Health Partners on IPV & Exploitation
In this webinar, participants learned best practices and recommendations for providing care and addressing intimate partner violence (IPV) and health technology to protect patient's privacy and safety. Attendees were able to document IPV to adhere to the CURES Act and connect patients with community-based services.
HITEQ Center and Feldesman Tucker Leifer Fidell LLP, September 2023
The Office of the National Coordinator for Health Information Technology’s (ONC) 21st Century Cures Act Information Blocking Rule (Info Blocking Rule) prohibits covered actors – including health care providers, health IT developers of certified health IT, and health information exchanges/health information networks– from engaging in practices likely to interfere with, prevent, or materially discourage access, exchange, or use of electronic health information (EHI). The Info...
Virtual Learning Collaborative
In this session participants learned about the data privacy laws as they relate to digital health. Attendees had a better understanding about HIPAA, data privacy laws, telehealth regulations and more.
Virtual Webinar
In this session, participants learned from Harris Health (Texas) and Community Medical Centers Inc. (California) to hear about their expanded services for behavioral health and substance use disorder treatment for justice-involved community members. Attendees learned from these two healthcare providers that have made a commitment to offering care to justice -involved patients, and their journeys to build positive partnerships improving access to service.
Training for Health Centers
In this session, attendees learned from the HITEQ Center and Housing Works about the TelePrEP model. It also showcased the successes and challenges Housing Works faced with regards to their TelePrEP program.
Guidance and Resources for Health Centers
General cybersecurity guidance would suggest that Health IT breach should not be considered a matter of “if”, but rather a matter of “when”. How Health Centers prepare and respond to an episode of a breach is just as important as defending itself from the breach.
NTTAP Webinar Series 2023-2024
The webinar dove into key strategies for using identity data in population health management. Expert faculty highlighted the importance of gathering data to address health disparities, with a focus on utilizing Electronic Health Records (EHR) for both internal and patient-focused justice, equity, diversity, and inclusion (JEDI) purposes. Participants gained confidence in advancing health equity with strategies to collect and use demographic data for developing and monitoring health equity...
Virtual Learning Collaborative
It's time to reconsider your strategy if you still treat cyber risk as an annual project or initiative. Having a thorough ongoing program in place means that even in the worst-case scenario, you'll be ready to demonstrate that you did what was reasonable and appropriate to protect your systems and patient data. Nothing can guarantee that a cyberattack won't become a breach. Health Centers are a domain with a high potential for data breaches, and the risk continues to grow as...
A Case Study of the Family Health Center of Worcester’s Ransomware Incident, February 2024
The use of ransomware — malicious software that restricts access to computer systems with financial demands — has escalated, targeting health centers and putting countless lives at risk. This dire reality came to the forefront during the alarming ransomware attack on the Family Health Center of Worcester, Inc. (FHCW), where the personal health information and care continuity for thousands of patients were compromised. This resource uses FHCW's experience as a case study to demonstrate the...
HITEQ Highlights Webinar
In this HITEQ Highlight, we aim to strengthen Health Centers' capacity to build their cyber-resiliency. We will cover risk management tools, methods for guarding against cybersecurity assaults, operationalizing cybersecurity to mitigate risks, and breach mitigation tactics. Participants will focus on safeguarding data across the entire enterprise and examine approaches to implementing cybersecurity infrastructure through risk management frameworks and strategic risk assessment. This...