Telehealth Policy during Coronavirus/ COVID-19 Pandemic Telehealth Policy during Coronavirus/ COVID-19 Pandemic We are adding additional telehealth policy information relevant to coronavirus/ COVID-19 pandemic as it impacts health centers as it becomes available.
Using non-traditional technology for telehealth during COVID-19 Pandemic Using non-traditional technology for telehealth during COVID-19 Pandemic HHS Office of Civil Rights (OCR), the entity responsible for enforcing regulations under HIPAA, stated, effective immediately, it will exercise enforcement discretion and will not impose penalties for HIPAA violations against covered healthcare providers if patients are served on a good faith basis during the COVID-19 nationwide public health emergency. Find out what this means in implementation by accessing this issue brief.
I Provide SUD Services in an FQHC: Does Part 2 Apply to Me? I Provide SUD Services in an FQHC: Does Part 2 Apply to Me? This decision tree, developed through funding from the Substance Abuse and Mental Health Services Administration (SAMHSA) helps organizations determine if Part 2 of CFR 42 applies to them. It should be noted that FQHCs will always be designated as “federally assisted” due to certified status as Medicaid providers and/or federal funding.
Behavioral Health Consent Management Behavioral Health Consent Management The timely exchange of health information between behavioral health providers and physical health providers to support care coordination is a critical element of the National Quality Strategy and health reform efforts. However, privacy and confidentiality concerns are currently limiting the inclusion of behavioral health data in electronic health information exchange efforts.
Strategic Cybersecurity Breach Protection and Incident Response Strategic Cybersecurity Breach Protection and Incident Response General cybersecurity guidance would suggest that Health IT breach should not be considered a matter of “if”, but rather a matter of “when”. How Health Centers prepare and respond to an episode of a breach is just as important as defending itself from the breach.