SlideShare a Scribd company logo
A            flash drive goes
             missing. A laptop
             gets stolen. An                                 Data breaches
                                                             are costly
employee tosses old patient
files in the trash.
    It can happen. Medical
data breaches represented
more than 24 percent of all
data breaches reported
nationwide in 2010, accord-
ing to the Identity Theft
                                  Protect yourself and your practice
Resource Center.
                                                                           Under HITECH, providers do not need to take any action if lost
    However, many breaches go unreported publicly because they
                                                                       or stolen data is encrypted. Nevertheless, no security plan is 100
involve fewer than 500 records. In those cases, the Health
                                                                       percent foolproof.
Information Technology for Economic and Clinical Health
                                                                           In the event of a breach, comprehensive general liability (CGL)
(HITECH) Act requires only that a provider or other covered
                                                                       policies do not cover any losses. This lack has spurred the rise of
entity notify the secretary of the Department of Health and
                                                                       cyber liability or data breach insurance.
Human Services of a breach within 60 days of the end of the calendar
                                                                           Some medical malpractice insurers now include data breach
year in which the breach occurred.
                                                                       insurance in their general malpractice policies. Some commercial
    Providers should have security measures that comply with the
                                                                       liability insurers offer coverage as an enhancement to a CGL policy.
strengthened enforcement and privacy protections provided under
                                                                       But most insurers can provide
HITECH and the Health Insurance Portability and Accountability
Act โ€“ better known as HIPAA. Protect your data with antivirus
                                                                       stand-alone policies to help protect
                                                                       organizations from what can be a
                                                                                                                      Inside
software, network firewalls and encryption.
                                                                       financial nightmare.
                                                                           The cost of dealing with a healthcare
                                                                       breach averages $301 per compromised
                                                                                                                   July/August 2011

                               T   he cost of dealing with
                                     a healthcare breach
                                    averages $301 per
                                                                       record, according to the 2010 U.S. โžœ	 our practice is a business:
                                                                       Cost of a Data Breach study released
                                                                       by Ponemon Institute in March 2011.
                                                                                                                    	
                                                                                                                    Y
                                                                                                                    Is it managed that way?
                                                                       For the average physicianโ€™s panel of โžœ	 autious steps wise when
                                                                                                                    	
                                                                                                                    C
                                  compromised record.                  2,030 patients, a breach can total more      merging medical practices
                                                                       than $611,000.
                                                                           Expenses include legal, investigative,
                                                                       audit and administrative services, as
                                                                                   See Data breaches on page 2
                                                                                                                      Inside

                             A financial and management bulletin to physicians and medical practices from:




                                                  CERTIFIED PUBLIC ACCOUNTANTS
                                     3330 W. Esplanade Avenue โ€ข Suite 100 โ€ข Metairie, Louisiana 70002
                                       (504) 838-9991 โ€ข Fax: (504) 833-7971 โ€ข www.kl-cpa.com
Data breaches continued from page 1                                      The cost of a $1 million policy can run from a minimum of
                                                                      $1,500 to $5,000 or more, depending on a practiceโ€™s size and
well as the loss of patients and reputation. Of the 15 industries     number of data records, policy features and associated risks.
covered in the Ponemon study, health care and pharmaceuticals         Underwriters will want to know that a practice is financially
shared the top spot for abnormal turnover of customers after an       stable, has not had any losses and has mitigated risk.
incident.
    Then there are the federal and state regulators. They can
impose hefty penalties for mishandled data.
    In March, Massachusetts General Hospital was fined
$1 million for the loss of 192 patientsโ€™ files inadvertently left
on a subway train by an employee. Unintentional employee
action, lost or stolen computing devices, and third-party error
were the major causes of healthcare data breaches, according
                                                                                                                   E   xperts believe the
                                                                                                                       number of breaches
                                                                                                                   is certain to rise as we
to a Ponemon study.                                                                                                move toward greater
    When purchasing data breach insurance, be aware that
policies vary considerably from carrier to carrier. For example,                                                   adoption of electronic
some insurers offer additional coverage for civil penalties or                                                     health records.
regulatory fines. Others do not.
    Many states prohibit coverage for statutory or regulatory
fines and penalties as against public policy. An insurer might
include third-party exposure but not first-party coverage.
    Read exclusions carefully. Although a policy might include           Mitigating risk includes written policies and procedures,
first-party coverage, it could exclude the acts of a rogue            employee training and monitoring, installation of appropriate
employee. A knowledgeable broker or consultant can help you           computer security software, and contractual allocation of
review policy terms to ensure that you get coverage to best fit       liability, among other things.
your needs.                                                              Purchasing insurance does not absolve an organization
    Generally, comprehensive stand-alone policies can cover           from complying with federal and state regulations, ensuring
costs, up to certain limits, for items such as:                       that security measures are in place, or having a plan of action
                                                                      should a data breach occur.
    โ–ฒ Legal defense
                                                                         Experts believe the number of breaches is certain to rise as
    โ–ฒ Investigation and forensic services                             we move toward greater adoption of electronic health records.
    โ–ฒ Notification requirements as stipulated under the               The Ponemon Institute has developed a data breach risk
      HITECH Act                                                      calculator that can estimate an organizationโ€™s risk profile, the
                                                                      average cost per compromised record and the average cost per
    โ–ฒ Credit monitoring for affected individuals                      breach.
    โ–ฒ Data recovery                                                      You can also see how your risk profile compares with other
                                                                      healthcare organizations and industries. To check your risk,
    โ–ฒ Public relations management
                                                                      go to http://databreachcalculator.com.sapin.arvixe.com. โ€“
    โ–ฒ Network and/or business interruption                            Irene E. Lombardo


                             The root causes of patient data loss or theft
                Unintentional action                                                                               52%
  Lost or stolen computing device                                                                      41%
                      Third-party snafu                                                      34%
            Technical systems glitch                                                       31%
                        Criminal attack                                   20%
                      Malicious insider                             15%
 Intentional non-malicious action                           10%
                                            0%         10%            20%            30%         40%         50%         60%

      Source: Benchmark Study on Patient Privacy and Data Security, Ponemon Institute LLC, Nov. 9, 2010



2                                                 July/August 2011 Your Healthy Practice
Your practice is a business:
   Is it managed
   that way?
   M
             edical prac tices
             succeed by design,
             not by accident.
      Approximately 80 percent                                       person who shares that vision and has experience managing
   of all new businesses fail                                        toward those goals.
   because their owners do not                                          The only truly indispensable employee in your practice
   take the time to formulate a                                      should be you.
   business plan and manage its
   execution. In this regard,
                                                                         3.		 ractice	management	does	not	
                                                                            P
   health care is like any other                                            equate	to	business	management.
   business.                                        Practice management focuses on the delivery of care to
      Here are four reasons                      patients. Business management focuses on allowing the
   why medical practices fail as                 practice to be successful.
   a business:                                      Unless the business is well managed, the practice cannot
                                                 succeed. Running your own medical practice is a for-profit
      1.	 	 our	medical	skills	do	not	guarantee	 operation. It should be run like the business it is.
          Y
          success.
      There are many talented people who are unable to run a             4.		 atient	care	is	not	the	key	to		
                                                                            P
   successful business. Being an expert with a particular set of            profitability.
   skills that are in high demand is a good start, but it is no         It is fair to say that no one is born with basic business
   guarantee of financial success.                                   management skills. You should be willing to take a week
      History is littered with smart people who could not take a     out of your career for a course in business management.
   new product or idea and make it into a commercial success.           You should also plan to spend 25 to 30 percent of your
                                                                     time focused on the business of the practice, not on seeing
      2.		 our	office	manager	should	not	run	
         Y                                                           patients. If you are going to invest in a medical practice,
         your	medical	practice.                                      you must be willing to monitor that investment. If you are
      There is a big difference between delegation of authority      unwilling to commit to that responsibility, you should find
   and abdication of responsibility. Office managers and other       a practice where you can sign on as an employee.
   employees are essential to the success of your practice.             Ask yourself two questions:
      But there can be only one CEO. Unless you are willing              โ–ฒ Why did you go into medicine?
   to take responsibility for vision, strategy and leadership,
   you have not taken ownership of your practice.                        โ–ฒ Why do you want to own your practice?
      Hiring an experienced office manager is no guarantee              If owning your practice fulfills your purpose, you
   that you are hiring the right person for your practice. By        need to invest just a fraction of the time you spent on
   establishing your vision for the practice and the goals you       your medical training to learn business management
   want to achieve, you increase the likelihood of hiring a          skills. โ€“ Michael Redemske, CPA



Cautious steps continued from page 4                                     They should figure one month to discuss the general terms
                                                                     of the deal and reach a letter of intent.
   It may also be necessary to obtain the services of an             Then they should plan on a second
appraiser to value the respective practices and help determine       month for each party to conduct due
the appropriate ownership percentages that will reflect each         diligence on the otherโ€™s practice.           Caution
partyโ€™s relative contribution to the merged entity.                  Finally, they should expect the drafting
   With proper planning, a merger of two medical practices           of the closing documents and the actual
should be accomplished in a reasonably painless fashion over a       closing to take another month. โ€“
period of about three months.                                        Michael Redemske, CPA

                                                 July/August 2011 Your Healthy Practice                                             3
Cautious steps wise when merging medical practices
     Two medical practitioners might merge their practices                and particularly the liabilities the parties are transferring into
 for any number of reasons. Sharing office space, covering                the combined practice.
 one anotherโ€™s patients during vacations and other absences,                 They must also take income tax considerations into
 and preparing for retirement are just a few.                             account. A merger of two professional corporations can
                                    Once a practice has identified        generally be accomplished tax free. However, if one or both
                                a potential merger candidate, it          parties plan to take cash or other assets out of the corpora-
                                is a good idea to enter into a            tion either before or after the merger, a tax liability may
Merger                          nondisclosure agreement early             result.
                                in the process to protect both               A merger of unincorporated practices can usually be
                                partiesโ€™ confidential informa-            accomplished tax free. The combined practice can be operated
                                tion. As the deal progresses,             as a partnership, a limited liability company (LLC) or a
                                they may consider moving to a             professional corporation.
                                letter of intent.                            If either party to the merger has to disassociate from a
     A letter of intent should not be a binding agreement. It             multi-owner practice or if co-owners of either of the merged
 should only confirm the basic deal terms and commit both                 practices have to be bought out, a variety of tax consequences
 parties to mutual cooperation and exclusivity while due                  can result from the disassociation or buyout.
 diligence is taking place.                                                  The parties should plan to involve their accountants and
     An open, orderly and professional due diligence benefits             attorneys early in the merger discussions. And they should
 both parties. During this process, the parties should disclose           expect that both proposed merger partners will want their
 and fully understand the economics of both practices, including          own accountant and attorney involved.
 the patient base, the qualifications of all employees, the assets                                                See Cautious steps on page 3

                                                             Your Healthy Practice
 The technical information in this newsletter is necessarily brief. No final conclusion on these topics should be drawn without
 further review and consultation. Please be advised that, based on current IRS rules and standards, the information contained herein is
 not intended to be used, nor can it be used, for the avoidance of any tax penalty assessed by the IRS.           ยฉ 2011 CPAmerica International




                                                                                                    CERTIFIED PUBLIC ACCOUNTANTS

                                                                                                           3330 W. Esplanade Avenue
                                                                                                                  Suite 100
                                                                                                          Metairie, Louisiana 70002

More Related Content

What's hot

Rapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government SectorRapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government Sector
Rapid7
ย 
Hitech for HIPAA
Hitech for HIPAAHitech for HIPAA
Hitech for HIPAA
dkarpinsky
ย 
Legal Aspects in Health Informatics
Legal Aspects in Health InformaticsLegal Aspects in Health Informatics
Legal Aspects in Health InformaticsNawanan Theera-Ampornpunt
ย 
INFORMATION SECURITY STUDY REGARDING PII
INFORMATION SECURITY STUDY REGARDING PIIINFORMATION SECURITY STUDY REGARDING PII
INFORMATION SECURITY STUDY REGARDING PII
- Mark - Fullbright
ย 
Case Study: Combating Medical Identity Theft
Case Study: Combating Medical Identity TheftCase Study: Combating Medical Identity Theft
Case Study: Combating Medical Identity Theft
Booz Allen Hamilton
ย 
Privacy and Information Security: What Every New Business Needs to Know
Privacy and Information Security:  What Every New Business Needs to KnowPrivacy and Information Security:  What Every New Business Needs to Know
Privacy and Information Security: What Every New Business Needs to Know
The Capital Network
ย 
Data Breaches
Data BreachesData Breaches
Data Breachessstose
ย 
Legal Aspects in Health Informatics
Legal Aspects in Health InformaticsLegal Aspects in Health Informatics
Legal Aspects in Health Informatics
Nawanan Theera-Ampornpunt
ย 
Cost of Data Breah in Healthcare_Quinlan, Courtney
Cost of Data Breah in Healthcare_Quinlan, CourtneyCost of Data Breah in Healthcare_Quinlan, Courtney
Cost of Data Breah in Healthcare_Quinlan, Courtneycourtneyquinlan
ย 
HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
HEALTHCARE IT: IS YOUR INFORMATION AT RISK? HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
IJNSA Journal
ย 
Sarah Kim HIPAA for Small Providers
Sarah Kim HIPAA for Small ProvidersSarah Kim HIPAA for Small Providers
Sarah Kim HIPAA for Small ProvidersSarah Kim
ย 
Privacy Breaches In Canada It.Can May 1 2009
Privacy Breaches In Canada   It.Can May 1 2009Privacy Breaches In Canada   It.Can May 1 2009
Privacy Breaches In Canada It.Can May 1 2009canadianlawyer
ย 
UW - IMT 552-JPMorgan Chase & Co. Risk Assessment
UW - IMT 552-JPMorgan Chase & Co. Risk AssessmentUW - IMT 552-JPMorgan Chase & Co. Risk Assessment
UW - IMT 552-JPMorgan Chase & Co. Risk AssessmentAkshay Ajgaonkar
ย 
Data Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being UnpreparedData Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being Unpreparedhaynormania
ย 
Texas Privacy Laws - Tough New Changes
Texas Privacy Laws - Tough New ChangesTexas Privacy Laws - Tough New Changes
Texas Privacy Laws - Tough New Changes
Jim Brashear
ย 
wp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industrywp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industryNumaan Huq
ย 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare Industry
EMC
ย 
GIST 698 Research Paper
GIST 698 Research PaperGIST 698 Research Paper
GIST 698 Research PaperRyan Flanagan
ย 
HealthCo Accelerate 2016 speaker deck #2
HealthCo Accelerate 2016 speaker deck #2HealthCo Accelerate 2016 speaker deck #2
HealthCo Accelerate 2016 speaker deck #2
HealthCo Information Systems
ย 
WhitePaper- Archiving Supports HIPAA Compliance
WhitePaper- Archiving Supports HIPAA ComplianceWhitePaper- Archiving Supports HIPAA Compliance
WhitePaper- Archiving Supports HIPAA Compliance
Succor Consulting Group, Inc.
ย 

What's hot (20)

Rapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government SectorRapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government Sector
ย 
Hitech for HIPAA
Hitech for HIPAAHitech for HIPAA
Hitech for HIPAA
ย 
Legal Aspects in Health Informatics
Legal Aspects in Health InformaticsLegal Aspects in Health Informatics
Legal Aspects in Health Informatics
ย 
INFORMATION SECURITY STUDY REGARDING PII
INFORMATION SECURITY STUDY REGARDING PIIINFORMATION SECURITY STUDY REGARDING PII
INFORMATION SECURITY STUDY REGARDING PII
ย 
Case Study: Combating Medical Identity Theft
Case Study: Combating Medical Identity TheftCase Study: Combating Medical Identity Theft
Case Study: Combating Medical Identity Theft
ย 
Privacy and Information Security: What Every New Business Needs to Know
Privacy and Information Security:  What Every New Business Needs to KnowPrivacy and Information Security:  What Every New Business Needs to Know
Privacy and Information Security: What Every New Business Needs to Know
ย 
Data Breaches
Data BreachesData Breaches
Data Breaches
ย 
Legal Aspects in Health Informatics
Legal Aspects in Health InformaticsLegal Aspects in Health Informatics
Legal Aspects in Health Informatics
ย 
Cost of Data Breah in Healthcare_Quinlan, Courtney
Cost of Data Breah in Healthcare_Quinlan, CourtneyCost of Data Breah in Healthcare_Quinlan, Courtney
Cost of Data Breah in Healthcare_Quinlan, Courtney
ย 
HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
HEALTHCARE IT: IS YOUR INFORMATION AT RISK? HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
ย 
Sarah Kim HIPAA for Small Providers
Sarah Kim HIPAA for Small ProvidersSarah Kim HIPAA for Small Providers
Sarah Kim HIPAA for Small Providers
ย 
Privacy Breaches In Canada It.Can May 1 2009
Privacy Breaches In Canada   It.Can May 1 2009Privacy Breaches In Canada   It.Can May 1 2009
Privacy Breaches In Canada It.Can May 1 2009
ย 
UW - IMT 552-JPMorgan Chase & Co. Risk Assessment
UW - IMT 552-JPMorgan Chase & Co. Risk AssessmentUW - IMT 552-JPMorgan Chase & Co. Risk Assessment
UW - IMT 552-JPMorgan Chase & Co. Risk Assessment
ย 
Data Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being UnpreparedData Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being Unprepared
ย 
Texas Privacy Laws - Tough New Changes
Texas Privacy Laws - Tough New ChangesTexas Privacy Laws - Tough New Changes
Texas Privacy Laws - Tough New Changes
ย 
wp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industrywp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industry
ย 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare Industry
ย 
GIST 698 Research Paper
GIST 698 Research PaperGIST 698 Research Paper
GIST 698 Research Paper
ย 
HealthCo Accelerate 2016 speaker deck #2
HealthCo Accelerate 2016 speaker deck #2HealthCo Accelerate 2016 speaker deck #2
HealthCo Accelerate 2016 speaker deck #2
ย 
WhitePaper- Archiving Supports HIPAA Compliance
WhitePaper- Archiving Supports HIPAA ComplianceWhitePaper- Archiving Supports HIPAA Compliance
WhitePaper- Archiving Supports HIPAA Compliance
ย 

Viewers also liked

Valuations Plus Spring 2011 Newsletter
Valuations Plus Spring 2011 NewsletterValuations Plus Spring 2011 Newsletter
Valuations Plus Spring 2011 Newsletter
Kushner LaGraize, LLC
ย 
2010 year end tax planning letter
2010 year end tax planning letter2010 year end tax planning letter
2010 year end tax planning letter
Kushner LaGraize, LLC
ย 
Your Healthy Practice
Your Healthy Practice Your Healthy Practice
Your Healthy Practice
Kushner LaGraize, LLC
ย 
Your Healthy Practice
Your Healthy PracticeYour Healthy Practice
Your Healthy Practice
Kushner LaGraize, LLC
ย 
Redes de afiliados, vender pela internet. Como funciona venda por CPA
Redes de afiliados, vender pela internet.  Como funciona venda por CPARedes de afiliados, vender pela internet.  Como funciona venda por CPA
Redes de afiliados, vender pela internet. Como funciona venda por CPA
Mundo CPA
ย 

Viewers also liked (6)

Valuations Plus Spring 2011 Newsletter
Valuations Plus Spring 2011 NewsletterValuations Plus Spring 2011 Newsletter
Valuations Plus Spring 2011 Newsletter
ย 
2010 year end tax planning letter
2010 year end tax planning letter2010 year end tax planning letter
2010 year end tax planning letter
ย 
Your Healthy Practice
Your Healthy Practice Your Healthy Practice
Your Healthy Practice
ย 
Your Healthy Practice
Your Healthy PracticeYour Healthy Practice
Your Healthy Practice
ย 
2011 Mid-Year Tax Planning
2011 Mid-Year Tax Planning2011 Mid-Year Tax Planning
2011 Mid-Year Tax Planning
ย 
Redes de afiliados, vender pela internet. Como funciona venda por CPA
Redes de afiliados, vender pela internet.  Como funciona venda por CPARedes de afiliados, vender pela internet.  Como funciona venda por CPA
Redes de afiliados, vender pela internet. Como funciona venda por CPA
ย 

Similar to Your healthy practice July/August 2011

Redspin PHI Breach Report 2012
Redspin PHI Breach Report 2012Redspin PHI Breach Report 2012
Redspin PHI Breach Report 2012Redspin, Inc.
ย 
Redspin Report - Protected Health Information 2010 Breach Report
Redspin Report - Protected Health Information 2010 Breach ReportRedspin Report - Protected Health Information 2010 Breach Report
Redspin Report - Protected Health Information 2010 Breach Report
Redspin, Inc.
ย 
wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-dataNumaan Huq
ย 
2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast
- Mark - Fullbright
ย 
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxPage 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
karlhennesey
ย 
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxPage 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
honey690131
ย 
Healthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINALHealthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINALSteve Knapp
ย 
Data Breach Insurance - Optometric Protector Plan
Data Breach Insurance - Optometric Protector PlanData Breach Insurance - Optometric Protector Plan
Data Breach Insurance - Optometric Protector Plan
sarahb171
ย 
$8.3 billion lost by healthcare from poor communication, Bloedau
$8.3 billion lost by healthcare from poor communication, Bloedau$8.3 billion lost by healthcare from poor communication, Bloedau
$8.3 billion lost by healthcare from poor communication, BloedauHIMSS
ย 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare Industry
EMC
ย 
arcsight_scmag_hcspecial
arcsight_scmag_hcspecialarcsight_scmag_hcspecial
arcsight_scmag_hcspecialPaul Brian Contino
ย 
Protected Harbor Data Breach Trend Report
Protected Harbor Data Breach Trend ReportProtected Harbor Data Breach Trend Report
Protected Harbor Data Breach Trend Report
Protected Harbor
ย 
Fraud And Abuse In The U.S. Healthcare System
Fraud And Abuse In The U.S. Healthcare SystemFraud And Abuse In The U.S. Healthcare System
Fraud And Abuse In The U.S. Healthcare System
Kendra Cote
ย 
Safeguarding Patient Privacy in a Digital Age (Brian Kalis)
Safeguarding Patient Privacy in a Digital Age (Brian Kalis)Safeguarding Patient Privacy in a Digital Age (Brian Kalis)
Safeguarding Patient Privacy in a Digital Age (Brian Kalis)
U.S. News Healthcare of Tomorrow
ย 
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...SafeNet
ย 
Network Security and Privacy Liability - Four Reasons Why You need This Cove...
Network Security and Privacy Liability  - Four Reasons Why You need This Cove...Network Security and Privacy Liability  - Four Reasons Why You need This Cove...
Network Security and Privacy Liability - Four Reasons Why You need This Cove...
CBIZ, Inc.
ย 
Systems AdminstratorAs your systems administrator ย person I am.docx
Systems AdminstratorAs your systems administrator ย person I am.docxSystems AdminstratorAs your systems administrator ย person I am.docx
Systems AdminstratorAs your systems administrator ย person I am.docx
ssuserf9c51d
ย 
Running head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxRunning head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docx
wlynn1
ย 
Proof of immunity and the demise of privacy 2020 world in 2030
Proof of immunity and the demise of privacy 2020   world in 2030Proof of immunity and the demise of privacy 2020   world in 2030
Proof of immunity and the demise of privacy 2020 world in 2030
Future Agenda
ย 
Data Security Regulatory Lansdcape
Data Security Regulatory LansdcapeData Security Regulatory Lansdcape
Data Security Regulatory Lansdcape
Brian Bauer
ย 

Similar to Your healthy practice July/August 2011 (20)

Redspin PHI Breach Report 2012
Redspin PHI Breach Report 2012Redspin PHI Breach Report 2012
Redspin PHI Breach Report 2012
ย 
Redspin Report - Protected Health Information 2010 Breach Report
Redspin Report - Protected Health Information 2010 Breach ReportRedspin Report - Protected Health Information 2010 Breach Report
Redspin Report - Protected Health Information 2010 Breach Report
ย 
wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-data
ย 
2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast
ย 
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxPage 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
ย 
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxPage 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
ย 
Healthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINALHealthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINAL
ย 
Data Breach Insurance - Optometric Protector Plan
Data Breach Insurance - Optometric Protector PlanData Breach Insurance - Optometric Protector Plan
Data Breach Insurance - Optometric Protector Plan
ย 
$8.3 billion lost by healthcare from poor communication, Bloedau
$8.3 billion lost by healthcare from poor communication, Bloedau$8.3 billion lost by healthcare from poor communication, Bloedau
$8.3 billion lost by healthcare from poor communication, Bloedau
ย 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare Industry
ย 
arcsight_scmag_hcspecial
arcsight_scmag_hcspecialarcsight_scmag_hcspecial
arcsight_scmag_hcspecial
ย 
Protected Harbor Data Breach Trend Report
Protected Harbor Data Breach Trend ReportProtected Harbor Data Breach Trend Report
Protected Harbor Data Breach Trend Report
ย 
Fraud And Abuse In The U.S. Healthcare System
Fraud And Abuse In The U.S. Healthcare SystemFraud And Abuse In The U.S. Healthcare System
Fraud And Abuse In The U.S. Healthcare System
ย 
Safeguarding Patient Privacy in a Digital Age (Brian Kalis)
Safeguarding Patient Privacy in a Digital Age (Brian Kalis)Safeguarding Patient Privacy in a Digital Age (Brian Kalis)
Safeguarding Patient Privacy in a Digital Age (Brian Kalis)
ย 
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
ย 
Network Security and Privacy Liability - Four Reasons Why You need This Cove...
Network Security and Privacy Liability  - Four Reasons Why You need This Cove...Network Security and Privacy Liability  - Four Reasons Why You need This Cove...
Network Security and Privacy Liability - Four Reasons Why You need This Cove...
ย 
Systems AdminstratorAs your systems administrator ย person I am.docx
Systems AdminstratorAs your systems administrator ย person I am.docxSystems AdminstratorAs your systems administrator ย person I am.docx
Systems AdminstratorAs your systems administrator ย person I am.docx
ย 
Running head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxRunning head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docx
ย 
Proof of immunity and the demise of privacy 2020 world in 2030
Proof of immunity and the demise of privacy 2020   world in 2030Proof of immunity and the demise of privacy 2020   world in 2030
Proof of immunity and the demise of privacy 2020 world in 2030
ย 
Data Security Regulatory Lansdcape
Data Security Regulatory LansdcapeData Security Regulatory Lansdcape
Data Security Regulatory Lansdcape
ย 

More from Kushner LaGraize, LLC

Your Healthy Practice 2011
Your Healthy  Practice 2011Your Healthy  Practice 2011
Your Healthy Practice 2011
Kushner LaGraize, LLC
ย 
Client Advisor 2011
Client Advisor 2011Client Advisor 2011
Client Advisor 2011
Kushner LaGraize, LLC
ย 
Client Advisor - Winter 2011
Client Advisor - Winter 2011Client Advisor - Winter 2011
Client Advisor - Winter 2011
Kushner LaGraize, LLC
ย 
Client Advisor Winter 2011
Client  Advisor Winter 2011Client  Advisor Winter 2011
Client Advisor Winter 2011
Kushner LaGraize, LLC
ย 
CPAmerica Partners Retreat
CPAmerica Partners RetreatCPAmerica Partners Retreat
CPAmerica Partners Retreat
Kushner LaGraize, LLC
ย 
Health Practice Fall 2010
Health Practice Fall 2010Health Practice Fall 2010
Health Practice Fall 2010
Kushner LaGraize, LLC
ย 
Client Advisor Fall 2010
Client Advisor Fall 2010 Client Advisor Fall 2010
Client Advisor Fall 2010
Kushner LaGraize, LLC
ย 
2010midyeartaxplanning
2010midyeartaxplanning2010midyeartaxplanning
2010midyeartaxplanning
Kushner LaGraize, LLC
ย 
Healthcare reform bill for individuals and businesses
Healthcare reform bill for individuals and businesses Healthcare reform bill for individuals and businesses
Healthcare reform bill for individuals and businesses
Kushner LaGraize, LLC
ย 
Health Care Reform
Health Care ReformHealth Care Reform
Health Care Reform
Kushner LaGraize, LLC
ย 

More from Kushner LaGraize, LLC (10)

Your Healthy Practice 2011
Your Healthy  Practice 2011Your Healthy  Practice 2011
Your Healthy Practice 2011
ย 
Client Advisor 2011
Client Advisor 2011Client Advisor 2011
Client Advisor 2011
ย 
Client Advisor - Winter 2011
Client Advisor - Winter 2011Client Advisor - Winter 2011
Client Advisor - Winter 2011
ย 
Client Advisor Winter 2011
Client  Advisor Winter 2011Client  Advisor Winter 2011
Client Advisor Winter 2011
ย 
CPAmerica Partners Retreat
CPAmerica Partners RetreatCPAmerica Partners Retreat
CPAmerica Partners Retreat
ย 
Health Practice Fall 2010
Health Practice Fall 2010Health Practice Fall 2010
Health Practice Fall 2010
ย 
Client Advisor Fall 2010
Client Advisor Fall 2010 Client Advisor Fall 2010
Client Advisor Fall 2010
ย 
2010midyeartaxplanning
2010midyeartaxplanning2010midyeartaxplanning
2010midyeartaxplanning
ย 
Healthcare reform bill for individuals and businesses
Healthcare reform bill for individuals and businesses Healthcare reform bill for individuals and businesses
Healthcare reform bill for individuals and businesses
ย 
Health Care Reform
Health Care ReformHealth Care Reform
Health Care Reform
ย 

Recently uploaded

The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
awaisafdar
ย 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
tjcomstrang
ย 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
tanyjahb
ย 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
seoforlegalpillers
ย 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
marketingjdass
ย 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
RajPriye
ย 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
sarahvanessa51503
ย 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
ย 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
Bojamma2
ย 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
LR1709MUSIC
ย 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
Operational Excellence Consulting
ย 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
agatadrynko
ย 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
uae taxgpt
ย 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
HumanResourceDimensi1
ย 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
ย 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
Sam H
ย 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
dylandmeas
ย 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
ofm712785
ย 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
Ben Wann
ย 
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).pptENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
zechu97
ย 

Recently uploaded (20)

The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
ย 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
ย 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
ย 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
ย 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
ย 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
ย 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
ย 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
ย 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
ย 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
ย 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
ย 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ย 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
ย 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
ย 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
ย 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
ย 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
ย 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
ย 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
ย 
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).pptENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ย 

Your healthy practice July/August 2011

  • 1. A flash drive goes missing. A laptop gets stolen. An Data breaches are costly employee tosses old patient files in the trash. It can happen. Medical data breaches represented more than 24 percent of all data breaches reported nationwide in 2010, accord- ing to the Identity Theft Protect yourself and your practice Resource Center. Under HITECH, providers do not need to take any action if lost However, many breaches go unreported publicly because they or stolen data is encrypted. Nevertheless, no security plan is 100 involve fewer than 500 records. In those cases, the Health percent foolproof. Information Technology for Economic and Clinical Health In the event of a breach, comprehensive general liability (CGL) (HITECH) Act requires only that a provider or other covered policies do not cover any losses. This lack has spurred the rise of entity notify the secretary of the Department of Health and cyber liability or data breach insurance. Human Services of a breach within 60 days of the end of the calendar Some medical malpractice insurers now include data breach year in which the breach occurred. insurance in their general malpractice policies. Some commercial Providers should have security measures that comply with the liability insurers offer coverage as an enhancement to a CGL policy. strengthened enforcement and privacy protections provided under But most insurers can provide HITECH and the Health Insurance Portability and Accountability Act โ€“ better known as HIPAA. Protect your data with antivirus stand-alone policies to help protect organizations from what can be a Inside software, network firewalls and encryption. financial nightmare. The cost of dealing with a healthcare breach averages $301 per compromised July/August 2011 T he cost of dealing with a healthcare breach averages $301 per record, according to the 2010 U.S. โžœ our practice is a business: Cost of a Data Breach study released by Ponemon Institute in March 2011. Y Is it managed that way? For the average physicianโ€™s panel of โžœ autious steps wise when C compromised record. 2,030 patients, a breach can total more merging medical practices than $611,000. Expenses include legal, investigative, audit and administrative services, as See Data breaches on page 2 Inside A financial and management bulletin to physicians and medical practices from: CERTIFIED PUBLIC ACCOUNTANTS 3330 W. Esplanade Avenue โ€ข Suite 100 โ€ข Metairie, Louisiana 70002 (504) 838-9991 โ€ข Fax: (504) 833-7971 โ€ข www.kl-cpa.com
  • 2. Data breaches continued from page 1 The cost of a $1 million policy can run from a minimum of $1,500 to $5,000 or more, depending on a practiceโ€™s size and well as the loss of patients and reputation. Of the 15 industries number of data records, policy features and associated risks. covered in the Ponemon study, health care and pharmaceuticals Underwriters will want to know that a practice is financially shared the top spot for abnormal turnover of customers after an stable, has not had any losses and has mitigated risk. incident. Then there are the federal and state regulators. They can impose hefty penalties for mishandled data. In March, Massachusetts General Hospital was fined $1 million for the loss of 192 patientsโ€™ files inadvertently left on a subway train by an employee. Unintentional employee action, lost or stolen computing devices, and third-party error were the major causes of healthcare data breaches, according E xperts believe the number of breaches is certain to rise as we to a Ponemon study. move toward greater When purchasing data breach insurance, be aware that policies vary considerably from carrier to carrier. For example, adoption of electronic some insurers offer additional coverage for civil penalties or health records. regulatory fines. Others do not. Many states prohibit coverage for statutory or regulatory fines and penalties as against public policy. An insurer might include third-party exposure but not first-party coverage. Read exclusions carefully. Although a policy might include Mitigating risk includes written policies and procedures, first-party coverage, it could exclude the acts of a rogue employee training and monitoring, installation of appropriate employee. A knowledgeable broker or consultant can help you computer security software, and contractual allocation of review policy terms to ensure that you get coverage to best fit liability, among other things. your needs. Purchasing insurance does not absolve an organization Generally, comprehensive stand-alone policies can cover from complying with federal and state regulations, ensuring costs, up to certain limits, for items such as: that security measures are in place, or having a plan of action should a data breach occur. โ–ฒ Legal defense Experts believe the number of breaches is certain to rise as โ–ฒ Investigation and forensic services we move toward greater adoption of electronic health records. โ–ฒ Notification requirements as stipulated under the The Ponemon Institute has developed a data breach risk HITECH Act calculator that can estimate an organizationโ€™s risk profile, the average cost per compromised record and the average cost per โ–ฒ Credit monitoring for affected individuals breach. โ–ฒ Data recovery You can also see how your risk profile compares with other healthcare organizations and industries. To check your risk, โ–ฒ Public relations management go to http://databreachcalculator.com.sapin.arvixe.com. โ€“ โ–ฒ Network and/or business interruption Irene E. Lombardo The root causes of patient data loss or theft Unintentional action 52% Lost or stolen computing device 41% Third-party snafu 34% Technical systems glitch 31% Criminal attack 20% Malicious insider 15% Intentional non-malicious action 10% 0% 10% 20% 30% 40% 50% 60% Source: Benchmark Study on Patient Privacy and Data Security, Ponemon Institute LLC, Nov. 9, 2010 2 July/August 2011 Your Healthy Practice
  • 3. Your practice is a business: Is it managed that way? M edical prac tices succeed by design, not by accident. Approximately 80 percent person who shares that vision and has experience managing of all new businesses fail toward those goals. because their owners do not The only truly indispensable employee in your practice take the time to formulate a should be you. business plan and manage its execution. In this regard, 3. ractice management does not P health care is like any other equate to business management. business. Practice management focuses on the delivery of care to Here are four reasons patients. Business management focuses on allowing the why medical practices fail as practice to be successful. a business: Unless the business is well managed, the practice cannot succeed. Running your own medical practice is a for-profit 1. our medical skills do not guarantee operation. It should be run like the business it is. Y success. There are many talented people who are unable to run a 4. atient care is not the key to P successful business. Being an expert with a particular set of profitability. skills that are in high demand is a good start, but it is no It is fair to say that no one is born with basic business guarantee of financial success. management skills. You should be willing to take a week History is littered with smart people who could not take a out of your career for a course in business management. new product or idea and make it into a commercial success. You should also plan to spend 25 to 30 percent of your time focused on the business of the practice, not on seeing 2. our office manager should not run Y patients. If you are going to invest in a medical practice, your medical practice. you must be willing to monitor that investment. If you are There is a big difference between delegation of authority unwilling to commit to that responsibility, you should find and abdication of responsibility. Office managers and other a practice where you can sign on as an employee. employees are essential to the success of your practice. Ask yourself two questions: But there can be only one CEO. Unless you are willing โ–ฒ Why did you go into medicine? to take responsibility for vision, strategy and leadership, you have not taken ownership of your practice. โ–ฒ Why do you want to own your practice? Hiring an experienced office manager is no guarantee If owning your practice fulfills your purpose, you that you are hiring the right person for your practice. By need to invest just a fraction of the time you spent on establishing your vision for the practice and the goals you your medical training to learn business management want to achieve, you increase the likelihood of hiring a skills. โ€“ Michael Redemske, CPA Cautious steps continued from page 4 They should figure one month to discuss the general terms of the deal and reach a letter of intent. It may also be necessary to obtain the services of an Then they should plan on a second appraiser to value the respective practices and help determine month for each party to conduct due the appropriate ownership percentages that will reflect each diligence on the otherโ€™s practice. Caution partyโ€™s relative contribution to the merged entity. Finally, they should expect the drafting With proper planning, a merger of two medical practices of the closing documents and the actual should be accomplished in a reasonably painless fashion over a closing to take another month. โ€“ period of about three months. Michael Redemske, CPA July/August 2011 Your Healthy Practice 3
  • 4. Cautious steps wise when merging medical practices Two medical practitioners might merge their practices and particularly the liabilities the parties are transferring into for any number of reasons. Sharing office space, covering the combined practice. one anotherโ€™s patients during vacations and other absences, They must also take income tax considerations into and preparing for retirement are just a few. account. A merger of two professional corporations can Once a practice has identified generally be accomplished tax free. However, if one or both a potential merger candidate, it parties plan to take cash or other assets out of the corpora- is a good idea to enter into a tion either before or after the merger, a tax liability may Merger nondisclosure agreement early result. in the process to protect both A merger of unincorporated practices can usually be partiesโ€™ confidential informa- accomplished tax free. The combined practice can be operated tion. As the deal progresses, as a partnership, a limited liability company (LLC) or a they may consider moving to a professional corporation. letter of intent. If either party to the merger has to disassociate from a A letter of intent should not be a binding agreement. It multi-owner practice or if co-owners of either of the merged should only confirm the basic deal terms and commit both practices have to be bought out, a variety of tax consequences parties to mutual cooperation and exclusivity while due can result from the disassociation or buyout. diligence is taking place. The parties should plan to involve their accountants and An open, orderly and professional due diligence benefits attorneys early in the merger discussions. And they should both parties. During this process, the parties should disclose expect that both proposed merger partners will want their and fully understand the economics of both practices, including own accountant and attorney involved. the patient base, the qualifications of all employees, the assets See Cautious steps on page 3 Your Healthy Practice The technical information in this newsletter is necessarily brief. No final conclusion on these topics should be drawn without further review and consultation. Please be advised that, based on current IRS rules and standards, the information contained herein is not intended to be used, nor can it be used, for the avoidance of any tax penalty assessed by the IRS. ยฉ 2011 CPAmerica International CERTIFIED PUBLIC ACCOUNTANTS 3330 W. Esplanade Avenue Suite 100 Metairie, Louisiana 70002