When a medical practice replaces its billing system or electronic medical record (EMR), it is at risk. The risk lies in how legacy patient data from the retired system is handled. While it is common for demographics and other basic key data points to be converted to a new system, complexity and cost often prohibit line item detail from migrating. That leaves protected health information (PHI) in the legacy system, and, therein lies the risk.
If healthcare providers value PHI, how can cyber criminals steal it so easily? Here, Lisa Williams, VP of Business Development for Triyam, discusses common PHI security holes, how legacy systems cause problems, and why only complying with minimum HIPAA requirements affects your ability to avoid and react to breaches effectively.
Watch the webinar to learn what to do with legacy PHI and the plans for a successful transition to a new EHR
Check out past webinar recording
- The 3 C’s of Legacy Data ( Guest speaker Director of Compliance Strategy from 360Advanced )
- Top 5 Cyber Security Threats for Healthcare Organizations in 2019 ( Guest speaker from former NSA cybersecurity specialists )
- Best Practices for Meditech EHR Data Migration & Archival ( Guest speaker Meditech Consultant )
- Archiving Historic EHR Data ( Guest speaker from KLAS Research )
- 5 things you must know about retiring Legacy EHRs ( Guest speaker former CIO of Methodist Hospital )
- How to Create a Data Extraction, Migration, and Retention Strategy When Retiring a Legacy EHR ( Guest speaker Chief Analytics Officer from RXA )
- Three Guiding Principles of the Most Successful Health IT Initiatives( Guest speaker Principle and founder of Elwood and Winston Consulting )
- Things you need to know when moving to a New EHR ( Guest speaker from Sanford Health )