Information Managers
  • Home
  • Services
    • All Services
  • Templates
  • Blog
  • Contact Us
  • Practice Management Success
  • Podcasts

June 21 2016 Practice Management Q&A

Posted on May 31, 2016 by Jean Eaton in Archive

Tuesday, June 21, 2016 at 10:30 am MDT

Welcome to June's live Practice Management Q&A with Jean Eaton, Your Practice Management Mentor.

Below you will be able to view the presentation, hear the audio, and participate in the chat and ask questions.

June Q&A topics include:

 

Our clinic shares common reception and lobby areas with another healthcare provider. We can see and overhear patients and conversations. What can we do to improve privacy for our patients?

Can you suggest some ways to inform our patients about our office procedures? We don't want posters all over walls!

Send your questions about practice management, human resources issues, clinic management best practices, procedures, resources, practical privacy tips and more!

 

Have a question?

Send an email to Jean at jean[at]informationmanagers dot ca.

Recorded live June 21, 2016

 

Don't forget to download these resources!

Oath of Confidentiality – Affiliates Information for Our Patients Template

 

 

Are you a member of the Information Managers Network?

You can access all the replays from your membership account.

 I'm a member of Information Managers' Network

Not a member, yet? Become one today!

I want to know more about being a member of Information Managers' Network

 

Resources

Practice Management Q&A series is hosted by Jean Eaton (Your Practice Management Mentor) of Information Managers Ltd.

clinic management, health care, healthcare, healthcare practice management, Practical Privacy Coach, practice management, Practice Management Mentor

May 17 2016 Practice Management Q&A

Posted on April 13, 2016 by Jean Eaton in Archive

Replay for Members only

Recorded Live Tuesday, May 17, 2016 at 10:30 am MDT

Welcome to May's live Practice Management Q&A with Jean Eaton, Your Practice Management Mentor.

Below you will be able to view the presentation, hear the audio, and participate in the chat and ask questions.

May Q&A topics include:

Does a custodian who also owns the clinic need to complete a confidentiality oath?

What are the fines if an affiliate does not report a privacy breach to a custodian?

What if I'm working for a custodian and they don't report a privacy breach?

Send your questions about practice management, human resources issues, clinic management best practices, procedures, resources, practical privacy tips and more!

 

Have a question?

Send an email to Jean at jean[at]informationmanagers dot ca.

 

 

Resources – Confidentiality Oath Custodians Physicians Resources – Confidentiality Oath Affiliates Employees

 

Are you a member of the Information Managers Network?

You can access all the replays from your membership account.

 I'm a member of Information Managers' Network

Not a member, yet? Become one today!

I want to know more about being a member of Information Managers' Network

 

Resources

Practice Management Q&A series is hosted by Jean Eaton (Your Practice Management Mentor) of Information Managers Ltd.

clinic management, Practical Privacy Coach, practice management, Practice Management Mentor

April 12 2016 Practice Management Q&A

Posted on March 8, 2016 by Jean Eaton in Member QA

Recorded Tuesday, April 12, 2016 at 10:30 am MDT

Welcome to April live Practice Management Q&A with Jean Eaton, Your Practice Management Mentor.

Below you will be able to view the presentation, hear the audio, and participate in the chat and ask questions.

April Q&A topics include:

  1. Another healthcare provider intended to send us a fax about our patient. The fax went to a different business. Who is required to report this privacy breach?
  2. When do we need to tell a patient that their information was breached?

Have a question?

Send an email to Jean at jean[at]informationmanagers dot ca.

 

 

 

Are you a member of the Information Managers Network?

You can access all the replays from your membership account.

 I'm a member of Information Managers' Network

Not a member, yet? Become one today!

I want to know more about being a member of Information Managers' Network

 

Resources

Practice Management Q&A series is hosted by Jean Eaton (Your Practice Management Mentor) of Information Managers Ltd.

clinic management, Practical Privacy Coach, practice management, Practice Management Mentor

March 08 2016 Practice Management Q&A

Posted on March 7, 2016 by Jean Eaton in Archive

Tuesday, March 08 at 10:30 am MDT

Welcome to March live Practice Management Q&A with Jean Eaton, Your Practice Management Mentor.

Below you will be able to view the presentation, hear the audio, and participate in the chat and ask questions.

March Q&A topics include:

  1. We live and work in a small community. How can we handle our employee's personal health records? Our
    employee's family members come to this clinic, too. What additional safeguards can we use to protect the
    confidentiality of these records?
  2. Patient access requests.

Have a question?

Send an email to Jean at jean[at]informationmanagers dot ca.

Webinar will start in

 

Are you a member of the Information Managers Network?

You can access all the replays from your membership account.

 I'm a member of Information Managers' Network

Not a member, yet? Become one today!

I want to know more about being a member of Information Managers' Network

 

Resources

Practice Management Q&A series is hosted by Jean Eaton (Your Practice Management Mentor) of Information Managers Ltd.

clinic management, Practical Privacy Coach, practice management, Practice Management Mentor

National Privacy & Data Governance Congress

Posted on March 2, 2016 by Jean Eaton in Blog

Privacy and Access Council of Canada offers a congress where delegates have a realistic opportunity to attend the sessions of interest. Plenaries and breakout sessions are longer than usual , and formal remarks are shorter, leaving time for speakers and delegates to engage in genuine conversation. And we ask speakers to offer practical guidance borne of their experience (not just theoretical advice or historical reviews) that delegates can put to work in their own organizations.

Learn, share and network at the 2016 National Privacy & Data Governance Congress. Join industry experts, risk management professionals, thought leaders and regulatory authorities to explore critical connections between privacy, access, security and compliance.

March 30, 31, April 1, 2016

Calgary, AB

 

Join speakers, delegates and thought leaders with shared interests in privacy, access and security. Colleagues from public and private institutions, federal, provincial and territorial governments, industry, academia and regulatory authorities will meet in a relaxed setting to enjoy workshop, breakout, keynote and plenary sessions.

Congress 2016 takes a refreshingly practical approach. Breakout sessions are longer than at most conferences, but formal presentations are shorter. Speakers offer practical examples and case studies, but are discouraged from using PowerPoint or similar tools (or distractions).

Continuing Education Credits applicable to PACC Professional Certification, and may qualify for CPD credits from other organizations as well.

Who should attend the Privacy and Data Governance Congress?

  • privacy officer
  • security officer
  • access and disclosure administrators
  • compliance officer
  • FOIP Co-ordinators
  • human resources manager
  • insurance agents
  • healthcare administrators, health information management
  • medical ethicists and genetics

Conference workshops include “4 Step Response to a Privacy Breach” with Jean L. Eaton, Your Practical Privacy Coach with Information Managers Ltd.

Register with PACC for the National Congress

You will be directed to the PACC website to register.

 

New!

Separate registration opportunity for anyone who wants to attend only the Friday portion to hear Edwin Black and stay for the Regulators’ Roundtable.

Not sure if this is for you?

Watch the Practice Management Nugget Webinar interview with Sharon Polsky to answer all your questions.

compliance officer, FOIP Co-ordinator, National Privacy And Data Governance Congress, Practical Privacy Coach, Privacy and Access Council of Canada, privacy officer, security officer, Sharon Polsky

Are They Watching You?

Posted on January 30, 2016 by Jean Eaton in Blog

Smart appliances may be too smart for our own good. Take smart TVs, for instance. As this article illustrates, some of these new appliances are particularly vulnerable to hackers. Once compromised, the TVs allow access to account information, including login credentials (which owners may use for access to more than just their smart-TV account).

Even scarier, hackers could gain access to front-facing cameras to see everything happening in the room where the TV is connected. Instead of you watching your favorite program, criminals may be watching you!   This may also apply to Skype webcams, X-box and other games with webcams (Kinect, Wii, PS, etc), laptops and security cameras.

Once the machine is compromised, hackers can stealthily activate its front-facing camera (available on higher-end smart TVs), hijack a Samsung account, steal credentials by presenting fake login pages and infect other applications on the TV with malware.

Your App is Watching

When you download an app, it tells you it can work better or give you personalized offers or other things you might like if you switch Location Services on. For example, a dining recommendations app might offer you a coupon when you walk past a restaurant. Are there other types of apps that might want your location? What types of offers would make it a worthwhile exchange for you? Do you think this is useful or Creepy? For more examples, see “Helpful or Creepy? The Creep-O-Meter Could Help You Find Out” and try the ‘Creep-o-Meter’ activity.

Tools and programs like the Creep-o-Meter can help digital citizens be more privacy aware and own their online presence. Remember these STOP. THINK. CONNECT. tips when you use social media, play online games and engage with other technology platforms and tools.

  • Share with care: what you post can last a lifetime: Before posting online think about how it might be perceived now and in the future and who might see it.
  • Learn about and use privacy and security settings on your favorite online games, apps and platforms.
  • Be aware of what’s being shared: Be aware that when you share a post, picture or video online, you may also be revealing information about others. Be thoughtful about when and how you share information about others.
  • Personal information is like money. Value it. Protect it. Be thoughtful about who gets your personal information and how it’s collected through apps and websites.

Tip:  When you are not using the webcam, unplug it!

How many times a day are you handing over your information?

How many times a day are you handing over your information?

Instructions

  • Use a hard wired LAN connection from PC to Smart TV – often more secure than using wireless networking (as wireless is often not installed securely, either).
  • Unplug the Ethernet cable and/or delete the wireless network connection settings.
  • Put tape over the camera and inbuilt mic if included, and put a blank 3.5″ plug into any mic input sockets.
  • Don't allow your Smart TV access to any other devices on your network (laptops, PCs, smartphones, tablets).
  • Don't log in from your TV to any websites that have sensitive information
  • DON'T re-use passwords on any other sites, especially not high-value sites like banking or email.

Resource

Privacy for Everyone: Closing the Gap Between the Privacy-Have's and the Privacy Have-Nots  Address by Patricia Kosseim, Senior General Counsel and Director General, Legal Services, Policy and Research Branch, (June 2014)

Rebecca Herold (a.k.a. The Privacy Professor) for more tips.

‘Technocreep' author says new technologies have been invading our privacy like never before , CBC interview, The Current with Anna Maria Tremonti and Tom Keenan

WeLiveSecurity. ESET 10 Steps to Staying Secure on Public Wi-Fi. 2015-Sep-02

#PrivacyAware, Data Privacy Day, Internet of Things, IOT, Practical Privacy Coach, Practice Management Mentor, privacy awareness, security, smart appliances

Is Your Email Secure?

Posted on January 29, 2016 by Jean Eaton in Blog

Is your email secure? Backed up? If you suddenly lose your email, calendar, or contact list, this could either be a speed bump in your busy day, or a nightmare that may take days or weeks and a lot of money to recover.

If you use email as temporary communications or your primary method of business, it needs to be managed securely. When you or your staff use email from multiple devices – such as your desktop computer, smart phone, or website – you have additional privacy and security requirements.

Whether you use your email as temporary communications or your primary method of business, it needs to be managed securely. Many small businesses have purchased an email software system like Outlook as part of their desktop software.

If you use free email accounts – like gmail or yahoo – emails, calendars, and contact information are on the public cloud where it is accessible from any internet connection. Of course, it then becomes difficult to back up to a local device that you can control.

If you are an employee or business owner, if you use email for business –  employee records, business contacts, company newsletters, subscriptions, financial or consumer purchases, or personally identifying messaging –  you need to meet privacy and security requirements. Make sure that you keep separate email accounts for your business emails and your personal emails.

Having sensitive information in your emails makes it vulnerable to attack, and it could leave you, your clients, and your employees, open to identity fraud.

Tip: Consider using a hosted email service, where your emails would be backed up, protected, and accessible.

Instructions:

  • Make sure that you have an email account for your business and a separate email account for your personal life.
  • Confirm your backup plan for your email accounts. If you don't have one, create a plan.
  • Do a test restore of your email account – did it include everything that you need – including your calendar, contacts, and all of your folders?

 

Resources:

There are many features offered with a hosted email service. See our blog post Is a Hosted Email Solution For You? for additional details including things to look for in a hosted email solution vendor.

 

DPD Champ badgeWe are proud to be a Data Privacy Day Champ!
You can be one too! #PrivacyAware

To celebrate Data Privacy Day, Information Managers is offering a free Data Privacy Day Privacy Awareness E-Course.

When you register, you will receive one email a day from January 21 – 29 with a privacy tip, easy to follow instructions, and links to additional resources that can be applied at home or in the office.

 

Register Here – Don’t miss out on this free E-course!

#PrivacyAware, Data Privacy Day, Email security, Practical Privacy Coach, Practice Management Mentor, privacy awareness, security

Own Your Online Presence This Data Privacy Day

Posted on January 29, 2016 by Jean Eaton in Blog

“Johnny Smith: Epic night! Arrested for being drunk by a cop on a horse!”

“Bill likes this”

Boy, that sounds like a fun night. Except, of course, when Johnny's boss sees this in the morning after Johnny didn't come into work. Uh oh.

Social media can be great – we can connect with long lost friends and relatives, share photos and ideas, and learn about news and events. But what we post can have serious ramifications, for ourselves and others, and can remain on the internet indefinitely. What we think is funny at the moment may prove embarrassing in time to come.

 

DPD_NCSA_US_Consumer_Privacy_Index_2016_smallAccording to the research study “Consumer Privacy Index 2016” from TRUSTe and National Cyber Security Alliance, consumer privacy concern levels are rising quickly:

  • 68% of consumers listed not knowing how their personal information is collected online as a top concern
  • 45% of respondents are more worried about their online privacy than they were just one year ago
  • 74% have limited their online activity in the last year due to privacy concerns

Tip – Limit the amount of personally identifying information you share, and adjust your privacy settings.

Instructions

  • Set your privacy preferences to only friends to see your profile.
  • Regularly check on these settings, as some social network sites make changes without notifying you. Here are instructions for many of the popular products and services.
  • Do not use information that is often used as security identifiers, such as your full name, date or birth, or mother's maiden name.
  • Always ask yourself – “Is this information I wouldn't mind an employer seeing?”
  • Don't reveal your location online. It tells people where you are – but also where you're NOT, signifying that your home may be unoccupied and a potential robbery target.
  • Download, print, and discuss the Consumer Privacy Index 2016 Infographic from TRUSTe and National Cyber Security Alliance.
  • Watch this video from StaySafeOnline

Resources

Office of the Privacy Commissioner of Canada. Protecting your Privacy Online Frequently Asked Questions. 2011-May-06

STAYSAFEONLINE.org How to Own Your Online Presence infographic

See all the Data Privacy Day E-course resources posted each day on our website.

DPD Champ badgeWe are proud to be a Data Privacy Day Champ!
You can be one too! #PrivacyAware

To celebrate Data Privacy Day, Information Managers is offering a free Data Privacy Day Privacy Awareness E-Course.

When you register, you will receive one email a day from January 21 – 29 with a privacy tip, easy to follow instructions, and links to additional resources that can be applied at home or in the office.

 

Register Here – Don’t miss out on this free E-course!

#PrivacyAware, Data Privacy Day, Practical Privacy Coach, Practice Management Mentor, privacy awareness, security, social media

How You Can Be a Password Pro

Posted on January 28, 2016 by Jean Eaton in Blog

Passwords. Can't live without 'em, can't even remember all of 'em.

Just about everything needs a password these days. From your email address to your social media accounts, to your online banking and to your smartphone.

But is your password uncrackable?

Hack-proofing your passwords is absolutely essential, especially if you run a business. Small businesses are major targets, with more than 80% being targets of opportunities.

A University of Cambridge study found that 90% of passwords are hackable. Try to make your passwords in the 10% of uncrackable passwords.

Your accounts are only as strong as your weakest link!

Easily improve your password with a password management tool like 1Password, LastPass, Dashlane, McAfee SafeKey and many more to choose from.

As a healthcare provide and /or business owner, you are responsible for not only your personal passwords but also ensuring that all your staff and vendors are also using strong (and really long!) passwords. Doing this for each application for all your internet devices can be nearly impossible. Instead of using the same password in many applications, writing down the logins and password or skip using passwords altogether – it is time for you to use a Password Manager tool.

Password Management_Information_ManagersUsing these tools will:

  • make it easy for you to create and use strong passwords
  • generate complex passwords for you
  • no problem to change your password regularly
  • some will even make it easier for you to create a secure sharing of login and password to an assistant
  • make it easier for your team to easily use good password management

Tip: Don't get frustrated whenever you forget your password. Instead, be proud that you change your password regularly using the “I forgot my password” re-set function!

  • Use your business passwords for work only. Don't reuse your work password on an external website, email, or bank account. Don't use the same password for all your social media accounts.
  • Avoid predictable and common passwords. Choose a phrase that you can remember, and add in the required characters – capital letters and numbers. You can try removing the vowels of easy to remember words (i.e. privacy = prvcy)
  • Use more characters. The longer the password, the harder it is to crack!

For more information see our blog post &Tgh2Crack! How tough is your password

Resources

Rubenking, Neil J. @neiljrubenking The Best Password Managers for 2016, PC Magazine. 2016-Jan-08

Davis, Gary. Password Safety in a Connected World,  McAfee Blog Central. 2013-May-06.

DPD Champ badgeWe are proud to be a Data Privacy Day Champ!
You can be one too! #PrivacyAware

To celebrate Data Privacy Day, Information Managers is offering a free Data Privacy Day Privacy Awareness E-Course.

When you register, you will receive one email a day from January 21 – 29 with a privacy tip, easy to follow instructions, and links to additional resources that can be applied at home or in the office.

Register Here – Don’t miss out on this free E-course!

#PrivacyAware, Data Privacy Day, password management, passwords, Practical Privacy Coach, Practice Management Mentor, privacy awareness, security

Would You Know if There Were Two of You?

Posted on January 24, 2016 by Jean Eaton in Blog

Identity theft is a growing problem but there are things that you can do to protect yourself.

Identity theft happens when someone steals your personal information and uses it without your permission – to make purchases, take out loans, get medical services – and more! Victims can end up with drained bank accounts, destroyed credit, and the enormous task of fixing the problem. The pieces of personal information that can be used to commit identity theft include:your name, Social Insurance Number, birth date, mother's maiden name, credit report, driver's license, and credit card and bank account numbers. It doesn’t take much to create a new identity – often just 3 pieces of information.


Tip: Answer 10 questions about your online activities to calculate your personal identity risk score. (EMC
2/RSA). Discover how your online activities – from banking and shopping to the types of social networking sites you visit – may potentially make you more vulnerable to identity theft and fraud. Try the Online Identity Risk Calculator.

Identity Theft and Identity Fraud – RCMP YouTube Channel

The RCMP recommends these steps if you think you are a victim of identity theft or fraud:

  • Step 1 – Contact your local police force and file a report.
  • Step 2 – Contact your bank/financial institution and credit card company
  • Step 3 – Contact the two national credit bureaus and place a fraud alert on your credit reports.
    • Equifax Canada
      Toll free: 1-800-465-7166
    • TransUnion Canada
      Toll free: 1-877-525-3823
  • Step 4 – Always report identity theft and fraud. Contact the Canadian Anti-Fraud Centre

Tip – Be aware and be secure with your personally identifying information.

Illustration from Privacy Commissioner of Canada, www.priv.gc.ca

Illustration from Privacy Commissioner of Canada, www.priv.gc.ca

Instructions

  • Set up a schedule to review your credit card and bank statements – monthly, quarterly – and always have a ballpark in mind of your spending history
  • Once you've reviewed your statements, make sure that you've shredded the paper documents that you no longer need (and keep them in a secure place while you do need them!) By shredding your bank and credit card statements, you can prevent thieves from “dumpster-diving” for the easy information.
  • Set up a Google Alert for your name, business name, and other key identifiers.  You will receive a listing of whenever your name appears in the internet.
  • Limit the amount of personal information that you share on-line, in stores, and on the forms that you fill out.  Ask why they need your information.
  • Install and update anti-virus and malware protection software on your smartphone. Malware and viruses can access and steal personal information, which can lead to identity theft. ‪

Identity theft can happen at work, too.

Waël Hassan notes in his LinkedIn Post, ‘Hacking LinkedIn: The Risk Every HR Department Should Be Talking About’ is the risk of social engineering or spear phishing hacking threats. To prevent this, Hassan recommends three steps that HR departments or managers can do to reduce the risk of spear phishing.

Establish a social media policy, or even a specific policy for business networking and job search sites. Your social media policy should establish that corporate email accounts are not to be used to create or validate social media accounts. It should also specify types of corporate information that should not be published on social media, such as project details, budgets, team members, and technologies used on the job.

Provide employees with instructions on what to do and who to consult if they suspect they have been victims of identity theft. Employees need to know that they will be met with empathy and support if this happens to them.

Review processes for documenting, reporting, and investigating cases of identity theft.

These recommendations make good business sense, too! After all, privacy is good for business.

Resources

EMC2/RSA, Online Identity Risk Calculator 

RCMP  Identity Theft and Identity Fraud, 2015-12-04

Waël Hassan. “Phishing Hacking LinkedIn The Risk Every HR Department Should be Talking About“, LinkedIn, Jan 6 2016.

 

DPD Champ badgeWe are proud to be a Data Privacy Day Champ!
You can be one too! #PrivacyAware

To celebrate Data Privacy Day, Information Managers is offering a free Data Privacy Day Privacy Awareness E-Course.

 

When you register, you will receive one email a day from January 21 – 29 with a privacy tip, easy to follow instructions, and links to additional resources that can be applied at home or in the office.

 

Register Here – Don’t miss out on this free E-course!

 

#PrivacyAware, Data Privacy Day, identity theft, Practical Privacy Coach, Practice Management Mentor, privacy awareness, security
«‹23456›»

Search the site

What is the elephant in the room?

The Elephant in the Room Find out here...

Privacy Policy

"I did think that the info session was interesting on how many tools can be created and intertwined for the use of the patient. I do find the sessions good."

--Practice Management Nugget event, 'Engage your patients using automated tools' with Karol Clark

- Debra from Spruce Grove

Register for Free On-line Privacy Breach Awareness Training!

Privacy Policy

Copyright 2022 Information Managers Ltd.