Session 1: The Compliance Crossroads: Policy Shifts, AI, and the ePHI Landscape in 2025
This session explores the broader regulatory environment—what’s in effect, what’s changing, and how policies like the HIPAA Security Rule, AI executive actions, and cybersecurity enforcement intersect.
Session 2: At the Record Level: What to Document, What to Disclose, and What to Protect
This session shifts the focus to frontline decision-making—how individual providers handle sensitive documentation, access, and legal exceptions in the EHR.
Virtual Learning Collaborative
Join our free learning collaborative designed to help health centers optimize technology to deliver care in dynamic settings. This series will focus on the unique challenges and opportunities of using EHRs and other health information technology in care settings such as mobile units, school-based health centers, street outreach programs, and correctional facilities.
HITEQ Highlights Webinar
This HITEQ Highlights session explored the urgent need for enhanced cybersecurity in health centers, highlighting real-world impacts through the case study of the Family Health Center of Worcester ransomware attack.
Virtual Learning Collaborative
Join our free learning collaborative designed to help health centers optimize technology to deliver care in dynamic settings. This series will focus on the unique challenges and opportunities of using EHRs and other health information technology in care settings such as mobile units, school-based health centers, street outreach programs, and correctional facilities.
HITEQ Center, June 2025
The Health IT Emergency Response Plan Assessment Tool helps health centers evaluate and enhance their emergency plans, focusing on optimizing Health IT use during crises.
HITEQ Center, June 2025
This article uses the 2020 incident at the Family Health Center of Worcester (FHCW) to explore innovative strategies to bolster health centers' cybersecurity, including leveraging group purchasing organizations (GPOs) for discounted solutions and implementing bug bounty programs to proactively strengthen systems. Ultimately, it investigates how these approaches can protect vital community health resources from the escalating tide of cyber threats.
A use case example from the Arizona Health-e Connection and SAMHSA Consent2Share project
This is a recent presentation by the Substance Abuse and Mental Health Services Administration's Health IT effort that provides an overview of their Consent2Share project. Consent2Share is a tool for consent management and data segmentation that is designed to integrate within existing electronic health record (EHR) and Health Information Exchange (HIE) systems.
This overview is provided to health center leadership and staff to help them better understand new practices and...
CoE-PHI Free National Webinar
Join the CoE-PHI for a free national webinar during which we'll outline the requirements of the 2024 Final Rule amending 42 CFR Part 2 (“Part 2”) and apply learning to common scenarios through interactive case studies.
Cisco Webex Meetings
This webinar discussed the importance and unique considerations for cyberthreats in pediatric health care settings, followed by a Security Risk Assessment (SRA) Tool walkthrough.