SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
A            flash drive goes
             missing. A laptop
             gets stolen. An                                 Data breaches
                                                             are costly
employee tosses old patient
files in the trash.
    It can happen. Medical
data breaches represented
more than 24 percent of all
data breaches reported
nationwide in 2010, accord-
ing to the Identity Theft
                                  Protect yourself and your practice
Resource Center.
                                                                           Under HITECH, providers do not need to take any action if lost
    However, many breaches go unreported publicly because they
                                                                       or stolen data is encrypted. Nevertheless, no security plan is 100
involve fewer than 500 records. In those cases, the Health
                                                                       percent foolproof.
Information Technology for Economic and Clinical Health
                                                                           In the event of a breach, comprehensive general liability (CGL)
(HITECH) Act requires only that a provider or other covered
                                                                       policies do not cover any losses. This lack has spurred the rise of
entity notify the secretary of the Department of Health and
                                                                       cyber liability or data breach insurance.
Human Services of a breach within 60 days of the end of the calendar
                                                                           Some medical malpractice insurers now include data breach
year in which the breach occurred.
                                                                       insurance in their general malpractice policies. Some commercial
    Providers should have security measures that comply with the
                                                                       liability insurers offer coverage as an enhancement to a CGL policy.
strengthened enforcement and privacy protections provided under
                                                                       But most insurers can provide
HITECH and the Health Insurance Portability and Accountability
Act – better known as HIPAA. Protect your data with antivirus
                                                                       stand-alone policies to help protect
                                                                       organizations from what can be a
                                                                                                                      Inside
software, network firewalls and encryption.
                                                                       financial nightmare.
                                                                           The cost of dealing with a healthcare
                                                                       breach averages $301 per compromised
                                                                                                                   July/August 2011

                               T   he cost of dealing with
                                     a healthcare breach
                                    averages $301 per
                                                                       record, according to the 2010 U.S. ➜	 our practice is a business:
                                                                       Cost of a Data Breach study released
                                                                       by Ponemon Institute in March 2011.
                                                                                                                    	
                                                                                                                    Y
                                                                                                                    Is it managed that way?
                                                                       For the average physician’s panel of ➜	 autious steps wise when
                                                                                                                    	
                                                                                                                    C
                                  compromised record.                  2,030 patients, a breach can total more      merging medical practices
                                                                       than $611,000.
                                                                           Expenses include legal, investigative,
                                                                       audit and administrative services, as
                                                                                   See Data breaches on page 2
                                                                                                                      Inside

                             A financial and management bulletin to physicians and medical practices from:




                                                  CERTIFIED PUBLIC ACCOUNTANTS
                                     3330 W. Esplanade Avenue • Suite 100 • Metairie, Louisiana 70002
                                       (504) 838-9991 • Fax: (504) 833-7971 • www.kl-cpa.com
Data breaches continued from page 1                                      The cost of a $1 million policy can run from a minimum of
                                                                      $1,500 to $5,000 or more, depending on a practice’s size and
well as the loss of patients and reputation. Of the 15 industries     number of data records, policy features and associated risks.
covered in the Ponemon study, health care and pharmaceuticals         Underwriters will want to know that a practice is financially
shared the top spot for abnormal turnover of customers after an       stable, has not had any losses and has mitigated risk.
incident.
    Then there are the federal and state regulators. They can
impose hefty penalties for mishandled data.
    In March, Massachusetts General Hospital was fined
$1 million for the loss of 192 patients’ files inadvertently left
on a subway train by an employee. Unintentional employee
action, lost or stolen computing devices, and third-party error
were the major causes of healthcare data breaches, according
                                                                                                                   E   xperts believe the
                                                                                                                       number of breaches
                                                                                                                   is certain to rise as we
to a Ponemon study.                                                                                                move toward greater
    When purchasing data breach insurance, be aware that
policies vary considerably from carrier to carrier. For example,                                                   adoption of electronic
some insurers offer additional coverage for civil penalties or                                                     health records.
regulatory fines. Others do not.
    Many states prohibit coverage for statutory or regulatory
fines and penalties as against public policy. An insurer might
include third-party exposure but not first-party coverage.
    Read exclusions carefully. Although a policy might include           Mitigating risk includes written policies and procedures,
first-party coverage, it could exclude the acts of a rogue            employee training and monitoring, installation of appropriate
employee. A knowledgeable broker or consultant can help you           computer security software, and contractual allocation of
review policy terms to ensure that you get coverage to best fit       liability, among other things.
your needs.                                                              Purchasing insurance does not absolve an organization
    Generally, comprehensive stand-alone policies can cover           from complying with federal and state regulations, ensuring
costs, up to certain limits, for items such as:                       that security measures are in place, or having a plan of action
                                                                      should a data breach occur.
    ▲ Legal defense
                                                                         Experts believe the number of breaches is certain to rise as
    ▲ Investigation and forensic services                             we move toward greater adoption of electronic health records.
    ▲ Notification requirements as stipulated under the               The Ponemon Institute has developed a data breach risk
      HITECH Act                                                      calculator that can estimate an organization’s risk profile, the
                                                                      average cost per compromised record and the average cost per
    ▲ Credit monitoring for affected individuals                      breach.
    ▲ Data recovery                                                      You can also see how your risk profile compares with other
                                                                      healthcare organizations and industries. To check your risk,
    ▲ Public relations management
                                                                      go to http://databreachcalculator.com.sapin.arvixe.com. –
    ▲ Network and/or business interruption                            Irene E. Lombardo


                             The root causes of patient data loss or theft
                Unintentional action                                                                               52%
  Lost or stolen computing device                                                                      41%
                      Third-party snafu                                                      34%
            Technical systems glitch                                                       31%
                        Criminal attack                                   20%
                      Malicious insider                             15%
 Intentional non-malicious action                           10%
                                            0%         10%            20%            30%         40%         50%         60%

      Source: Benchmark Study on Patient Privacy and Data Security, Ponemon Institute LLC, Nov. 9, 2010



2                                                 July/August 2011 Your Healthy Practice
Your practice is a business:
   Is it managed
   that way?
   M
             edical prac tices
             succeed by design,
             not by accident.
      Approximately 80 percent                                       person who shares that vision and has experience managing
   of all new businesses fail                                        toward those goals.
   because their owners do not                                          The only truly indispensable employee in your practice
   take the time to formulate a                                      should be you.
   business plan and manage its
   execution. In this regard,
                                                                         3.		 ractice	management	does	not	
                                                                            P
   health care is like any other                                            equate	to	business	management.
   business.                                        Practice management focuses on the delivery of care to
      Here are four reasons                      patients. Business management focuses on allowing the
   why medical practices fail as                 practice to be successful.
   a business:                                      Unless the business is well managed, the practice cannot
                                                 succeed. Running your own medical practice is a for-profit
      1.	 	 our	medical	skills	do	not	guarantee	 operation. It should be run like the business it is.
          Y
          success.
      There are many talented people who are unable to run a             4.		 atient	care	is	not	the	key	to		
                                                                            P
   successful business. Being an expert with a particular set of            profitability.
   skills that are in high demand is a good start, but it is no         It is fair to say that no one is born with basic business
   guarantee of financial success.                                   management skills. You should be willing to take a week
      History is littered with smart people who could not take a     out of your career for a course in business management.
   new product or idea and make it into a commercial success.           You should also plan to spend 25 to 30 percent of your
                                                                     time focused on the business of the practice, not on seeing
      2.		 our	office	manager	should	not	run	
         Y                                                           patients. If you are going to invest in a medical practice,
         your	medical	practice.                                      you must be willing to monitor that investment. If you are
      There is a big difference between delegation of authority      unwilling to commit to that responsibility, you should find
   and abdication of responsibility. Office managers and other       a practice where you can sign on as an employee.
   employees are essential to the success of your practice.             Ask yourself two questions:
      But there can be only one CEO. Unless you are willing              ▲ Why did you go into medicine?
   to take responsibility for vision, strategy and leadership,
   you have not taken ownership of your practice.                        ▲ Why do you want to own your practice?
      Hiring an experienced office manager is no guarantee              If owning your practice fulfills your purpose, you
   that you are hiring the right person for your practice. By        need to invest just a fraction of the time you spent on
   establishing your vision for the practice and the goals you       your medical training to learn business management
   want to achieve, you increase the likelihood of hiring a          skills. – Michael Redemske, CPA



Cautious steps continued from page 4                                     They should figure one month to discuss the general terms
                                                                     of the deal and reach a letter of intent.
   It may also be necessary to obtain the services of an             Then they should plan on a second
appraiser to value the respective practices and help determine       month for each party to conduct due
the appropriate ownership percentages that will reflect each         diligence on the other’s practice.           Caution
party’s relative contribution to the merged entity.                  Finally, they should expect the drafting
   With proper planning, a merger of two medical practices           of the closing documents and the actual
should be accomplished in a reasonably painless fashion over a       closing to take another month. –
period of about three months.                                        Michael Redemske, CPA

                                                 July/August 2011 Your Healthy Practice                                             3
Cautious steps wise when merging medical practices
     Two medical practitioners might merge their practices                and particularly the liabilities the parties are transferring into
 for any number of reasons. Sharing office space, covering                the combined practice.
 one another’s patients during vacations and other absences,                 They must also take income tax considerations into
 and preparing for retirement are just a few.                             account. A merger of two professional corporations can
                                    Once a practice has identified        generally be accomplished tax free. However, if one or both
                                a potential merger candidate, it          parties plan to take cash or other assets out of the corpora-
                                is a good idea to enter into a            tion either before or after the merger, a tax liability may
Merger                          nondisclosure agreement early             result.
                                in the process to protect both               A merger of unincorporated practices can usually be
                                parties’ confidential informa-            accomplished tax free. The combined practice can be operated
                                tion. As the deal progresses,             as a partnership, a limited liability company (LLC) or a
                                they may consider moving to a             professional corporation.
                                letter of intent.                            If either party to the merger has to disassociate from a
     A letter of intent should not be a binding agreement. It             multi-owner practice or if co-owners of either of the merged
 should only confirm the basic deal terms and commit both                 practices have to be bought out, a variety of tax consequences
 parties to mutual cooperation and exclusivity while due                  can result from the disassociation or buyout.
 diligence is taking place.                                                  The parties should plan to involve their accountants and
     An open, orderly and professional due diligence benefits             attorneys early in the merger discussions. And they should
 both parties. During this process, the parties should disclose           expect that both proposed merger partners will want their
 and fully understand the economics of both practices, including          own accountant and attorney involved.
 the patient base, the qualifications of all employees, the assets                                                See Cautious steps on page 3

                                                             Your Healthy Practice
 The technical information in this newsletter is necessarily brief. No final conclusion on these topics should be drawn without
 further review and consultation. Please be advised that, based on current IRS rules and standards, the information contained herein is
 not intended to be used, nor can it be used, for the avoidance of any tax penalty assessed by the IRS.           © 2011 CPAmerica International




                                                                                                    CERTIFIED PUBLIC ACCOUNTANTS

                                                                                                           3330 W. Esplanade Avenue
                                                                                                                  Suite 100
                                                                                                          Metairie, Louisiana 70002

Mais conteúdo relacionado

Mais procurados

Rapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government SectorRapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government SectorRapid7
 
Hitech for HIPAA
Hitech for HIPAAHitech for HIPAA
Hitech for HIPAAdkarpinsky
 
INFORMATION SECURITY STUDY REGARDING PII
INFORMATION SECURITY STUDY REGARDING PIIINFORMATION SECURITY STUDY REGARDING PII
INFORMATION SECURITY STUDY REGARDING PII- Mark - Fullbright
 
Case Study: Combating Medical Identity Theft
Case Study: Combating Medical Identity TheftCase Study: Combating Medical Identity Theft
Case Study: Combating Medical Identity TheftBooz Allen Hamilton
 
Privacy and Information Security: What Every New Business Needs to Know
Privacy and Information Security:  What Every New Business Needs to KnowPrivacy and Information Security:  What Every New Business Needs to Know
Privacy and Information Security: What Every New Business Needs to KnowThe Capital Network
 
Data Breaches
Data BreachesData Breaches
Data Breachessstose
 
Cost of Data Breah in Healthcare_Quinlan, Courtney
Cost of Data Breah in Healthcare_Quinlan, CourtneyCost of Data Breah in Healthcare_Quinlan, Courtney
Cost of Data Breah in Healthcare_Quinlan, Courtneycourtneyquinlan
 
HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
HEALTHCARE IT: IS YOUR INFORMATION AT RISK? HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
HEALTHCARE IT: IS YOUR INFORMATION AT RISK? IJNSA Journal
 
Sarah Kim HIPAA for Small Providers
Sarah Kim HIPAA for Small ProvidersSarah Kim HIPAA for Small Providers
Sarah Kim HIPAA for Small ProvidersSarah Kim
 
Privacy Breaches In Canada It.Can May 1 2009
Privacy Breaches In Canada   It.Can May 1 2009Privacy Breaches In Canada   It.Can May 1 2009
Privacy Breaches In Canada It.Can May 1 2009canadianlawyer
 
UW - IMT 552-JPMorgan Chase & Co. Risk Assessment
UW - IMT 552-JPMorgan Chase & Co. Risk AssessmentUW - IMT 552-JPMorgan Chase & Co. Risk Assessment
UW - IMT 552-JPMorgan Chase & Co. Risk AssessmentAkshay Ajgaonkar
 
Data Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being UnpreparedData Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being Unpreparedhaynormania
 
Texas Privacy Laws - Tough New Changes
Texas Privacy Laws - Tough New ChangesTexas Privacy Laws - Tough New Changes
Texas Privacy Laws - Tough New ChangesJim Brashear
 
wp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industrywp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industryNumaan Huq
 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryEMC
 
GIST 698 Research Paper
GIST 698 Research PaperGIST 698 Research Paper
GIST 698 Research PaperRyan Flanagan
 

Mais procurados (20)

Rapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government SectorRapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government Sector
 
Hitech for HIPAA
Hitech for HIPAAHitech for HIPAA
Hitech for HIPAA
 
Legal Aspects in Health Informatics
Legal Aspects in Health InformaticsLegal Aspects in Health Informatics
Legal Aspects in Health Informatics
 
INFORMATION SECURITY STUDY REGARDING PII
INFORMATION SECURITY STUDY REGARDING PIIINFORMATION SECURITY STUDY REGARDING PII
INFORMATION SECURITY STUDY REGARDING PII
 
Case Study: Combating Medical Identity Theft
Case Study: Combating Medical Identity TheftCase Study: Combating Medical Identity Theft
Case Study: Combating Medical Identity Theft
 
Privacy and Information Security: What Every New Business Needs to Know
Privacy and Information Security:  What Every New Business Needs to KnowPrivacy and Information Security:  What Every New Business Needs to Know
Privacy and Information Security: What Every New Business Needs to Know
 
Data Breaches
Data BreachesData Breaches
Data Breaches
 
Legal Aspects in Health Informatics
Legal Aspects in Health InformaticsLegal Aspects in Health Informatics
Legal Aspects in Health Informatics
 
Cost of Data Breah in Healthcare_Quinlan, Courtney
Cost of Data Breah in Healthcare_Quinlan, CourtneyCost of Data Breah in Healthcare_Quinlan, Courtney
Cost of Data Breah in Healthcare_Quinlan, Courtney
 
HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
HEALTHCARE IT: IS YOUR INFORMATION AT RISK? HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
 
Sarah Kim HIPAA for Small Providers
Sarah Kim HIPAA for Small ProvidersSarah Kim HIPAA for Small Providers
Sarah Kim HIPAA for Small Providers
 
Privacy Breaches In Canada It.Can May 1 2009
Privacy Breaches In Canada   It.Can May 1 2009Privacy Breaches In Canada   It.Can May 1 2009
Privacy Breaches In Canada It.Can May 1 2009
 
UW - IMT 552-JPMorgan Chase & Co. Risk Assessment
UW - IMT 552-JPMorgan Chase & Co. Risk AssessmentUW - IMT 552-JPMorgan Chase & Co. Risk Assessment
UW - IMT 552-JPMorgan Chase & Co. Risk Assessment
 
Data Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being UnpreparedData Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being Unprepared
 
Texas Privacy Laws - Tough New Changes
Texas Privacy Laws - Tough New ChangesTexas Privacy Laws - Tough New Changes
Texas Privacy Laws - Tough New Changes
 
wp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industrywp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industry
 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare Industry
 
GIST 698 Research Paper
GIST 698 Research PaperGIST 698 Research Paper
GIST 698 Research Paper
 
HealthCo Accelerate 2016 speaker deck #2
HealthCo Accelerate 2016 speaker deck #2HealthCo Accelerate 2016 speaker deck #2
HealthCo Accelerate 2016 speaker deck #2
 
WhitePaper- Archiving Supports HIPAA Compliance
WhitePaper- Archiving Supports HIPAA ComplianceWhitePaper- Archiving Supports HIPAA Compliance
WhitePaper- Archiving Supports HIPAA Compliance
 

Destaque

Valuations Plus Spring 2011 Newsletter
Valuations Plus Spring 2011 NewsletterValuations Plus Spring 2011 Newsletter
Valuations Plus Spring 2011 NewsletterKushner LaGraize, LLC
 
Redes de afiliados, vender pela internet. Como funciona venda por CPA
Redes de afiliados, vender pela internet.  Como funciona venda por CPARedes de afiliados, vender pela internet.  Como funciona venda por CPA
Redes de afiliados, vender pela internet. Como funciona venda por CPAMundo CPA
 

Destaque (6)

Valuations Plus Spring 2011 Newsletter
Valuations Plus Spring 2011 NewsletterValuations Plus Spring 2011 Newsletter
Valuations Plus Spring 2011 Newsletter
 
2010 year end tax planning letter
2010 year end tax planning letter2010 year end tax planning letter
2010 year end tax planning letter
 
Your Healthy Practice
Your Healthy Practice Your Healthy Practice
Your Healthy Practice
 
Your Healthy Practice
Your Healthy PracticeYour Healthy Practice
Your Healthy Practice
 
2011 Mid-Year Tax Planning
2011 Mid-Year Tax Planning2011 Mid-Year Tax Planning
2011 Mid-Year Tax Planning
 
Redes de afiliados, vender pela internet. Como funciona venda por CPA
Redes de afiliados, vender pela internet.  Como funciona venda por CPARedes de afiliados, vender pela internet.  Como funciona venda por CPA
Redes de afiliados, vender pela internet. Como funciona venda por CPA
 

Semelhante a Your healthy practice July/August 2011

Redspin PHI Breach Report 2012
Redspin PHI Breach Report 2012Redspin PHI Breach Report 2012
Redspin PHI Breach Report 2012Redspin, Inc.
 
Redspin Report - Protected Health Information 2010 Breach Report
Redspin Report - Protected Health Information 2010 Breach ReportRedspin Report - Protected Health Information 2010 Breach Report
Redspin Report - Protected Health Information 2010 Breach ReportRedspin, Inc.
 
wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-dataNumaan Huq
 
2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast- Mark - Fullbright
 
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxPage 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxkarlhennesey
 
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxPage 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxhoney690131
 
Healthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINALHealthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINALSteve Knapp
 
Data Breach Insurance - Optometric Protector Plan
Data Breach Insurance - Optometric Protector PlanData Breach Insurance - Optometric Protector Plan
Data Breach Insurance - Optometric Protector Plansarahb171
 
$8.3 billion lost by healthcare from poor communication, Bloedau
$8.3 billion lost by healthcare from poor communication, Bloedau$8.3 billion lost by healthcare from poor communication, Bloedau
$8.3 billion lost by healthcare from poor communication, BloedauHIMSS
 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryEMC
 
Protected Harbor Data Breach Trend Report
Protected Harbor Data Breach Trend ReportProtected Harbor Data Breach Trend Report
Protected Harbor Data Breach Trend ReportProtected Harbor
 
Fraud And Abuse In The U.S. Healthcare System
Fraud And Abuse In The U.S. Healthcare SystemFraud And Abuse In The U.S. Healthcare System
Fraud And Abuse In The U.S. Healthcare SystemKendra Cote
 
Safeguarding Patient Privacy in a Digital Age (Brian Kalis)
Safeguarding Patient Privacy in a Digital Age (Brian Kalis)Safeguarding Patient Privacy in a Digital Age (Brian Kalis)
Safeguarding Patient Privacy in a Digital Age (Brian Kalis)U.S. News Healthcare of Tomorrow
 
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...SafeNet
 
Network Security and Privacy Liability - Four Reasons Why You need This Cove...
Network Security and Privacy Liability  - Four Reasons Why You need This Cove...Network Security and Privacy Liability  - Four Reasons Why You need This Cove...
Network Security and Privacy Liability - Four Reasons Why You need This Cove...CBIZ, Inc.
 
Systems AdminstratorAs your systems administrator  person I am.docx
Systems AdminstratorAs your systems administrator  person I am.docxSystems AdminstratorAs your systems administrator  person I am.docx
Systems AdminstratorAs your systems administrator  person I am.docxssuserf9c51d
 
Running head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxRunning head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxwlynn1
 
Proof of immunity and the demise of privacy 2020 world in 2030
Proof of immunity and the demise of privacy 2020   world in 2030Proof of immunity and the demise of privacy 2020   world in 2030
Proof of immunity and the demise of privacy 2020 world in 2030Future Agenda
 
Data Security Regulatory Lansdcape
Data Security Regulatory LansdcapeData Security Regulatory Lansdcape
Data Security Regulatory LansdcapeBrian Bauer
 

Semelhante a Your healthy practice July/August 2011 (20)

Redspin PHI Breach Report 2012
Redspin PHI Breach Report 2012Redspin PHI Breach Report 2012
Redspin PHI Breach Report 2012
 
Redspin Report - Protected Health Information 2010 Breach Report
Redspin Report - Protected Health Information 2010 Breach ReportRedspin Report - Protected Health Information 2010 Breach Report
Redspin Report - Protected Health Information 2010 Breach Report
 
wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-data
 
2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast
 
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxPage 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
 
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxPage 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
 
Healthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINALHealthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINAL
 
Data Breach Insurance - Optometric Protector Plan
Data Breach Insurance - Optometric Protector PlanData Breach Insurance - Optometric Protector Plan
Data Breach Insurance - Optometric Protector Plan
 
$8.3 billion lost by healthcare from poor communication, Bloedau
$8.3 billion lost by healthcare from poor communication, Bloedau$8.3 billion lost by healthcare from poor communication, Bloedau
$8.3 billion lost by healthcare from poor communication, Bloedau
 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare Industry
 
arcsight_scmag_hcspecial
arcsight_scmag_hcspecialarcsight_scmag_hcspecial
arcsight_scmag_hcspecial
 
Protected Harbor Data Breach Trend Report
Protected Harbor Data Breach Trend ReportProtected Harbor Data Breach Trend Report
Protected Harbor Data Breach Trend Report
 
Fraud And Abuse In The U.S. Healthcare System
Fraud And Abuse In The U.S. Healthcare SystemFraud And Abuse In The U.S. Healthcare System
Fraud And Abuse In The U.S. Healthcare System
 
Safeguarding Patient Privacy in a Digital Age (Brian Kalis)
Safeguarding Patient Privacy in a Digital Age (Brian Kalis)Safeguarding Patient Privacy in a Digital Age (Brian Kalis)
Safeguarding Patient Privacy in a Digital Age (Brian Kalis)
 
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
 
Network Security and Privacy Liability - Four Reasons Why You need This Cove...
Network Security and Privacy Liability  - Four Reasons Why You need This Cove...Network Security and Privacy Liability  - Four Reasons Why You need This Cove...
Network Security and Privacy Liability - Four Reasons Why You need This Cove...
 
Systems AdminstratorAs your systems administrator  person I am.docx
Systems AdminstratorAs your systems administrator  person I am.docxSystems AdminstratorAs your systems administrator  person I am.docx
Systems AdminstratorAs your systems administrator  person I am.docx
 
Running head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxRunning head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docx
 
Proof of immunity and the demise of privacy 2020 world in 2030
Proof of immunity and the demise of privacy 2020   world in 2030Proof of immunity and the demise of privacy 2020   world in 2030
Proof of immunity and the demise of privacy 2020 world in 2030
 
Data Security Regulatory Lansdcape
Data Security Regulatory LansdcapeData Security Regulatory Lansdcape
Data Security Regulatory Lansdcape
 

Mais de Kushner LaGraize, LLC (10)

Your Healthy Practice 2011
Your Healthy  Practice 2011Your Healthy  Practice 2011
Your Healthy Practice 2011
 
Client Advisor 2011
Client Advisor 2011Client Advisor 2011
Client Advisor 2011
 
Client Advisor - Winter 2011
Client Advisor - Winter 2011Client Advisor - Winter 2011
Client Advisor - Winter 2011
 
Client Advisor Winter 2011
Client  Advisor Winter 2011Client  Advisor Winter 2011
Client Advisor Winter 2011
 
CPAmerica Partners Retreat
CPAmerica Partners RetreatCPAmerica Partners Retreat
CPAmerica Partners Retreat
 
Health Practice Fall 2010
Health Practice Fall 2010Health Practice Fall 2010
Health Practice Fall 2010
 
Client Advisor Fall 2010
Client Advisor Fall 2010 Client Advisor Fall 2010
Client Advisor Fall 2010
 
2010midyeartaxplanning
2010midyeartaxplanning2010midyeartaxplanning
2010midyeartaxplanning
 
Healthcare reform bill for individuals and businesses
Healthcare reform bill for individuals and businesses Healthcare reform bill for individuals and businesses
Healthcare reform bill for individuals and businesses
 
Health Care Reform
Health Care ReformHealth Care Reform
Health Care Reform
 

Último

John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfAmzadHosen3
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 

Último (20)

John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 

Your healthy practice July/August 2011

  • 1. A flash drive goes missing. A laptop gets stolen. An Data breaches are costly employee tosses old patient files in the trash. It can happen. Medical data breaches represented more than 24 percent of all data breaches reported nationwide in 2010, accord- ing to the Identity Theft Protect yourself and your practice Resource Center. Under HITECH, providers do not need to take any action if lost However, many breaches go unreported publicly because they or stolen data is encrypted. Nevertheless, no security plan is 100 involve fewer than 500 records. In those cases, the Health percent foolproof. Information Technology for Economic and Clinical Health In the event of a breach, comprehensive general liability (CGL) (HITECH) Act requires only that a provider or other covered policies do not cover any losses. This lack has spurred the rise of entity notify the secretary of the Department of Health and cyber liability or data breach insurance. Human Services of a breach within 60 days of the end of the calendar Some medical malpractice insurers now include data breach year in which the breach occurred. insurance in their general malpractice policies. Some commercial Providers should have security measures that comply with the liability insurers offer coverage as an enhancement to a CGL policy. strengthened enforcement and privacy protections provided under But most insurers can provide HITECH and the Health Insurance Portability and Accountability Act – better known as HIPAA. Protect your data with antivirus stand-alone policies to help protect organizations from what can be a Inside software, network firewalls and encryption. financial nightmare. The cost of dealing with a healthcare breach averages $301 per compromised July/August 2011 T he cost of dealing with a healthcare breach averages $301 per record, according to the 2010 U.S. ➜ our practice is a business: Cost of a Data Breach study released by Ponemon Institute in March 2011. Y Is it managed that way? For the average physician’s panel of ➜ autious steps wise when C compromised record. 2,030 patients, a breach can total more merging medical practices than $611,000. Expenses include legal, investigative, audit and administrative services, as See Data breaches on page 2 Inside A financial and management bulletin to physicians and medical practices from: CERTIFIED PUBLIC ACCOUNTANTS 3330 W. Esplanade Avenue • Suite 100 • Metairie, Louisiana 70002 (504) 838-9991 • Fax: (504) 833-7971 • www.kl-cpa.com
  • 2. Data breaches continued from page 1 The cost of a $1 million policy can run from a minimum of $1,500 to $5,000 or more, depending on a practice’s size and well as the loss of patients and reputation. Of the 15 industries number of data records, policy features and associated risks. covered in the Ponemon study, health care and pharmaceuticals Underwriters will want to know that a practice is financially shared the top spot for abnormal turnover of customers after an stable, has not had any losses and has mitigated risk. incident. Then there are the federal and state regulators. They can impose hefty penalties for mishandled data. In March, Massachusetts General Hospital was fined $1 million for the loss of 192 patients’ files inadvertently left on a subway train by an employee. Unintentional employee action, lost or stolen computing devices, and third-party error were the major causes of healthcare data breaches, according E xperts believe the number of breaches is certain to rise as we to a Ponemon study. move toward greater When purchasing data breach insurance, be aware that policies vary considerably from carrier to carrier. For example, adoption of electronic some insurers offer additional coverage for civil penalties or health records. regulatory fines. Others do not. Many states prohibit coverage for statutory or regulatory fines and penalties as against public policy. An insurer might include third-party exposure but not first-party coverage. Read exclusions carefully. Although a policy might include Mitigating risk includes written policies and procedures, first-party coverage, it could exclude the acts of a rogue employee training and monitoring, installation of appropriate employee. A knowledgeable broker or consultant can help you computer security software, and contractual allocation of review policy terms to ensure that you get coverage to best fit liability, among other things. your needs. Purchasing insurance does not absolve an organization Generally, comprehensive stand-alone policies can cover from complying with federal and state regulations, ensuring costs, up to certain limits, for items such as: that security measures are in place, or having a plan of action should a data breach occur. ▲ Legal defense Experts believe the number of breaches is certain to rise as ▲ Investigation and forensic services we move toward greater adoption of electronic health records. ▲ Notification requirements as stipulated under the The Ponemon Institute has developed a data breach risk HITECH Act calculator that can estimate an organization’s risk profile, the average cost per compromised record and the average cost per ▲ Credit monitoring for affected individuals breach. ▲ Data recovery You can also see how your risk profile compares with other healthcare organizations and industries. To check your risk, ▲ Public relations management go to http://databreachcalculator.com.sapin.arvixe.com. – ▲ Network and/or business interruption Irene E. Lombardo The root causes of patient data loss or theft Unintentional action 52% Lost or stolen computing device 41% Third-party snafu 34% Technical systems glitch 31% Criminal attack 20% Malicious insider 15% Intentional non-malicious action 10% 0% 10% 20% 30% 40% 50% 60% Source: Benchmark Study on Patient Privacy and Data Security, Ponemon Institute LLC, Nov. 9, 2010 2 July/August 2011 Your Healthy Practice
  • 3. Your practice is a business: Is it managed that way? M edical prac tices succeed by design, not by accident. Approximately 80 percent person who shares that vision and has experience managing of all new businesses fail toward those goals. because their owners do not The only truly indispensable employee in your practice take the time to formulate a should be you. business plan and manage its execution. In this regard, 3. ractice management does not P health care is like any other equate to business management. business. Practice management focuses on the delivery of care to Here are four reasons patients. Business management focuses on allowing the why medical practices fail as practice to be successful. a business: Unless the business is well managed, the practice cannot succeed. Running your own medical practice is a for-profit 1. our medical skills do not guarantee operation. It should be run like the business it is. Y success. There are many talented people who are unable to run a 4. atient care is not the key to P successful business. Being an expert with a particular set of profitability. skills that are in high demand is a good start, but it is no It is fair to say that no one is born with basic business guarantee of financial success. management skills. You should be willing to take a week History is littered with smart people who could not take a out of your career for a course in business management. new product or idea and make it into a commercial success. You should also plan to spend 25 to 30 percent of your time focused on the business of the practice, not on seeing 2. our office manager should not run Y patients. If you are going to invest in a medical practice, your medical practice. you must be willing to monitor that investment. If you are There is a big difference between delegation of authority unwilling to commit to that responsibility, you should find and abdication of responsibility. Office managers and other a practice where you can sign on as an employee. employees are essential to the success of your practice. Ask yourself two questions: But there can be only one CEO. Unless you are willing ▲ Why did you go into medicine? to take responsibility for vision, strategy and leadership, you have not taken ownership of your practice. ▲ Why do you want to own your practice? Hiring an experienced office manager is no guarantee If owning your practice fulfills your purpose, you that you are hiring the right person for your practice. By need to invest just a fraction of the time you spent on establishing your vision for the practice and the goals you your medical training to learn business management want to achieve, you increase the likelihood of hiring a skills. – Michael Redemske, CPA Cautious steps continued from page 4 They should figure one month to discuss the general terms of the deal and reach a letter of intent. It may also be necessary to obtain the services of an Then they should plan on a second appraiser to value the respective practices and help determine month for each party to conduct due the appropriate ownership percentages that will reflect each diligence on the other’s practice. Caution party’s relative contribution to the merged entity. Finally, they should expect the drafting With proper planning, a merger of two medical practices of the closing documents and the actual should be accomplished in a reasonably painless fashion over a closing to take another month. – period of about three months. Michael Redemske, CPA July/August 2011 Your Healthy Practice 3
  • 4. Cautious steps wise when merging medical practices Two medical practitioners might merge their practices and particularly the liabilities the parties are transferring into for any number of reasons. Sharing office space, covering the combined practice. one another’s patients during vacations and other absences, They must also take income tax considerations into and preparing for retirement are just a few. account. A merger of two professional corporations can Once a practice has identified generally be accomplished tax free. However, if one or both a potential merger candidate, it parties plan to take cash or other assets out of the corpora- is a good idea to enter into a tion either before or after the merger, a tax liability may Merger nondisclosure agreement early result. in the process to protect both A merger of unincorporated practices can usually be parties’ confidential informa- accomplished tax free. The combined practice can be operated tion. As the deal progresses, as a partnership, a limited liability company (LLC) or a they may consider moving to a professional corporation. letter of intent. If either party to the merger has to disassociate from a A letter of intent should not be a binding agreement. It multi-owner practice or if co-owners of either of the merged should only confirm the basic deal terms and commit both practices have to be bought out, a variety of tax consequences parties to mutual cooperation and exclusivity while due can result from the disassociation or buyout. diligence is taking place. The parties should plan to involve their accountants and An open, orderly and professional due diligence benefits attorneys early in the merger discussions. And they should both parties. During this process, the parties should disclose expect that both proposed merger partners will want their and fully understand the economics of both practices, including own accountant and attorney involved. the patient base, the qualifications of all employees, the assets See Cautious steps on page 3 Your Healthy Practice The technical information in this newsletter is necessarily brief. No final conclusion on these topics should be drawn without further review and consultation. Please be advised that, based on current IRS rules and standards, the information contained herein is not intended to be used, nor can it be used, for the avoidance of any tax penalty assessed by the IRS. © 2011 CPAmerica International CERTIFIED PUBLIC ACCOUNTANTS 3330 W. Esplanade Avenue Suite 100 Metairie, Louisiana 70002