WhatsApp Number Best Rates of Mumbai...
Young & Hot ℂall Girls Mumbai 8250077686 WhatsApp Number Best Rates of Mumbai...Young & Hot ℂall Girls Mumbai 8250077686 WhatsApp Number Best Rates of Mumbai...
Young & Hot ℂall Girls Mumbai 8250077686 WhatsApp Number Best Rates of Mumbai...
 
VIP ℂall Girls Prabhadevi Point 8250077686 WhatsApp: Me All Time Serviℂe Avai...
VIP ℂall Girls Prabhadevi Point 8250077686 WhatsApp: Me All Time Serviℂe Avai...VIP ℂall Girls Prabhadevi Point 8250077686 WhatsApp: Me All Time Serviℂe Avai...
VIP ℂall Girls Prabhadevi Point 8250077686 WhatsApp: Me All Time Serviℂe Avai...
 
An overview of Muir Wood Adolescent and Family Services teen treatment programs.
An overview of Muir Wood Adolescent and Family Services teen treatment programs.An overview of Muir Wood Adolescent and Family Services teen treatment programs.
An overview of Muir Wood Adolescent and Family Services teen treatment programs.
 
clostridiumbotulinum- BY Muzammil Ahmed Siddiqui.pptx
clostridiumbotulinum- BY Muzammil Ahmed Siddiqui.pptxclostridiumbotulinum- BY Muzammil Ahmed Siddiqui.pptx
clostridiumbotulinum- BY Muzammil Ahmed Siddiqui.pptx
 
Etiology for RRT and Code Blue Workshop.
Etiology for RRT and Code Blue Workshop.Etiology for RRT and Code Blue Workshop.
Etiology for RRT and Code Blue Workshop.
 
Session-1-MBFHI-A-part-of-the-Global-Strategy.ppt
Session-1-MBFHI-A-part-of-the-Global-Strategy.pptSession-1-MBFHI-A-part-of-the-Global-Strategy.ppt
Session-1-MBFHI-A-part-of-the-Global-Strategy.ppt
 
Navigating Conflict in PE Using Strengths-Based Approaches
Navigating Conflict in PE Using Strengths-Based ApproachesNavigating Conflict in PE Using Strengths-Based Approaches
Navigating Conflict in PE Using Strengths-Based Approaches
 
mHealth Israel_Healthcare Finance and M&A- What Comes Next
mHealth Israel_Healthcare Finance and M&A- What Comes NextmHealth Israel_Healthcare Finance and M&A- What Comes Next
mHealth Israel_Healthcare Finance and M&A- What Comes Next
 
Liver Function Test.ppt MBBS A healthcare provider draws a small amoun
Liver Function Test.ppt MBBS A healthcare provider draws a small amounLiver Function Test.ppt MBBS A healthcare provider draws a small amoun
Liver Function Test.ppt MBBS A healthcare provider draws a small amoun
 
End of Response issues - Code and Rapid Response Workshop
End of Response issues - Code and Rapid Response WorkshopEnd of Response issues - Code and Rapid Response Workshop
End of Response issues - Code and Rapid Response Workshop
 
Cytotec 200mcg tab in Riyadh (+919101817206// Get Abortion Pills in Saudi Arabia
Cytotec 200mcg tab in Riyadh (+919101817206// Get Abortion Pills in Saudi ArabiaCytotec 200mcg tab in Riyadh (+919101817206// Get Abortion Pills in Saudi Arabia
Cytotec 200mcg tab in Riyadh (+919101817206// Get Abortion Pills in Saudi Arabia
 
Leading large scale change: a life at the interface between theory and practice
Leading large scale change: a life at the interface between theory and practiceLeading large scale change: a life at the interface between theory and practice
Leading large scale change: a life at the interface between theory and practice
 
Coach Dan Quinn Commanders Feather T Shirts
Coach Dan Quinn Commanders Feather T ShirtsCoach Dan Quinn Commanders Feather T Shirts
Coach Dan Quinn Commanders Feather T Shirts
 
ITM HOSPITAL The hospital has also been recognised as the best emerging hosp...
ITM  HOSPITAL The hospital has also been recognised as the best emerging hosp...ITM  HOSPITAL The hospital has also been recognised as the best emerging hosp...
ITM HOSPITAL The hospital has also been recognised as the best emerging hosp...
 
Healthcare Market Overview, May 2024: Funding, Financing and M&A, from Oppenh...
Healthcare Market Overview, May 2024: Funding, Financing and M&A, from Oppenh...Healthcare Market Overview, May 2024: Funding, Financing and M&A, from Oppenh...
Healthcare Market Overview, May 2024: Funding, Financing and M&A, from Oppenh...
 
Obat aborsi Jakarta Timur Wa 081225888346 Jual Obat aborsi Cytotec asli Di Ja...
Obat aborsi Jakarta Timur Wa 081225888346 Jual Obat aborsi Cytotec asli Di Ja...Obat aborsi Jakarta Timur Wa 081225888346 Jual Obat aborsi Cytotec asli Di Ja...
Obat aborsi Jakarta Timur Wa 081225888346 Jual Obat aborsi Cytotec asli Di Ja...
 

Rethinking Compliance

  • 1. Rethinking Compliance A Symposium Synopsis Provided by:
  • 2. I attended University of the Cincinnati’s 28th Annual Corporate Law Center Symposium- Rethinking Compliance.
  • 3. The Symposium had a lot of great speakers, great information, and food for thought. Here are some memorable quotes from the speakers:
  • 4. • On average, 205 days lapse between when a data security breach occurs and it is discovered.
  • 5. • Staff training is not about teaching the law, it more about teaching staff to re-think.
  • 6. • If an unencrypted laptop is stolen, the OCR wants to talk. The laptop should have been encrypted a long time ago.
  • 7. • Deliberate disregard and indifference is the same as knowing.
  • 8. • If no one is following company policy, it is a red flag.
  • 9. • Billing and HIPAA are my biggest worries.
  • 10. • The health care industry sends 3% of its technology budget on security, while all other industries spend an average 10%.
  • 11. • 90% of breaches are caused by failure to safeguard.
  • 12. • 123456 and ‘password’ are still the most common passwords to be breached.
  • 13. • Encryption is not enough. It was on these surfaces and hackers go in.
  • 14. • Most people want to do the right thing. It is a matter of people knowing the right thing.
  • 15. Information Privacy • Security Risk Analysis • Training • Assessment – Breach Response • Tracking – Monitoring For health plan, providers, and Business Associates www.gettinslaw.com 513-400-3895 mbgettins@gettinslaw.com