New call coverage rules from the Texas Medical Board

In October 2016, the TMB adopted new call coverage rules.

Most physicians participate in a “reciprocal call coverage model” — sharing call with physicians of the same or similar specialties.

However, some physicians participate in a “non-reciprocal call coverage model.” The rules for this model include requirements for a written call agreement, access to patient medical records, a written report, and other elements.

For more information regarding both call coverage models, please see TMB rules Section 177.20 and the article “New Texas Medical Board call coverage rules causing concern,” published by the Texas Ophthalmological Association.

What every physician needs to know about their medical malpractice insurance policy

Whether you are purchasing malpractice insurance for your own practice or joining a group that provides your insurance, pay attention to the details of your policy. This presentation provides important questions to ask and gives practical advice for managing your policy.

Risk alert: Austin attorney threatening ADA lawsuits

TMLT has received several questions from policyholders regarding letters sent to them by Austin attorney Omar W. Rosales. In the letters, Rosales asks the recipient to pay $2,000 or be sued for alleged Americans with Disabilities Act (ADA) website violations. His lawsuits have been aimed at small businesses, such as restaurants, extending to medical offices.

Rosales’ threats of litigation have been called “as close to a shakedown as you can get” and a “perverted use of the ADA” by civil rights attorney Jim Harrington. Harrington told KXAN news in Austin that he has formed the Texas ADA Defense Project to combat potentially exploitative litigation threats, such as those filed by Rosales, that could undermine the integrity of the ADA.

If you have received a demand letter and threat of litigation from Rosales, please contact the TMLT Claims Department at 800-580-8658.

Read more: 

Need to step up your cyber security monitoring? TMLT and eSENTIRE can help

 by John Southrey, CIC, CRM

Director, Product Development and Consulting Services

For physicians or groups who want a higher level of cyber security monitoring, TMLT is now partnering with eSentire to offer 24-hour live monitoring of your computer network.

eSentire offers Managed Detection and Response (MDR) to shield your confidential information against cyber attacks. With MDR, security analysts monitor your network for suspicious behavior, allowing for rapid intrusion detection and response. Having this level of threat detection and incident response allows for immediate intervention before the attacker has accessed or copied exploitable data. Essentially, MDR acts as an intelligent circuit breaker in real time.

Health care organizations are increasingly the target of cyber attacks, and cyber criminals use a spectrum of attack vectors —ransomware, socially-engineered phishing attacks, and malware invasions — to access networks.

Other sophisticated attacks look for security holes in software that are unknown to the software vendors. These “zero day attacks” can go undetected by traditional data security tools and are carried out before the vendor becomes aware of them. Timely detection and response to these attacks is critical.

Microsoft’s Windows operating system was recently subjected to a “zero day” attack. On November 2, Microsoft announced it was releasing a software patch to address vulnerabilities found in Windows. These vulnerabilities were exploited by a hacking group reportedly linked to the Russian government who used socially-engineered emails to gain access to the computer networks of U.S. government agencies and military organizations. (1)

Because many health care organizations may take a “wait and see” approach to data security, they may not recognize when they have been breached. Often, it can take up to several weeks to detect and respond to incidents. (2)

Services such as MDR can mitigate the effects of “zero day” and other cyber breaches, thereby narrowing the window of opportunity for an attacker and detecting data breaches before they spiral out of control.

 Learn more about MDR

Please contact the TMLT PDCS team to learn more about eSentire and their services for physicians.


  1. Molina B, Weise E. Microsoft to block Windows flaw used by Russian hackers. USA Today. November 2, 2016. Available at Accessed December 5, 2016.
  2. In a survey of 223 US-based health care executives conducted by KPMG, only 13% reported tracking known cyber security attacks daily. Additionally, 25% stated they do not have or do not know their capabilities, in real-time, if their organization’s systems are being compromised. KPMG. Health Care and Cyber Security — Increasing Threats Require Increased Capabilities. 2015. Available at Accessed December 8, 2016.

Additional reading

  1. AV Test. Malware. Available at Accessed December 8, 2016.
  2. Security risk assessment. Available at Accessed December 8, 2016.
  3. Armor. A Guide to HIPAA compliance & risk management: A Proactive Approach To Data Security. Available at Accessed December 8, 2016.