Beware of Borrowing That Helps Your Advisor – Not You

By Rick Kahler MSFP CFP

***

***

When Maria needed $400,000 for a down payment on a new home, her broker at a large Wall Street firm offered a solution: “Don’t sell investments and trigger capital gains. Just take out a margin loan.”

A margin loan is a line of credit from a brokerage firm, secured by the client’s investment portfolio. It offers quick access to cash with no immediate tax consequences and minimal paperwork. But the convenience comes at a cost. As of mid-2025, margin loan interest rates range from 6.25% to over 11%.

Margin loan recommendations are often presented by brokers as tax-savvy strategies that allow clients to access “tax-free” cash while keeping their portfolios intact. In many cases, however, the math benefits the advisor more than the investor. The cost of borrowing often exceeds what an investor is likely to earn by holding on.

For example, let’s assume an interest rate of 7.5% on Maria’s $400,000 margin loan. While borrowing delayed the payment of $20,000 in capital gains tax, she will eventually have to pay that tax anyway unless she holds the investments until her death. Two years later, with portfolio returns of 4% annually, she had earned around $32,000 from the $400,000 in investments she might have sold. Meanwhile, she had paid $60,000 in interest—leaving her some $28,000 worse off. That’s without factoring in ongoing interest payments, or the risks of a margin call if the investments securing the loan drop in value.

Why do advisors keep recommending margin loans? Because selling investments reduces the portfolio size and the advisor’s fee. Borrowing keeps the portfolio intact and the compensation unchanged—while the firm receives additional income from interest on the loan. In some cases, advisors suggest using margin loans to buy more investments, increasing both the portfolio and the fee they collect.

None of this is illegal. But when the borrowing cost is higher than expected returns and the advisor benefits financially, the ethics are questionable. The client takes the risk, while the advisor keeps the revenue.

This kind of conflict appears more often in portfolios where compensation is tied to asset volume and the company’s primary culture rewards gathering assets over delivering unbiased advice. By contrast, fee-only financial planning and investment advisors typically operate on simpler hourly, flat, or tiered fee structures. Their compensation doesn’t depend on whether a client borrows, sells, or holds. The culture of the firm focuses on conflict-free advice aligned with the client’s best interest.

Wall Street brokers are often held to a fiduciary standard, but structure still matters. In 2024 the SEC reported their examinations of brokers would continue to focus on advisor recommendations unduly influenced by the company’s compensation and incentives.

There are rare situations where a margin loan may be appropriate. A client with large unrealized gains might use a short-term margin loan to minimize taxes. An elderly investor might borrow tax-free rather than sell assets that will receive a step-up in basis at their death. Even in those cases, the math must be exact and the client must clearly understand the risks, including the possibility of a margin call.

If your advisor recommends a margin loan, especially to buy more investments, ask strong questions. What’s the interest rate? What return is realistic? What are the tax consequences of selling? How does this affect the advisor’s income?

If you don’t get direct answers, that’s a warning sign.

In a high-rate, low-return environment, margin loans rarely favor the client. The exceptions are narrow. The risks are significant. And the conflict of interest is measurable.

Sometimes the smartest move is the simplest: sell what you need, pay the tax, and leave leverage out of your plan.

COMMENTS APPRECIATED

Like and Subscribe

***

***

PARADOXES: Beware Financial and Investing Contradictions

By Staff Reporters

SPONSOR: http://www.MarcinkoAssociates.com

***

***

As we plan for our financial future, I think it’s helpful to be cognizant of these paradoxes. While there’s nothing we can do to control or change them, there is great value in being aware of them, so we can approach them with the right tools and the right mindset.

Here are just seven of the paradoxes that can bedevil financial planning and investment decision-making:

  • There’s the paradox that all of the greatest fortunes—Carnegie, Rockefeller, Buffett, Gates—have been made by owning just one stock. And yet the best advice for individual investors is to do the opposite: to own broadly diversified index funds.
  • There’s the paradox that the stock market may appear overvalued and yet it could become even more overvalued before it eventually declines. And when it does decline, it may be to a level that is even higher than where it is today.
  • There’s the paradox that we make plans based on our understanding of the rules—and yet Congress can change the rules on us at any time, as it did just a few weeks ago.
  • There’s the paradox that we base our plans on historical averages—average stock market returns, average interest rates, average inflation rates and so on—and yet we only lead one life, so none of us will experience the average.
  • There’s the paradox that we continue to be attracted to the prestige of high-cost colleges, even though a rational analysis that looks at return on investment tells us that lower-cost state schools are usually the better bet.
  • There’s the paradox that early retirement seems so appealing—and has even turned into a movement—and yet the reality of early retirement suggests that we might be better off staying at our desks.
  • There’s the paradox that retirees’ worst fear is outliving their money and yet few choose the financial product that is purpose-built to solve that problem: the single-premium immediate annuity.

Assessment

QUESTION: How should you respond to these paradoxes? As you plan for your financial future, embrace the concept of “loosely held views.” In other words, make financial plans, but continuously update your views, question your assumptions and rethink your priorities.

COMMENTS APPRECIATED

Refer and Subscribe

***

***

Can You Contribute to Both a Roth IRA & 401(k)?

By Staff Reporters, AI and the Linqto Team

SPONSOR: http://www.CertifiedMedicalPlanner.org

***

***

Yes, you can contribute to both a Roth IRA and a 401(k), provided you don’t exceed annual contribution limits for each account.

Determining whether to contribute to a Roth IRA, 401(k), or both can be an important step in planning for your retirement. Here are the key differences, including tax advantages, employer contributions, and investment options. 

Eligibility requirements are the first consideration when contributing to a Roth IRA and a 401(k). For Roth IRA contributions, your eligibility is determined by your income. Specifically, if your modified adjusted gross income (MAGI) exceeds certain thresholds, your ability to contribute to a Roth IRA may be reduced or eliminated. However, there are no income limits for contributing to a 401(k), making it accessible to anyone with earned income.

IRS rules do allow for contributions to both a Roth IRA and a 401(k), provided you adhere to the annual contribution limits for each account.

This means you can take advantage of the higher contribution limits of a 401(k) while also benefiting from the tax-free growth of a Roth IRA. This dual approach can be a strategy for maximizing your retirement savings. The advantages to contributing to both accounts present some key benefits, such as: 

  • Tax diversification in retirement, allowing for better management of taxable income. 
  • Potential reduction of overall tax burden. 
  • Maximization of savings potential by taking full advantage of the benefits each account offers.3

Balancing contributions between a Roth IRA and a 401(k) requires careful planning. You might start by contributing enough to your 401(k) to receive the full employer match, which is essentially free money, if your employer offers this. Once you’ve secured the match, consider maxing out your Roth IRA contributions, if you’re eligible.

COMMENTS APPRECIATED

Like and Subscribe

***

***

DAILY UPDATE: CPI Up as Sock Markets End Mixed

MEDICAL EXECUTIVE-POST TODAY’S NEWSLETTER BRIEFING

***

Essays, Opinions and Curated News in Health Economics, Investing, Business, Management and Financial Planning for Physician Entrepreneurs and their Savvy Advisors and Consultants

Serving Almost One Million Doctors, Financial Advisors and Medical Management Consultants Daily

A Partner of the Institute of Medical Business Advisors , Inc.

http://www.MedicalBusinessAdvisors.com

SPONSORED BY: Marcinko & Associates, Inc.

***

http://www.MarcinkoAssociates.com

Daily Update Provided By Staff Reporters Since 2007.
How May We Serve You?
© Copyright Institute of Medical Business Advisors, Inc. All rights reserved. 2025

REFER A COLLEAGUE: MarcinkoAdvisors@outlook.com

SPONSORSHIPS AVAILABLE: https://medicalexecutivepost.com/sponsors/

ADVERTISE ON THE ME-P: https://tinyurl.com/ytb5955z

Your Referral Count -0-

CITE: https://www.r2library.com/Resource

The consumer price index, a broad-based measure of goods and services costs, increased 0.3% on the month, putting the 12-month inflation rate at 2.7%, the Bureau of Labor Statistics reported Tuesday. The numbers were right in line with the Dow Jones consensus. Excluding volatile food and energy prices, core inflation picked up 0.2% on the month, with the annual rate moving to 2.9%, also matching the respective estimates.

CITE: https://tinyurl.com/2h47urt5

Stocks up

  • Citigroup gained 3.68% after the big bank reported better-than-expected earnings.
  • CoreWeave climbed 6.21% on the news that it will build a $6 billion AI data center in Pennsylvania.
  • Trade Desk jumped 6.59% thanks to its inclusion in the S&P 500, replacing the outgoing Ansys.
  • The Trump administration has launched a probe into drone imports. Drones use polysilicon, a key ingredient for solar panels, and tariffs on the material could help boost profitability for domestic manufacturers like First Solar, which rose 6.90%.
  • National Fuel Gas rose 5.65% after the energy company caught a rare double upgrade from Bank of America analysts, who like the energy company’s improved productivity.

Stocks down

  • BlackRock fell 5.86% after the world’s largest asset manager reported that a single client pulled $52 billion last quarter.
  • It wasn’t a great day for other big banks: Wells Fargo sank 5.43% after cutting its 2025 net interest income guidance, while JPMorgan Chase lost 0.74% despite beating sales and profit estimates.
  • Albertsons tumbled 5.02% even though the grocer reported a solid quarter thanks to strong pharmacy sales and digital revenue.
  • Newmont dropped 5.71% on the news that CFO Karyn Ovelmen is leaving the gold miner.

CITE: https://tinyurl.com/tj8smmes

Visualize: How private equity tangled banks in a web of debt, from the Financial Times.

COMMENTS APPRECIATED

PLEASE SUBSCRIBE: MarcinkoAdvisors@outlook.com

Thank You

***

***

***

***

EDUCATIONAL TEXTBOOKS: https://tinyurl.com/4zdxuuwf

***

Stocks, Commodities and the FOMC

By A.I.

***

***

  • Stocks: The S&P 500 and Dow tumbled on a mixed bag of bank earnings, while the NASDAQ was buoyed by big news for Nvidia.
  • Federal Reserve Drama: Treasury Secretary Scott Bessent reassured investors that Jerome Powell isn’t getting the boot.
  • Commodities: Oil fell just a bit as Donald Trump is about to hit his 50-day deadline for Russia.

COMMENTS APPRECIATED

Like and Subscribe

***

***

INCENTIVE STOCK OPTIONS: Defined

SPONSOR: http://www.CertifiedMedicalPlanner.org

By Staff Reporters and AI

***

***

Incentive stock options (ISOs)

Also called “qualified” or “statutory” stock options, ISOs are considered tax-advantaged stock options based on U.S. tax law. With ISOs, the spread (the difference between the award price and the fair market value) will count as income for the alternative minimum tax (AMT) in the year you exercise your options.

CBOE: https://medicalexecutivepost.com/2024/11/19/cboe-chicago-board-of-trade-volatility-indexes/

Example: If you exercise and hold the shares for more than one year past the exercise date and more than two years past the original grant date, the sale of the stock becomes a qualifying disposition, and any realized profit is typically taxed at the long-term capital gains rate. If you sell earlier, the spread will be taxed at your ordinary income tax rate.

ISOs vs. NSOs: What’s the difference?

There are two types of employee stock options: statutory and nonstatutory. They can also be referred to as qualified and nonqualified, respectively. ISOs are statutory (qualified) and differ from nonstatutory (nonqualified) stock options (NSOs) in a few key ways:

***

***

  • Eligibility. ISOs are issued only to employees, whereas NSOs can be granted to outside service providers like advisors, board directors or other consultants. Typically, mainly senior executives or key employees are given ISOs, as a company is not required to offer ISOs to all employees.
  • Tax perks. ISOs have more compelling tax treatment compared with NSOs.

COMMENTS APPRECIATED

Like, Subscribe and Refer

EDUCATION: Books

***

***

DAILY UPDATE: Big Pharma Payouts as Stock Markets Eke Out Rise

MEDICAL EXECUTIVE-POST TODAY’S NEWSLETTER BRIEFING

***

Essays, Opinions and Curated News in Health Economics, Investing, Business, Management and Financial Planning for Physician Entrepreneurs and their Savvy Advisors and Consultants

Serving Almost One Million Doctors, Financial Advisors and Medical Management Consultants Daily

A Partner of the Institute of Medical Business Advisors , Inc.

http://www.MedicalBusinessAdvisors.com

SPONSORED BY: Marcinko & Associates, Inc.

***

http://www.MarcinkoAssociates.com

Daily Update Provided By Staff Reporters Since 2007.
How May We Serve You?
© Copyright Institute of Medical Business Advisors, Inc. All rights reserved. 2025

REFER A COLLEAGUE: MarcinkoAdvisors@outlook.com

SPONSORSHIPS AVAILABLE: https://medicalexecutivepost.com/sponsors/

ADVERTISE ON THE ME-P: https://tinyurl.com/ytb5955z

Your Referral Count -0-

***

CITE: https://www.r2library.com/Resource

Drug and medical device companies paid at least $13.2 billion to medical professionals in 2024, according to CMS data released June 30th. There’s been steady growth in these payments over the last few years, which include everything from research payments to free meals to promotional or conference fees. Drug and medical device companies paid out $13.1 billion in 2023, $13.1 in 2022, and $12.6 in 2021. If you’re a medical provider, you’ve probably gotten one of those perks from a drug or medical device company and thought it wouldn’t affect your decision-making.

But research suggests physicians are more likely to prescribe drugs from companies that pay them, with some studies specifically associating this with drugs that are costlier to patients. “Really well-trained people who affirm an oath to do no harm can be influenced, and are,” Neil Jay Sehgal, associate professor of health systems and population health at the University of Washington School of Public Health, told Healthcare Brew.

CITE: https://tinyurl.com/2h47urt5

Stocks Up

  • Bitcoin is booming, and crypto stocks climbed along with it. MicroStrategy rose 3.86%, Robinhood Markets added 1.67%. and Coinbase gained 1.80%.
  • Boeing rose 1.64% on preliminary reports that investigators have found no evidence of malfunction in the plane that crashed in India last month. Engine-maker GE Aerospace also gained 2.71%.
  • Warner Bros Discovery climbed 2.39% thanks to a strong opening weekend for the new Superman movie.
  • Autodesk popped 5.05% on the news that it is not pursuing an acquisition of rival software maker PTC. PTC fell 1.25%.
  • Kenvue, the company behind Band Aids and Listerine, gained 2.18% after kicking its CEO to the curb.
  • PayPal climbed 3.55% despite the news that JPMorgan will start charging the fintech fees for access to customer data.

Stocks Down

  • Starbucks sank 1.60% on news that employees will have to return to the office four days a week. Shareholders were also unimpressed with the coffee giant’s new secret menu.
  • Synopsys stumbled 1.74% after getting regulatory approval from Chinese authorities to acquire software designer Ansys for $35 billion. Ansys rose 3.03% on the news.
  • Waters plunged 13.81% on the news that it will merge with Becton Dickinson’s bioscience and diagnostic solutions business in a $17.5 billion deal.
  • Rivian Automotive lost 2.15% thanks to a downgrade from Guggenheim analysts, who forecast soft sales for the automaker’s latest models.

CITE: https://tinyurl.com/tj8smmes

Visualize: How private equity tangled banks in a web of debt, from the Financial Times.

COMMENTS APPRECIATED

PLEASE SUBSCRIBE: MarcinkoAdvisors@outlook.com

Thank You

***

***

***

***

EDUCATIONAL TEXTBOOKS: https://tinyurl.com/4zdxuuwf

***

Stocks and Commodities

By A.I.

***

***

  • Stocks: Markets shrugged off President Trump’s weekend threat of 30% levies against the EU and Mexico, as well as his proposed 100% secondary tariffs against Russia today. Stocks eked out a win across the board, with the NASDAQ climbing to a new record close.
  • Commodities: Oil prices fell while gold took a breather, but the big winner was orange juice futures, which hit a four-month high thanks to Trump’s promise of 50% tariffs on all imports from Brazil. Coffee prices also climbed.

COMMENTS APPRECIATED

Like and Subscribe

***

***

ADLs versus IADLs

DEFINITIONS

By Staff Reporters

SPONSOR: http://www.CertifiedMedicalPlanner.org

***

***

Activities of Daily Living (ADLs)

According to Leslie Kernisan MD MPH, these are the basic self-care tasks that we initially learn as very young children. They are sometimes referred to as “Basic Activities of Daily Living” (BADLs). They include:

  • Walking, or otherwise getting around the home or outside. The technical term for this is “ambulating.”
  • Feeding, as in being able to get food from a plate into one’s mouth.
  • Dressing and grooming, as in selecting clothes, putting them on, and adequately managing one’s personal appearance.
  • Toileting, which means getting to and from the toilet, using it appropriately, and cleaning oneself.
  • Bathing, which means washing one’s face and body in the bath or shower.
  • Transferring, which means being able to move from one body position to another. This includes being able to move from a bed to a chair, or into a wheelchair. This can also include the ability to stand up from a bed or chair in order to grasp a walker or other assistive device.

If a person is not fully independent with ADLs, then we usually include some information about the amount of assistance they require. ADLs were originally defined in the 1950s by a geriatrician named Sidney Katz, who was trying to define what it might look like for a person to recover to independence after a disabling event such as a stroke or hip fracture. So these measures are sometimes called the “Katz Index of Independence in Activities of Daily Living.”

***

***

Instrumental Activities of Daily Living (IADLs)

These are the self-care tasks we usually learn as teenagers. They require more complex thinking skills, including organizational skills. They include:

  • Managing finances, such as paying bills and managing financial assets.
  • Managing transportation, either via driving or by organizing other means of transport.
  • Shopping and meal preparation. This covers everything required to get a meal on the table. It also covers shopping for clothing and other items required for daily life.
  • Housecleaning and home maintenance. This means cleaning kitchens after eating, keeping one’s living space reasonably clean and tidy, and keeping up with home maintenance.
  • Managing communication, such as the telephone and mail.
  • Managing medications, which covers obtaining medications and taking them as directed.

Because managing IADLs requires a fair amount of cognitive skill, it’s common for IADLs to be affected when an older person is having difficulty with memory or thinking. For those older adults who develop Alzheimer’s disease or a related dementia, IADLs will usually be affected before ADLs are.

IADLs were defined about ten years after ADLs, by a psychologist named M.P. Lawton. Dr. Lawton felt there were more skills required to maintain independence than were listed on the original Katz ADL index, and hence created the “Lawton Instrumental Activities of Daily Living Scale.”

COMMENTS APPRECIATED

Like and Subscribe

***

***

BIAS: Beware Overconfident Investing

By Staff Reporters and A.I.

SPONSOR: http://www.CertifiedMedicalPlanner.org

***

***

OVERCONFIDENT INVESTING BIAS

Overconfident Investing Bias happens when we believe we can out-smart other investors via market timing or through quick, frequent trading. This causes the results of a study to be unreliable and hard to reproduce in other research settings.

Example: Data convincingly shows that people and financial planners/advisors and wealth managers who trade most often under-perform the market by a significant margin over time. Active traders lose money.

Example: Overconfidence Investing Bias moreover leads to: (1) excessive trading (which in turn results in lower returns due to costs incurred), (2) underestimation of risk (portfolios of decreasing risk were found for single men, married men, married women, and single women), (3) illusion of knowledge (you can get a lot more data nowadays on the internet) and (4) illusion of control (on-line trading).

***

***

MORE:

COMMENTS APPRECIATED

Like and Subscribe

***

***

Psychiatrist V. Psychologist V. Psychotherapist

DEFINITIONS
By A. I. and Staff Reporters

SPONSOR: http://www.CertifiedMedicalPlanner.org

***

***

The terms “psychologist” and “psychiatrist” are often used interchangeably to describe anyone who provides therapy services, but the two professions and the services they provide differ in terms of content and scope. A major difference between the two types of experts is that psychiatrists can prescribe medication [Rx].

  • As physicians [MD/DO] psychiatrists are trained to recognize the ways biological processes affect mental functioning.
  • Psychologists are oriented to how thoughts, feelings, and social factors influence mental functioning.

PSYCHIATRIST

Psychiatrists are medical or osteopathic doctors who are able to prescribe psychotropic medications, which they do in conjunction with providing psychotherapy though medical and pharmacological interventions are often their focus.

PSYCHOLOGIST

Though many psychologists hold doctorate degrees, they are not medical doctors, and most cannot prescribe medications. Rather, they solely provide psycho-therapy, which may involve cognitive and behavioral interventions, psycho-dynamic or psycho-analytic approaches.

NOTE PROTECTED TITLE: The title of “psychologist” can only be used by an individual who has completed the required education, training, and state license requirements. Informal titles, such as “counselor” or “therapist,” are often used as well. Other mental health care professionals, such as licensed social workers, can claim those titles, but not the title of “psychologist.”

COMMENTS APPRECIATED

Like and Subscribe

***

Stocks, Commodities and Crypto-Currency

By A.I.

SPONSOR: http://www.CertifiedMedicalPlanner.org

***

***

  • Stocks: Jobless claims came in lower than expected, the 30-year US bond auction met with strong demand, and Delta Airlines unofficially kicking off earnings season with a solid report. The S&P 500 and the NASDAQ hit record highs.
  • Crypto: Bitcoin reached a record high for the second day in a row, hitting $113,863.31 today. The crypto’s price has stayed above $100k for 60 consecutive days.
  • Commodities: Coffee futures in New York climbed as much as 3.5% in response to President Trump’s threat to slap 50% tariffs on Brazil, which is the top producer of higher-end arabica coffee.

COMMENTS APPRECIATED

Like and Subscribe

***

***

IADLs: Instrumental Activities of Daily Living

DEFINITIONS

By Staff Reporters

SPONSOR: http://www.CertifiedMedicalPlanner.org

***

***

Instrumental Activities of Daily Living (IADLs)

According to Leslie Kernisan MD MPH, these are the basic self-care tasks that we initially learn as very young children. These are the self-care tasks we then learn as teenagers. They require more complex thinking skills, including organizational skills. They include:

  • Managing finances, such as paying bills and managing financial assets.
  • Managing transportation, either via driving or by organizing other means of transport.
  • Shopping and meal preparation. This covers everything required to get a meal on the table. It also covers shopping for clothing and other items required for daily life.
  • Housecleaning and home maintenance. This means cleaning kitchens after eating, keeping one’s living space reasonably clean and tidy, and keeping up with home maintenance.
  • Managing communication, such as the telephone and mail.
  • Managing medications, which covers obtaining medications and taking them as directed.

Because managing IADLs requires a fair amount of cognitive skill, it’s common for IADLs to be affected when an older person is having difficulty with memory or thinking. For those older adults who develop Alzheimer’s disease or a related dementia, IADLs will usually be affected before ADLs are.

***

***

IADLs were defined about ten years after ADLs, by a psychologist named M.P. Lawton. Dr. Lawton felt there were more skills required to maintain independence than were listed on the original Katz ADL index, and hence created the “Lawton Instrumental Activities of Daily Living Scale.”

COMMENTS APPRECIATED

Like and Subscribe

***

***

Gerontologist V. Geriatrician?

Subscribe to continue reading

Subscribe to get access to the rest of this post and other subscriber-only content.

ADLs: Activities of Daily Living

DEFINITIONS

By Staff Reporters

SPONSOR: http://www.CertifiedMedicalPlanner.org

***

***

Activities of Daily Living (ADLs)

According to Leslie Kernisan MD MPH, these are the basic self-care tasks that we initially learn as very young children. They are sometimes referred to as “Basic Activities of Daily Living” (BADLs). They include:

  • Walking, or otherwise getting around the home or outside. The technical term for this is “ambulating.”
  • Feeding, as in being able to get food from a plate into one’s mouth.
  • Dressing and grooming, as in selecting clothes, putting them on, and adequately managing one’s personal appearance.
  • Toileting, which means getting to and from the toilet, using it appropriately, and cleaning oneself.
  • Bathing, which means washing one’s face and body in the bath or shower.
  • Transferring, which means being able to move from one body position to another. This includes being able to move from a bed to a chair, or into a wheelchair. This can also include the ability to stand up from a bed or chair in order to grasp a walker or other assistive device.

***

***

If a person is not fully independent with ADLs, then we usually include some information about the amount of assistance they require. ADLs were originally defined in the 1950s by a geriatrician named Sidney Katz, who was trying to define what it might look like for a person to recover to independence after a disabling event such as a stroke or hip fracture. So these measures are sometimes called the “Katz Index of Independence in Activities of Daily Living.”

COMMENTS APPRECIATED

Like and Subscribe

***

***

ELDER ABUSE: Financial Exploitation Protection

By Rick Kahler CFP

***

***

One serious risk to financial wellbeing in retirement that is difficult to talk about is financial exploitation. Someone whose cognitive abilities are declining is vulnerable to harm from both financial predators and their own financial misjudgments. Protecting such clients is a crucial part of a financial advisor’s role.

A little-known but important law, the Senior Safe Act, was enacted in 2018. It encourages financial advisors and institutions to report suspected elder abuse by offering immunity from legal liability when reports are made in good faith and with reasonable care. To qualify for these protections, financial professionals must undergo annual training to recognize the signs of exploitation and know how to act on their suspicions.

In many ways, the Senior Safe Act mirrors the duty of therapists to report when clients are threats to themselves, such as when a client becomes suicidal. Just as a therapist must balance confidentiality with the moral and legal responsibility to protect their client from harm, a financial advisor must weigh privacy against the need to prevent financial exploitation. Both roles rely on professional judgment, training, and the courage to act when the stakes are high.

Financial advisors, accountants, and attorneys are often the first to notice troubling signs that someone is being taken advantage of financially. These might include sudden large withdrawals, changes to account ownership or beneficiaries, or a newly and overly involved friend or family member. Behavioral shifts like confusion, anxiousness, secretiveness, or uncharacteristic deference are also red flags. These patterns are unsettling and demand attention, even when stepping in is uncomfortable.

Reporting possible elder abuse isn’t always straightforward, especially if the suspected abuser is a family member. As an advisor, I worry about misunderstandings, potential conflicts with the family, and even the possibility of damaging a relationship with the client. None of this is easy, But when the signs of exploitation become clear, staying silent could mean allowing harm to continue. That’s a risk I can’t take.

One of the tools I started using decades ago is the trusted contact disclosure form. This simple but powerful document allows clients to name someone my firm can contact if they notice unusual activity, such as a suspicious withdrawal or transfer. The trusted contact does not have control over the client’s account but serves as a resource to verify their well-being and ensure that their financial decisions align with their long-term goals. If you as a client have not signed such a form, it’s worth discussing with your advisor as a preventative step.

If you are concerned about the financial well-being of an elderly loved one, it’s crucial to alert not only their financial advisor but also other professionals like accountants, attorneys, or bankers. These professionals may have insights or access to information you don’t have, and by sharing your concerns, you provide a broader picture that can help them detect and address issues more effectively. Even if they are already monitoring for red flags, your input can provide valuable context to guide their next steps.

Difficult though it may be, stepping into uncomfortable territory is often essential to protecting vulnerable individuals. Whether it’s a financial advisor detecting exploitation or a therapist intervening in a mental health crisis, the goal is the same—to prevent harm while respecting the person’s autonomy.

The Senior Safe Act is a reminder that sometimes the most impactful safeguards work quietly behind the scenes. Taking simple steps like completing a trusted contact form or encouraging your loved one to work with a reputable, fiduciary advisor can make all the difference. Vigilance is an act of care that helps protect someone’s financial assets as well as their dignity and well-being.

COMMENTS APPRECIATED

Subscribe and Refer

***

***

OREGON BANS: Corporate Control of Physicians

By Health Capital Consultants LLC

***

***

On June 9th, 2025, Oregon’s governor signed into law the country’s strictest corporate practice of medicine (CPOM) prohibition. Senate Bill (SB) 951 will severely curtail the involvement of private equity firms and other corporations in the state’s medical practices.

This Health Capital Topics reviews the bill and discusses the implications on the healthcare industry. (Read more…)

COMMENTS APPRECIATED

Like and Subscribe

+++

***

DOCTOR BRANDING STRATEGIES: Exploring 9 [NINE] Different Types

By A.I.

***

***

Medical doctors, dentists, and podiatrists have to undergo extensive training before they can practice medicine independently. Once they receive training, there are opportunities to increase pay and prestige in the medical field through a series of promotions. As a doctor, how much training, experience and skills you have can determine your ability to move upward in these levels. But, personal branding strategies may even be more vital in today’s social media age?

***

Physician, medical and healthcare branding is more than just the creation of logos, taglines, or specific brand messaging. It’s about creating a meaningful connection between your mission, vision and values and the people served – from patients and their families to local and global communities.

While there are many different types of branding strategies in marketing science, they all share key elements that serve as the foundation for the strategy. These 9 elements for all physicians and medical professionals include the following:

  1. Brand purpose: The reason the physician is in practice and what he/she is trying to achieve.
  2. Brand vision: The ideas and goals behind the dentist which serve as inspiration for practice growth.
  3. Brand values: The osteopaths beliefs and what they stand for.
  4. Target audience: The demographic(s) and patient targets that the podiatrist is aiming to reach.
  5. Market analysis: An analysis of the marketplace that identifies gaps where the chiropractor has an opportunity to position him/her self based on a unique value proposition.
  6. Awareness goals: The initiatives the doctor will take in order to reach a target market patient demographic.
  7. Brand personality: The human-like attributes of the physician that will help build relationships with patients, consumers and other physicians and practitioners.
  8. Brand voice: The language and tone the doctor uses to communicate with patients, physicians and consumers.
  9. Brand tagline: A memorable slogan that sums up the physician and their medical offering in a few choice words.

And so, physician branding is the development of a easily recognizable identity for a medical practice, clinic or healthcare organization that helps to shape perception by current and prospective patients and the wider world.

COMMENTS APPRECIATED

Like and Subscribe

***

Stocks, Bonds & Commodities

By A.I.

***

***

COMMENTS APPRECIATED

Like and Subscribe

***

***

BRANDS & BRAND MANAGEMENT: Defined and Explored for Doctors and Advisors

By A.I.

SPONSOR: http://www.CertifiedMedicalPlanner.org

***

***

What Is a Marketing Brand

A brand is a name, term, design, symbol or any other feature that distinguishes one seller’s goods or service from those of other sellers. Brands are used in business, marketing and advertising for recognition and, importantly, to create and store value as brand equity for the object identified, to the benefit of the brand’s clients, patients, customers, its owners and shareholders. Brand names are sometimes distinguished from generic or store brands.

BRANDING: https://medicalexecutivepost.com/2023/02/02/podcast-personal-branding-for-doctors/

What is Brand Management?

Brand management, also known as Marketing, is responsible for the overall management of a brand. This includes everything from product or service development and marketing to advertising and public relations. All of these aspects work together to create a particular image or reputation for a brand. The goal of brand management is to create a robust and positive reputation for a brand that will result in increased sales and market share.This process helps companies create a unique identity for their products or services in the marketplace. A successful brand management strategy can build client, patient and customer loyalty .

BRANDS: https://medicalexecutivepost.com/2021/06/03/physician-branding-post-pandemic/

Branding is essential for financial advisors, doctors and businesses because it involves creating a unique identity for a company’s products, offerings and services. It can also help build customer, client and patient loyalty and emotionally connect with the practitioner. Branding can be complex, but it is essential to understand the basics before starting a brand strategy.

Thus, doctors, podiatrists, dentists, CPAs, insurance agents, financial advisors and their practices need to understand the different aspects of branding and brand management to create a strong brand identity.

SELF BRANDING: https://medicalexecutivepost.com/wp-content/uploads/2011/03/leadership-self-branding-marcinko.pdf

EDUCATION: Books

COMMENTS APPRECIATED

Like and Subscribe

***

JULY FOURTH: The Business Side

By InfoGraphics

***

***

COMMENTS APPRECIATED

Like and Subscribe

***

DOCTORS: Marketing, Advertising & Sales

Subscribe to continue reading

Subscribe to get access to the rest of this post and other subscriber-only content.

Deals, Stocks and the FOMC

By A.I.

SPONSOR: http://www.CertifiedMedicalPlanner.org

***

***

  • Deals: Stocks popped at the open yesterday on the news that Canada has rescinded the digital services tax in order to lure the US back to the negotiating table. Meanwhile, Bloomberg reported that the EU will accept a 10% universal tariff in exchange for some key concessions.
  • Stocks: The S&P 500 and the NASDAQ both hit new record highs today, with the S&P 500 wrapping up its best quarter since Q4 20
  • The Fed: President Trump published a handwritten note asking Jerome Powell to cut interest rates, even as the White House considers new ways to replace the Fed Chair. Meanwhile, Goldman Sachs now sees the chances of the Fed cutting interest rates in September as “somewhat above 50%.”

COMMENTS APPRECIATED

Like and Subscribe

***

***

VIX FEAR INDEX: Down

By AI

CBOE Volatility Index

***

***

There’s a lot of confidence in markets these days, and nowhere is that more apparent than in the VIX, aka the CBOE Volatility Index, aka aka the Fear Index.

According to Brew Markets, the VIX literally measures the market’s expectation of volatility based on S&P 500 index options, but it’s become a shorthand way of quantifying investors’ fear or confidence. Any time the VIX rises above 30, it’s taken as a sign of some serious trepidation in the market—but anytime it falls below 20, the market is calm, cool, and collected.

The VIX skyrocketed to over 50 on Liberation Day as investors fretted over what tariffs meant for their portfolios, but it’s been gradually falling ever since. As the chart above shows, the VIX just fell below its key support level of 17—a mark it has failed to break below recently, and a move that underlines investors’ confidence that the good times will keep rolling.

VIX: https://medicalexecutivepost.com/2025/04/20/vix-stock-market-fear-gauge-update/

Whether or not that confidence is misplaced remains to be seen.

COMMENTS APPRECIATED

EDUCATION: Books

Subscribe, Refer and Like

***

***

ASSETS UNDER ADVISEMENT: Doctors Only

By Dr. David Edward Marcinko; MBA MEd CMP

A.U.A IS ALL WE DO!

***

SPONSOR: http://www.MarcinkoAssociates.com

Assets under advisement refer to assets on which your firm provides advice or consultation but for which your firm does either does not have discretionary authority or does not arrange or effectuate the transaction. Such services would include financial planning or other consulting services where the assets are used for the informational purpose of gaining a full perspective of the client’s financial situation, but you are not actually placing the trade.

Assets under advisement could also be those which you monitor for a client on a non-discretionary basis, where you may make recommendations but where the client is the party responsible for arranging or effecting the purchase or sale.  A common example of this AUM scenario is when an advisor reviews a participant’s 401(k) allocations. If the adviser does not have the authority or ability to effect changes in the portfolio, these assets are likely considered assets under advisement rather than regulatory assets under management.

Assets under advisement are permitted to be disclosed on Form ADV Part 2A as a separate asset figure from the assets under management.  There is no requirement to disclose the assets under advisement figure, but some advisors opt to include the figure to give prospective clients a more complete picture of the firm’s responsibilities.  If you choose to report your assets under advisement, be sure to make a clear distinction between this figure and your regulatory assets under management.

***

D. E. Marcinko & Associates Core Operating Values

9.   We act with honesty, integrity and are always straightforward.
8.   We strive to be innovative, creative, iconoclastic, and flexible.
7.   We admit and learn from mistakes and don’t repeat them.
6.   We work hard always as competitors are trying to catch up.
5.   We treat others with dignity and respect.
4.   We are the onus of consulting advice for the fiduciary well being of others.
3.   We fight complacency as former success is in the past.
2.   The best management styles are timeless, not timely.
1.   Our clients are colleagues and always come first.

***

COMMENTS APPRECIATED

EDUCATION: Books

SPEAKING: Dr. Marcinko will be speaking and lecturing, signing and opining, teaching and preaching, storming and performing at many locations throughout the USA this year! His tour of witty and serious pontifications may be scheduled on a planned or ad-hoc basis; for public or private meetings and gatherings; formally, informally, or over lunch or dinner. All medical societies, financial advisory firms or Broker-Dealers are encouraged to submit an RFP for speaking engagements: CONTACT: Ann Miller RN MHA at MarcinkoAdvisors@outlook.com 

Like and Refer

***

***

PARADOX: Social Media?

By Staff Reporters

***

***

According to BetterHealth.com, billions of people worldwide use social media platforms today. While social media can be a helpful tool for connection in the digital age, it also has the power to contribute to loneliness and isolation. This is the essence of the social media paradox.

***

What is the social media paradox?

The Merriam-Webster dictionary defines a paradox as “a statement that is seemingly contradictory or opposed to common sense and yet is perhaps true.” The social media paradox is a term coined to point out how, despite “social” being in the very name of it, social media has the potential to make people feel disconnected and lonely. 

As a Public Health Post article published by Boston University puts it, “The more time people spend actively engaging on social media—whether through posting, commenting, or messaging—the lonelier they may feel,” calling it “a double-edged sword.” This simple statement summarizes the core of the social media paradox.

So how could something “social” be so closely tied to isolation?

The effects of social media are complex. On the one hand, it has brought many positives to the lives of many people. It can help individuals stay connected, learn about themselves, and receive important information.

On the other hand, excessive social media use in particular also has the potential to separate and contribute to negative mental health outcomes.

EDUCATION: Books

COMMENTS APPRECIATED

Like and Subscribe

***

***

DAILY UPDATE: Health Insurance Options as Bull Market Edges Upward

MEDICAL EXECUTIVE-POST TODAY’S NEWSLETTER BRIEFING

***

Essays, Opinions and Curated News in Health Economics, Investing, Business, Management and Financial Planning for Physician Entrepreneurs and their Savvy Advisors and Consultants

Serving Almost One Million Doctors, Financial Advisors and Medical Management Consultants Daily

A Partner of the Institute of Medical Business Advisors , Inc.

http://www.MedicalBusinessAdvisors.com

SPONSORED BY: Marcinko & Associates, Inc.

***

http://www.MarcinkoAssociates.com

Daily Update Provided By Staff Reporters Since 2007.
How May We Serve You?
© Copyright Institute of Medical Business Advisors, Inc. All rights reserved. 2025

REFER A COLLEAGUE: MarcinkoAdvisors@outlook.com

SPONSORSHIPS AVAILABLE: https://medicalexecutivepost.com/sponsors/

ADVERTISE ON THE ME-P: https://tinyurl.com/ytb5955z

Your Referral Count -0-

***

CITE: https://www.r2library.com/Resource

A June 11th report from global professional services firm Alvarez & Marsal (A&M) predicts that more beneficiaries might soon ditch insurance coverage for options like short-term, limited duration plans or healthcare sharing ministries (HCSMs), which aren’t regulated like health insurance and aren’t required to comply with ACA protections like covering maternity care or pre-existing conditions.

CITE: https://tinyurl.com/2h47urt5

🟢 What’s up

  • Nvidia extended its winning streak to five days, rising another 1.73% as the AI trade continues to recover.
  • EchoStar climbed 13.16% after the parent company of Dish TV disclosed that President Trump did in fact prod the FCC to make a deal.
  • Cyngn soared another 20.07% following a big day of gains after the company that makes self-driving tech for industrial vehicles announced a partnership with Nvidia.
  • Strong earnings from Nike (more on that later) propelled sporting goods stocks higher today. ON Holdings rose 1.74%, while Dick’s Sporting Goods climbed 3.59%.
  • Domestic power producers popped on reports that Trump is planning to issue an executive order increasing energy production to meet AI demand. Vistra gained 2.44%, GE Vernova climbed 2.54%, and Vertiv added 2.71%.

What’s down

  • Coinbase Global ended its winning streak, tumbling 5.77% after GENIUS Act hype propelled the crypto stock skyward all week long. Traders took profits in Circle as well, pushing the stablecoin stock down 15.54%.
  • Chinese EV maker Li Auto fell 1.93% on its weaker-than-expected deliveries forecast for the second quarter.
  • Fellow Chinese EV maker Xiaomi stunned markets with reports that it received 240,000 orders for its new SUV within 18 hours of its debut, but shares still sank 4%.
  • Pony.ai lost 6.31% on a report that Uber is considering helping its founder Travis Kalanick fund his acquisition of the US subsidiary of the Chinese autonomous vehicle company.
  • Gold miners tumbled while the price of the precious metal fell as investors took a risk-on stance. Newmont lost 4.11%, Barrick Mining fell 3.44%, and Kinross Gold shed 6.18%.
  • Today’s trade deal reopens the door for Chinese rare earth imports, bad news for US producers like MP Materials (down 8.59%) and USA Rare Earth (down 12.14%).

CITE: https://tinyurl.com/tj8smmes

Visualize: How private equity tangled banks in a web of debt, from the Financial Times.

COMMENTS APPRECIATED

PLEASE SUBSCRIBE: MarcinkoAdvisors@outlook.com

Thank You

***

***

***

***

EDUCATIONAL TEXTBOOKS: https://tinyurl.com/4zdxuuwf

***

SOVEREIGN WEALTH FUND: Defined

By Staff Reporters

***

***

A SWF is essentially an investment fund run by the government. Similar to how a hedge fund or a private equity firm operates, the government would set aside a pot of money and invest it in assets such as stocks, bonds, startups, or real estate.

The idea of the US establishing a sovereign wealth fund akin to Norway’s or Abu Dhabi’s gained momentum recently across the political spectrum. Former President Trump endorsed the concept during a speech on his economic policy agenda for a second term, and the Biden administration has been quietly cheffing up a proposal for a wealth fund over the past several months, Bloomberg reported.

Trump and Biden officials described the fund as a key tool the country could deploy to win the global technological arms race and better compete against geopolitical rivals like China.

For example, the wealth fund could finance capital-intensive sectors such as shipbuilding, nuclear fission, and quantum cryptography that don’t offer near-term ROI for private investors.

However, disadvantages of a SWF include:

  • Non-Guaranteed Returns, with the Risk of Total Loss
  • Influence on Foreign Exchange Rates, Introducing Uncertainty
  • Potential Mismanagement of Funds Due to a Lack of Transparency
  • Dependency on Global Economic Conditions, Impacting Fund Performance
  • Challenges in Maintaining Accountability and Addressing Ethical Concerns

SUBSCRIBE TODAY
Thank You

***

***

Stocks, Deals and Commodities

BY A.I.

***

***

Stocks: The S&P 500 briefly traded a few cents above its February all-time closing high yesterday afternoon, but couldn’t sustain the gain and fell just short at the end of the day. The NASDAQ remains inches away from its record high as well.

Deals: The end of the 90-day tariff pause is less than two weeks away, but the White House said that the July 9th deadline “is not critical.”

Meanwhile, the Treasury Department is doing everything it can to make the dreaded “revenge tax” in the big, beautiful bill irrelevant.

Commodities: Gold and oil had muted moves upward but copper climbed to a three-month high after Goldman Sachs analysts warned of shortages ahead

COMMENTS APPRECIATED

Like and Refer

***

***

DAILY UPDATE: Nvidia and MSFT Reach New Highs as Stock Markets Surge!

MEDICAL EXECUTIVE-POST TODAY’S NEWSLETTER BRIEFING

***

Essays, Opinions and Curated News in Health Economics, Investing, Business, Management and Financial Planning for Physician Entrepreneurs and their Savvy Advisors and Consultants

Serving Almost One Million Doctors, Financial Advisors and Medical Management Consultants Daily

A Partner of the Institute of Medical Business Advisors , Inc.

http://www.MedicalBusinessAdvisors.com

SPONSORED BY: Marcinko & Associates, Inc.

***

http://www.MarcinkoAssociates.com

Daily Update Provided By Staff Reporters Since 2007.
How May We Serve You?
© Copyright Institute of Medical Business Advisors, Inc. All rights reserved. 2025

REFER A COLLEAGUE: MarcinkoAdvisors@outlook.com

SPONSORSHIPS AVAILABLE: https://medicalexecutivepost.com/sponsors/

ADVERTISE ON THE ME-P: https://tinyurl.com/ytb5955z

Your Referral Count -0-

***

CITE: https://www.r2library.com/Resource

CITE: https://tinyurl.com/2h47urt5

🟢 What’s up

  • Nvidia and Microsoft both set new record highs as the AI trade continues to revive. Nvidia rose 0.46%, while Microsoft climbed 1.05%.
  • Core Scientific exploded 33.01% on reports from the Wall Street Journal that the bitcoin miner may be acquired by AI company CoreWeave.
  • Serve Robotics gained 9.87% after the delivery robot maker launched its service on the streets of Atlanta today.
  • McCormick is looking spicy: The consumer goods company rose 5.31% after earnings outpaced analyst forecasts.
  • Penn Entertainment rose 4.94% after the gambling company was upgraded by analysts at Citizens, who think the stock’s underperformance is about to reverse.
  • Solar stocks may be thrown a lifeline by the Senate, which is considering keeping some clean energy tax credits in the spending bill. Enphase Energy popped 12.83%, SunRun rose 6.46%, and SolarEdge Technologies climbed 5.11%.
  • Copper miners popped as prices of the precious metal rose today. FreeportMcMoRan jumped 6.85%, Southern Copper Corp. climbed 7.79%, and Anglo American plc added 7.16%.

What’s down

  • Micron Technology lost 0.98% despite the chipmaker reporting fiscal third quarter results that beat Wall Street’s expectations.
  • Kratos Defense and Security Solutions sank 2.36% after the military tech company announced it will sell $500 million worth of stock to raise money for capital spending.
  • Equinix crumbled another 9.56% after a terrible fiscal outlook pushed Raymond James and BMO analysts to downgrade the internet services company.

CITE: https://tinyurl.com/tj8smmes

Visualize: How private equity tangled banks in a web of debt, from the Financial Times.

COMMENTS APPRECIATED

PLEASE SUBSCRIBE: MarcinkoAdvisors@outlook.com

Thank You

***

***

***

***

EDUCATIONAL TEXTBOOKS: https://tinyurl.com/4zdxuuwf

***

Stocks, Economics & Commodities

By AI

***

***

  • Stocks: The S&P 500 and NASDAQ started the day inches away from their all-time highs, but the market rally faltered in mid-afternoon as relief from an Israel/Iran ceasefire faded and investors turned their attention to Friday’s PCE report.
  • Economy: Speaking of inflation, Jerome Powell stuck to his guns during his second day of congressional testimony, endorsing a wait-and-see mentality. President Trump is apparently tired of waiting, and says he has “3 or 4” candidates in mind to replace Powell.
  • Commodities: Oil bounced back after posting its biggest two-day decline since 2022.

Comments Appreciated

Like and Subscribe

***

***

Why Investors Don’t Want Common Stock Shares

By Pitching Angels

***

***

COMMENTS APPRECIATED

Subscribe, Like and Refer

***

***

MORE INVESTING TERMS: All Doctors Should Know

By Staff Reporters

SPONSOR: http://www.MarcinkoAssociates.com

***

***

Here is a list of the most common and helpful investment terms you’ll come across and should know.

  • Ask. The price that someone looking to sell stock wants to receive.
  • Bid. The price that someone is willing to pay for stock.
  • Buy. To acquire shares and thereby take a position in a company.
  • Sell. To get rid of shares whether because you’ve reached your goal or to prevent losses.
  • Bull market. Market conditions in which investors expect prices to rise.
  • Bear market. Market conditions in which investors expect prices to fall.
  • Dividend. A portion of a company’s earnings paid to shareholders.
  • Blue chip stocks. Shares of large and well-recognized companies that have a long history of solid financial performance.
  • Earning per share. A company’s net profit divided by the number of outstanding common shares.
  • Mutual fund. A collection of investments — stocks, bonds, commodities, and more — bundled together and held in common by a group of investors.
  • Asset. Something you own that could generate a return in the form of more assets.
  • Asset allocation. Your investment strategy, essentially — the mix of assets you choose to put your money into, whether that be cash, bonds, stocks, commodities, real estate or something else.
  • Broker. A person or firm — or robot — that arranges transactions between buyers and sellers in exchange for a commission (that is, a fee).
  • Capital gain (or capital loss). The money you make (or lose) on the sale of an asset.
  • Diversification. Investing in a variety of sectors, such as health care, energy and IT as well as across different geographic locations.
  • Dow Jones Industrial Average. A price-weighted list of 30 blue-chip stocks. It’s often used to help get a sense of the overall health of the stock market, even though it only reflects a small portion of the players.
  • Exchange-traded fund (ETF). A collection of investments that is traded like a stock.
  • Index fund. A type of mutual fund or exchange-traded fund that allows you to invest in a portfolio that mimics a market index, which is basically a list that tracks the performance of a group of investments either for a specific sector or the overall market.
  • Hedge fund. A type of investment partnership. Partners pool money from investors and try out a few different investing strategies. Generally, hedge funds will make riskier investments than your typical investor. They’ll also often use leverage (that is, borrowed money) or place bets against the market to get bigger returns. They make their money by charging their investors management fees based on a percentage of their profits.
  • Expense ratio. The percentage-based fee that mutual fund managers charge you to manage your investments.
  • Market price. How much it would cost right now to buy or sell an asset or service.
  • Securities and Exchange Commission (SEC). An independent government body that was created to protect investors and the national banking system. The SEC enforces laws that maintain orderly, fair and efficient markets.
  • Short selling. A tactic available to investors who predict a stock’s price is about to drop. An investor borrows a quantity of shares through a broker and then sells them, intending to repurchase them later, at a lower price, and return them to the lender.
  • Stock exchange. A place buyers and sellers come together to buy, sell and trade stock during set business hours. The New York Stock Exchange (NYSE) is the most important stock exchange in the world, but there are a total of 16 exchanges around the world.
  • Stock market. Refers in general to the collection of markets and exchanges where the buying, selling and trading of investment vehicles takes place.
  • Price per share. A simple way of calculating a company’s market value at a given moment. To find the price per share, you take a company’s most recent share price and multiply it by its total number of outstanding shares.
  • Prospectus. A legal document that contains in-depth information about anything you might be planning to invest in: stocks, bonds or mutual funds.

EDUCATION: Books

COMMENTS APPRECIATED

Refer and Subscribe

***

***

HEALTHCARE INSURANCE: Marketplace Consumer Fraud

By AI

SPONSOR: http://www.CertifiedMedicalPlanner.org

***

***

Consumer Fraud in the Health Insurance Marketplace

Don’t be a Victim of Consumer Fraud in the Health Care Marketplace 

Beware of…

People asking for money to enroll you in Marketplace or “Obamacare” insurance. Legitimate enrollment agents will NOT ask for money.

High-pressure visits, mail solicitations, e-mails, and phone calls from people pretending to work for the government. No one should threaten you with legal action if you do not sign up for a plan. Always ask for identification if someone comes to your door.

People you did not contact who request personal information. They may be trying to steal your identity. No one from the government will call or email you to sell you an insurance plan or ask for personal identifying information. Be careful when giving out personal information, such as credit card, banking, or Social Security numbers.

Sham websites. Always look for official government seals, logos or website addresses.

Note: If you are a Medicare beneficiary, you do NOT need to buy insurance in the new Health Insurance Marketplace.

Report Marketplace Consumer Fraud: 1-800-318-2596

For more information about using the Marketplace, visit HealthCare.gov . This is the official Marketplace website.

COMMENTS APPRECIATED

Like, Refer and Subscribe

***

***

STOCK PERFORMANCE: Growth v. Value Investing for Physicians

BY DR. DAVID EDWARD MARCINKO: MBA MEd CMP™

***

SPONSOR: http://www.MarcinkoAssociates.com

***

Performance of Growth & Value Stocks

Although many academics argue that value stocks outperform growth stocks, the returns for individuals investing through mutual funds demonstrate a near match. 

Introduction

A 2005 study Do Investors Capture the Value Premium? written by Todd Houge at The University of Iowa and Tim Loughran at The University of Notre Dame found that large company mutual funds in both the value and growth styles returned just over 11 percent for the period of 1975 to 2002. This paper contradicted many studies that demonstrated owning value stocks offers better long-term performance than growth stocks. 

The studies, led by Eugene Fama PhD and Kenneth French PhD, established the current consensus that the value style of investing does indeed offer a return premium. There are several theories as to why this has been the case, among the most persuasive being a series of behavioral arguments put forth by leading researchers. The studies suggest that the out performance of value stocks may result from investors’ tendency toward common behavioral traits, including the belief that the future will be similar to the past, overreaction to unexpected events, “herding” behavior which leads at times to overemphasis of a particular style or sector, overconfidence, and aversion to regret. All of these behaviors can cause price anomalies which create buying opportunities for value investors.

Another key ingredient argued for value out performance is lower business appraisals. Value stocks are plainly confined to a P/E range, whereas growth stocks have an upper limit that is infinite.  When growth stocks reach a high plateau in regard to P/E ratios, the ensuing returns are generally much lower than the category average over time. 

Moreover, growth stocks tend to lose more in bear markets.  In the last two major bear markets, growth stocks fared far worse than value.  From January 1973 until late 1974, large growth stocks lost 45 percent of their value, while large value stocks lost 26 percent. Similarly, from April 2000 to September 2002, large growth stocks lost 46 percent versus only 27 percent for large value stocks. These losses, academics insist, dramatically reduce the long-term investment returns of growth stocks.

***

***

However, the study by Houge and Loughran reasoned that although a premium may exist, investors have not been able to capture the excess return through mutual funds.  The study also maintained that any potential value premium is generated outside the securities held by most mutual funds.  Simply put, being growth or value had no material impact on a mutual fund’s performance.

Listed below in the table are the annualized returns and standard deviations for return data from January 1975 through December 2002.

Index                              Return                         SD      

S&P 500                            11.53%                     14.88%

Large Growth Funds         11.30%                     16.65%

Large Value Funds             11.41%                    15.39%

 Source:  Hough/Loughran Study

The Hough/Loughran study also found that the returns by style also varied over time.  From 1965-1983, a period widely known to favor the value style, large value funds averaged a 9.92 percent annual return, compared to 8.73 percent for large growth funds. This performance differential reverses over 1984-2001, as large growth funds generated a 14.1 percent average return compared to 12.9 percent for large value funds.  Thus, one style can outperform in any time period.

However, although the long-term returns are nearly identical, large differences between value and growth returns happen over time.   This is especially the case over the last ten years as growth and value have had extraordinary return differences – sometimes over 30 percentage points of under performance. 

This table indicates the return differential between the value and growth styles since 1992.

YEARLY RETURNS OF GROWTH/VALUE STOCKS

YearGrowthValue
19925.1%10.5%
19931.7%18.6%
19943.1%-0.6%
199538.1%37.1%
199624.0%22.0%
199736.5%30.6%
199842.2%14.7%
199928.2% 3.2%
2000-22.1%6.1%
2001-26.7%7.1%
2002-25.2%-20.5%
200328.2%27.7%
2004 6.3%16.5%
2005 3.6%6.1%
2006 10.8%20.6%
20078.8%1.5%
2008-38.43%-36.84%
200937.2%19.69%
201016.71%15.5%
20112.64%0.39%
201215.25%17.50%

Source:  Ibbottson.

Between the third quarter of 1994 and the second quarter of 2000, the S&P Growth Index produced annualized total returns of 30 percent, versus only about 18 percent for the S&P Value Index.  Since 2000, value has turned the tables and dramatically outperformed growth.  Growth has only outperformed value in two of the past eight years.  Since the two styles are successful at different times, combining them in one portfolio can create a buffer against dramatic swings, reducing volatility and the subsequent drag on returns. 

Assessment

In our analysis, the surest way to maximize the benefits of style investing is to combine growth and value in a single portfolio, and maintain the proportions evenly in a 50/50 split through regular rebalancing.  Research from Standard & Poor’s showed that since 1980, a 50/50 portfolio of value and growth stocks beats the market 75 percent of the time.

Conclusion

Due to the fact that both styles have near equal performance and either style can outperform for a significant time period, a medical professional might consider a blending of styles.  Rather than attempt to second-guess the market by switching in and out of styles as they roll with the cycle, it might be prudent to maintain an equal balance your investment between the two.

EDUCATION: Books

SPEAKING: Dr. Marcinko will be speaking and lecturing, signing and opining, teaching and preaching, storming and performing at many locations throughout the USA this year! His tour of witty and serious pontifications may be scheduled on a planned or ad-hoc basis; for public or private meetings and gatherings; formally, informally, or over lunch or dinner. All medical societies, financial advisory firms or Broker-Dealers are encouraged to submit a RFP for speaking engagements: MarcinkoAdvisors@outlook.com 

COMMENTS APPRECIATED

Refer, Subscribe and Like

***

***

Wolfram Alpha Pros and Cons

brantleymotes

It is going to be very difficult to show students the beauty of Wolfram Alpha and still find ways to prevent them from turning to the dark side of its power. This website is great for showing multiple representations of certain data, and it is lightning quick in producing answers compared to your hand on a tedious problem. While these two pros are at the forefront and really all that one needs to hear to become interested in exploring the site, the tide can easily and quickly turn from being a task servant to a task I’ll-do-it-all-for-you-every-time-and-you-do-nothing. One student in our 5040 class suggested that we might show this to our students at the end of the year when we are reviewing for final exams. The only problem with this is that they will not forget about this website the following year. With these things in mind, the best policy…

View original post 157 more words

PARADOXICAL CONTRADICTIONS: All Financial Advisors Must Know to Win Clients!

The Ultimate Psychological Challenge to Influence Clients and Close More Sales

***

***

By Dr. David Edward Marcinko MBA MEd CMP

SPONSOR: http://www.CertifiedMedicalPlanner.org

***

A psychological paradox is a figure of speech that can seem silly or contradictory in form, yet it can still be true, or at least make sense in the context given.

This is sometimes used to illustrate thoughts or statements that differ from traditional ideas. So, instead of taking a given statement literally, an individual must comprehend it from a different perspective. Using paradoxes in speeches and writings can also add wit and humor to one’s work, which serves as the perfect device to grab a reader or a listener’s attention and/or persuade them to action, sales and closing statements. But paradoxes for the financial sector can be quite difficult to explain by definition alone, which is why it is best to refer to a few examples to further your understanding.

One good psychological paradox example is The Paradox of Thrift which suggests that while saving money is generally considered a prudent financial behavior, excessive saving during times of economic downturn can actually hinder economic recovery. When consumers collectively reduce their spending and increase their savings, it creates a decrease in aggregate demand. This reduction in demand can lead to lower production levels, job losses, and ultimately a decline in economic output. In other words, what may be individually rational behavior (financial saving) can have negative consequences for the overall economy.  

The following paradoxical contradictions will help financial advisors guide clients to close more sales to the benefit of both.

____

In the intricate world of finance sales, advisors are often at the crossroads of various paradoxes that challenge client decision-making. While the journey towards financial security involves calculated strategies, it’s the nuanced understanding of paradoxes that can help the advisor close more sales.

____

But, what seems true about money often turns out to be false, according to colleague Finance Professor John Goodell, PhD from the University Akron:

  1. The more we try to trade our way to profits, the less likely we are to profit.
  1. The more boring an investment—think index funds—the more exciting the long-run performance will probably be.
  1. The more exciting an investment—name your latest Wall Street concoction, Special Purpose Acquisition Company [SPAC] or anything crypto—the less exciting the long-term results typically are.
  1. The only certainty is uncertainty and the only constant is change. Today’s market decline will eventually become a bull market, and today’s market leaders will eventually yield to other stocks.
  1. Big market trends play a huge role in investment results, and yet trying to time macroeconomic cycles or guess which market sectors will outperform is a fool’s errand. Many big market rotations are set in motion by something wholly unanticipated, like a virus pandemic or a war.
  1. To be happy when wealthy, we also need to be happy with far less money. The fact is, above a relatively modest income level, no amount of extra money will change our level of happiness. More money might even make us miserable, as many lottery winners have discovered.
  1. The more we hate an investing trait—or any trait for that matter—the more likely it is that we’re resisting seeing that trait in ourselves. It’s what Carl Jung MD called the Shadow of Undesirable Personality Aspects that we hide from ourselves. Do prospects get irritated listening to your unsolicited financial advice? There’s a good chance that you often give unsolicited financial advice but don’t like to admit it.
  1. The more we learn about investing, the more we realize we don’t know anything. We should just buy index funds and instead spend our time worrying about stuff we can actually control.
  1. The more an investor is convinced he’s right, the more likely he is to be wrong. Short sellers, in particular, are likely to succumb to this paradoxical trap.
  1. The more options we have, the less satisfied we’ll be with each one. This is the Paradox of Choice; revised. Anyone who has spent hours “optimizing” his or her portfolio knows this all too well. Its close cousin is information overload, another frustration paradox when investing.
  1. The more afraid we are of losing money, the more likely we are to take unwitting risks that lose us money. Sitting in cash seems wise during market selloffs. But the truth is, none of us can reliably time the market. Pull up any chart of the stock market over any period longer than a decade and you’ll see that the riskiest decision is sitting in cash, which gets destroyed by inflation.

The more we think about our investments and look at our financial accounts, the more likely we are to damage our results by buying high because of greed and selling low because of fear. It can pay to look away.

ASSESSMENT

How should you respond to these financial paradoxes? As you plan for your own financial future, as well as your own client prospecting endeavors, embrace the concept of “loosely held views.”

In other words, make financial and client acquisitions plans, but continuously update your views, question your assumptions and paradoxes and rethink your priorities. Years of experience with clients certainly support the futility of trying to help them change their financial behavior by telling them what they “should” know or do.

CONCLUSION

Remember, it is far more useful to listen to client beliefs, fears and goals, and to suggest options and offer encouragement to help them discover their own path toward financial well-being. Then, incentivize them with knowledge of the above psychological paradoxes to your mutual success!

EDUCATION: Books

SPEAKING: Dr. Marcinko will be speaking and lecturing, signing and opining, teaching and preaching, storming and performing at many locations throughout the USA this year! His tour of witty and serious pontifications may be scheduled on a planned or ad-hoc basis; for public or private meetings and gatherings; formally, informally, or over lunch or dinner. All medical societies, financial advisory firms or Broker-Dealers are encouraged to submit an RFP for speaking engagements: CONTACT: Ann Miller RN MHA at MarcinkoAdvisors@outlook.com 

REFERENCES:

1. Goodell, J: Full publication list on Google Scholar: https://scholar.google.com/citations?hl=en&user=lJyDADsAAAAJ

 2. Jung, Carl, Gustav: Full publication list on Google Scholar: https://scholar.google.com/scholar?hl=en&as_sdt=0%2C11&q=carl+jung+publications&btnG=

READINGS:

Marcinko, DE and Hetico, HR: Comprehensive Financial Planning Strategies for Doctors and Advisors [Best Practices from Leading Consultants and Certified Medical Planners™]. CRC Productivity Press, New York, 2016.

Marcinko, DE: Dictionary of Health Economics and Finance. Springer Publishing Company, New York. 2006

Marcinko, DE and Hetico, HR: Risk Management, Liability Insurance, and Asset Protection Strategies for Doctors and Advisors [Best Practices from Leading Consultants and Certified Medical Planners™]. CRC Productivity Press, New York, 2015.

***

ASSETS: Under Advisement V. Management

By Staff Reporters

SPONSOR: http://www.MarcinkoAssociates.com

***

***

What are Assets Under Management?

Assets under management (AUM) is a significant parameter in the financial world. It answers financial questions like – how many investments does a company manage? What is the net value of the investments that the company manages? Finally, how many investors have trusted their assets with the company? The higher the answer to these three questions, the more glory to the company.

A wealthy investor who is not concerned by higher fees but wants maximum returns of their asset will probably choose an asset manager based on its AUM. Thus, the AUM indicates the financial performance of the firm. Also, based on the funds under management, the firm collects fees from other clients.

So, what are the investments which qualify as AUM? Any liquid asset of the investor they have entrusted the asset manager with monitoring and control. For example, bank deposits, cash balances, equity shares, bonds, mutual funds, and other investments.

What are the services an asset manager provides to their clients? The most important function is decision-making. With the constant fluctuations and rapid movements in the market, an asset manager has to make decisions about holding or selling an investment. The firm communicates with the investors and advises them about the necessary action.

Once the decision is taken, the firm acts on the decision, i.e., the investor does not have to enter the field. In addition, the asset management company will buy, sell, and make any other transactions on behalf of the investor. Finally, the firm also renders services like accounting, tax reporting, proxy voting (equity shares), client reporting, and other financial services.

What are Assets Under Advisement?

Assets under advisement refer to assets on which your firm provides advice or consultation but for which your firm does either does not have discretionary authority or does not arrange or effectuate the transaction. Such services would include financial planning or other consulting services where the assets are used for the informational purpose of gaining a full perspective of the client’s financial situation, but you are not actually placing the trade.

Assets under advisement could also be those which you monitor for a client on a non-discretionary basis, where you may make recommendations but where the client is the party responsible for arranging or effecting the purchase or sale.  A common example of this scenario is when an adviser reviews a participant’s 401(k) allocations. If the adviser does not have the authority or ability to effect changes in the portfolio, these assets are likely considered assets under advisement rather than regulatory assets under management.

Assets under advisement are permitted to be disclosed on Form ADV Part 2A as a separate asset figure from the assets under management.  There is no requirement to disclose the assets under advisement figure, but some advisers opt to include the figure to give prospective clients a more complete picture of the firm’s responsibilities.  If you choose to report your assets under advisement, be sure to make a clear distinction between this figure and your regulatory assets under management.

NOTE: Essay with thanks to Chat GPT.

COMMENTS APPRECIATED

Subscribe and Refer

***

***

Stocks, Economy and Commodities

By AI

***

***

  • Stocks: Investors looked past the escalating conflict between Iran and Israel, even as President Trump mulled his options for a US intervention, and stocks rose ahead of today’s Federal Reserve meeting.
  • Economy: Trump called Jerome Powell “a stupid person” hours before the Fed Chair decided to keep interest rates where they were Stocks fell thanks to the Fed’s prediction that inflation will rise to 3.1% by the end of the year, above previous forecasts of 2.8%.
  • Commodities: Gold fell just a hair as analysts called the commodity’s top, while platinum climbed to a four-year high.

COMMENTS APPRECIATED

Like, Refer and Subscribe

***

***

GLOSSARY: Health Information Technology and Security Terms

By Staff Reporters

SPONSOR: http://www.HealthDictionarySeries.org

***

***

Much has been written and much has been opined on the topic of health information technology, electronic health records and medical security liability for physicians and healthcare providers in this textbook. But occasionally, we all still get lost in a wide array of acronyms, jargon and terms that are constantly changing in this ecosystem. And so, this brief glossary serves as a ready reference for those who want to know about these definitions in a quick and ready fashion.

Access control: The process of controlling the access of a user

Access security: To allow computer or healthcare network entry using ID / password / secure socket layer (SSL) encryption / biometrics, etc; unique identification and password assignments are usually made to medical staff members for access to medical information on a need-to-know basis, and only upon written authority of the owner of the data.

Access level authorization: Establishes a procedure to determine the computer or network access level granted to individuals working on or near protected health information, medical data or secure health data.

Accredited standards committee: Organization that helps develop American National Standards (ANS) for computer and health information technology; accredited by ANSI for the development of American National Standards; ASC X12N develops medical electronic business exchange controls like 835-Health Care Claim Payment/Advice and 837-Health Care Claim.

Accountability: The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity. This supports nonrepudiation, deterrence, fault isolation, intrusion detection and prevention, and after-action recovery and legal action.

Accounting: Creating an historical record of who was authenticated, at what time, and how long they accessed the computer system.

Administrative simplification: The use of electronic standard code sets for health information exchange; Title II, Subtitle F of HIPAA gives HHS the authority to mandate the use of standards for the electronic exchange of health care data; to specify what medical and administrative code sets should be used within those standards; to require the use of national identification systems for health care patients, providers, payers (or plans), and employers (or sponsors); and to specify the types of measures required to protect the security and privacy of personally identifiable health care and medical information.

Alternative backup sites: Off-site locations that are used for transferring computer operations in the event of an emergency.

American Health Information Management Association: A large trade association of health information and medical data management professionals.

American Medical Informatics Association: An organization that promotes the use of electronic medical management and healthcare informatics for clinical and administrative endeavors.

American Telemedicine Association: Established in 1993 as a leading resource and advocate promoting access to medical care for patients and health professionals via telecommunications technology; membership open to individuals, companies, and other organizations with an interest in promoting the deployment of telemedicine throughout the world.

Anti-virus software: A software package or subscription service used to thwart malicious computer or network attacks, such as: Symantec®, McAfee®, Trend Micro®, Panda Software®, Sunbelt Software®, Computer Associates®, AVG® or MS-FF ®, etc.

Anti-Worm: A software patch, fix; glitch repairer; do-gooder virus; slang term.  

ASC X12N: HIPAA transmission standards, specifications and implementation guides from the Washington Publishing Company; or the National Council of Prescription Drug Programs.

Assurance: Grounds for confidence that the other four security goals (integrity, availability, confidentiality, and accountability) have been adequately met by a specific implementation. “Adequately met” includes (1) functionality that performs correctly, (2) sufficient protection against unintentional errors (by users or software), and (3) sufficient resistance to intentional penetration or bypass.

Asymmetric cryptology: The use of two different but mathematically related electronic keys for secure health data and medical information storage, transmission and manipulation.

Asymmetric encryption: Encryption and decryption performed using two different keys, one of which is referred to as the public key and one of which is referred to as the private key; also known as public-key encryption.

Asymmetric key: A half of a key pair used in an asymmetric “public-key” encryption system with two important properties: (1) the key used for encryption is different from the one used for decryption, (2) neither key can feasibly be derived from the other.

Attack tree: An inverted tree diagram that provides a visual image of the attacks that may occur against an asset.

Audio teleconferencing: A multi-simultaneous dual voice communications between two parties at remote locations; two way communications between physician and patient at various locations.

Authentication: The process of verifying and confirming the identity of a user.

Availability: The security goal that generates the requirement for protection against – Intentional or accidental attempts to (1) perform unauthorized deletion of data or (2) otherwise cause a denial of service or data.

Back door: A means to access to a computer program that bypasses security mechanisms, sometimes installed by a programmer so that the program can be accessed for troubleshooting or other purposes.

Back door trojans or bots: Currently, the biggest threat to healthcare and all PC users worldwide according to the MSFT Corporation.® 

Bandwidth: The amount of information that can be carried over a communications link.

Bar coding systems: Final FDA ruling issued in February 2004 that required bar codes on most prescription and non-prescription medications used in hospitals and dispensed based on a physician’s order; the bar code must contain at least the National Drug Code (NDC) number, which specifically identifies the drug; although hospitals are not required at this time to have a bar code reading system on the wards, this ruling has heightened the priority of implementing hospital-wide systems for patient-drug matching using bar codes.

Baud: A unit of digital transmission that indicates the speed of information flow. The rate indicates the number of events able to be processed in one second and is expressed as bits per second (bps). The baud rate is the standard unit of measure for data transmission capability; typical older rates were 1200, 2400, 9600, and 14,400 baud; the signaling rate of a telephone line in the number of transitions made in a second; 1/300 sec = 300 baud.

Beta test: The secondary or final stress examination of newly developed computer hardware, software or peripheral devices; site, etc.

Bibliographic database: Indexed computer or printed source of citations of journal articles and other reports in the literature; typically include author, title, source, abstract, and/or related information; MEDLINE® and EMBASE®.

Bioinformatics: The application of medical and biological science to the health information management field.

Biological Information technology: Cross industry alliance of the Microsoft Corporation to enhance the ability to use and share digital health and biomedical data.

Biometric: Personal security identity characteristics, such as a signature, fingerprints, voice, iris or retinal scan, hand or foot vein geometry, facial characteristics, hair analysis, eye, blood vessel or DNA; uses the unique human characteristics of a person as a means of authenticating.

Biometric identification: Secure identification using biometrics that identifies a human from a measurement of a physical feature or repeatable action of the individual (for example, hand geometry, retinal scan, iris scan, fingerprint patterns, facial characteristics, DNA sequence characteristics, voice prints, and hand written signature).

Biopassword: Start-up healthcare IT security pioneer of keyboarding patterns to boost online security through neural network patterns.

Bluetooth® device: Machines, like cell phone with headset, transmitting across communications channels 1 to 14, over time.

Bluetooth® technology: Wireless mobile technology standard built into millions of mobile phones, headsets, portable computers, desktops and notebooks; named after Harold Bluetooth, a 10th century Viking king; healthcare telemetry and rural data transmissions; the Bluetooth Special Interest Group (BSIG) advocates measures aimed at pushing healthcare interoperability for wireless devices and other computers designed for use in the medical field; other wireless stands include: Wi-Fi, ZigBe®, IrDA and RFID.

Buffer: A temporary storage area.

Buffer overflow: A security breach that occurs when a computer program attempts to stuff more data into a temporary storage area than it can hold

Business continuity plan: A plan that outlines the procedures to follow after a business experiences an attack on its security.

California Database Security Breach Act: A state act that requires disclosure to California residents if a breach of personal information has or is believed to have occurred.

Certification authority: An independent third-party organization that assigns digital certificates.

Chain of custody: A process that documents everyone who has had contact with or direct possession of the evidence.

Chain of trust: Suggestion that each and every covered entity and business associate share responsibility and accountability for confidential PHI. 

Chain of trust agreement: Contract entered into by two business partners in which it is agreed to exchange data and that the first party will transmit information to the second party, where the data transmitted is agreed to be protected between the partners; sender and receiver depend upon each other to maintain the integrity and confidentiality of the transmitted information; multiple two-party contracts may be involved in moving information from the originator to the ultimate recipient; for example, a provider may contract with a clearing house to transmit claims to the clearing house; the clearing house, in turn, may contract with another clearing house or with a payer for the further transmittal of those same claims.

Children’s Online Privacy Protection Act: A federal act that requires operators of online services or Web sites directed at children under the age of 13 to obtain parental consent prior to the collection, use, disclosure, or display of a child’s personal information.

Cipher lock: A combination lock that uses buttons that must be pushed in the proper sequence in order to open the door.

Clearing house: HIPAA medical invoice, healthcare data transaction exchange and medical data implementation service center that that meets or exceeds Federally-mandated standardized Electronic Data Interchange (EDI) transaction requirements.

Clinger-Cohen Act: Public Law 104-106; Information Technology Management Reform Act (ITMRA) of 1996.

Clinical data: Protected Health Information (PHI) from patient, physician, laboratory, clinic, hospital and/or payer, etc; identifiable patient medical information.

Clinical data information systems: Automatic and securely connected system of integrated computers, central severs and the Internet that transmits Protected Health Information (PHI) from patient, physician, laboratory, clinic, hospital and/or payer, etc.

Clinical data repository: Electronic storehouse of encrypted patient medical information; clinical data storage.

Clinical informatics: The management of medical and clinical data; the use of computers, networks and IT for patient care and health administration.

Clinical information: All the related medical information about a patient; Protected Health Information (PHI) from patients, providers, laboratories, clinics, hospitals and/or payers or other stakeholders, etc.

Clinical information system:  A computer network systems that supports patient care; relating exclusively to the information regarding the care of a patient, rather than administrative data, this hospital-based information system is designed to collect and organize data.

Clinical regional health information system: Electronic entity committed to securely share private patient health information among entities like medical providers, clinics, laboratories, hospitals, outpatient centers, hospice and other healthcare facilities; Community Health Management Information Systems (CHMIS), Enterprise Information Networks (EINs), Regional Health Information Networks (RHINs) and Health Information Networks (HINs).

Cold site: An alternative backup site that provides the basic computing infrastructure, such as wiring and ventilation, but very little equipment.

Compact disc – read only memory (CD-ROM): A computer drive that can read CD-R and CD-RW discs.

Compact disc – recordable (CD-R): An optical disc that contains up to 650 megabytes of data and cannot be changed once recorded.

Compact disc – rewriteable (CD-RW): An optical disc that can be used to record data, erase it, and re-record again.

Computer security: A computer or network that is free from threats against it.

Computerized Physician Order Entry System: Automatic medical provider electronic medical chart ordering system that usually includes seven features: medication analysis, system order clarity, increased work efficiency, point of care utilization, benchmarking and performance tracking, on-line alerts and regulatory reporting.

Confidential health information: Protected Health Information (PHI) that is prohibited from free-use and secured from unauthorized dissemination or use; patient specific medical data.

Counter signature: The ability to prove the order of application of signatures; analogous to the normal business practice of signing a document which has already been signed by another party (ASTM E 1762 -95); part of a digital signature.

Covered entity: 42 CFR § 164.504(e)(2)(i)(B). Any of three broadly defined entities that deal with protected health information (PHI): providers, individuals or group health plans, and clearinghouses.

Cracker: A person who breaks into or otherwise violates the system security with a malicious intent.

Cryptography: The science of transforming information so that it is secure while it is being transmitted or stored.

Cyber-terrorism: Attacks by a terrorist group using computer technology and the Internet to cripple or disable a nation’s electronic infrastructure.

Data backup: The process of copying data to another media and storing it in a secure location.

Data encryption standard: An older health or medical data private key cryptology federal protocol for secure information exchange; replaced by AES.

Data interchange standard: X12 HIPAA health data transmission standard format.

Data interchange standard association: The organization that provides X12 HIPAA transmission standards and formats.

Deadbolt lock: A lock that extends a solid metal bar into the door frame for extra security.

Decision support system: Computer tools or applications to assist physicians in clinical decisions by providing evidence-based knowledge in the context of patient-specific data; examples include drug interaction alerts at the time medication is prescribed and reminders for specific guideline-based interventions during the care of patients with chronic disease; information should be presented in a patient-centric view of individual care and also in a population or aggregate view to support population management and quality improvement.

Decryption: Changing an encrypted message back to its original form.

Definition files: Files that contain updated antivirus information.

De-identified health information: Protected health information that is no longer individually identifiable health information; a covered entity may determine that health information is not individually identifiable health information only if: (1) a person with appropriate knowledge of and experience with generally accepted statistical and scientific principles and methods for rendering information not individually identifiable determines that the risk is very small that the information could be used, alone or in combination with other available information, to identify an individual, and documents the methods and results of the analysis; or (2) the following identifiers of the individual, relatives, employers or household members of the individual are removed.

Denial of service: The prevention of authorized access to resources or the delaying of time critical operations.

Designated record set: Contains medical and billing records and any other records that a physician and/or medical practice utilizes for making decisions about a patient;  a hospital, emerging healthcare organization, or other healthcare organization is to define which set of information comprises “protected health information” and which set does not; contains medical or mixed billing records, and any other information that a physician and/or medical practice utilizes for making decisions about a patient.  It is up to the hospital, EHO, or healthcare organization to define which set of information comprises “protected health information” and which does not though logically this should not differ from locale to locale.  The patient has the right to know who in the lengthy data chain has seen their PHI. This sets up an audit challenge for the medical organization, especially if the accountability is programmed, and other examiners view the document without cause.

Designated standard: HIPAA standard as assigned by the department of HHS

Device lock: A steel cable and a lock used to secure a notebook computer.

Digital certificate: A certificate that binds a specific person to a public key.

Digital imaging and communications in medicine: Technology broadband transmission imaging standards for X-rays, MRIs, CT and PET scans, etc; health IT standard transmissions platform aimed at enabling different computing platforms to share image data without compatibility problems; a set of protocols describing how radiology images are identified and formatted that is vendor-independent and developed by the American College of Radiology and the National Electronic Manufacturers Association. 

Digital radiology: Medical digital imaging applied to x-rays, CT, PET scans and related non-invasive and invasive technology; broadband intensive imaging telemedicine.

Digital rights management: The control and protection of digital intellectual property.

Digital signature: Encrypted electronic authorization with verification and security protection; private and public key infrastructure; based upon cryptographic methods of originator authentication, computed by using a set of rules and a set of parameters so that the identity of the signer and the integrity of medical or other data can be verified.

Digital signature standard: Encryption technology to ensure electronic medical data transmission integrity and authentication of both sender and receiver; date and time stamps; public and private key infrastructure.

Digital versatile disc – recordable (DVD-R): An optical disc technology that can record once up to 3.95 gigabytes of data on a single-sided disc and 7.9 GB on a double-sided disc.

Digital versatile disc – rewriteable (DVD-RAM): An optical disc technology that can record, erase, and re-record data and has a capacity of 2.6 GB (single side) or 5.2 GB (double side).

Digital versatile disc (DVD): A technology that permits large amounts of data to be stored on an optical disc.

Disaster recovery plan: A process to restore vital health and/or critical healthcare technology systems in the event of a medical practice, clinic, hospital or healthcare business interruption from human, technical or natural causes; focuses mainly on technology systems, encompassing critical hardware, operating and application software, and any tertiary elements required to support the operating environment; must support the process requirements to restore vital company data inside the defined business requirements; does not take into consideration the overall operating environment; an emergency mode operation plan is still necessary.

Disclosure: Release of PHI outside a covered entity or business agreement space, under HIPAA; the release, transfer, provision of access to or divulging of medical information outside the entity holding the information.

Disc – rewriteable (DVD-RW): An optical disc technology that allows data to be recorded, erased, and re-recorded.

Due care: Managers and their organizations have a duty to provide for information security to ensure that the type of control, the cost of control, and the deployment of control are appropriate for the system being managed.

e-health: Emerging field in the intersection of medical informatics, public health and business, referring to health services and information delivered or enhanced through the Internet and related technologies; characterizes not only a technical development, but also a state-of-mind, attitude, and a commitment for networked, global thinking, to improve health care worldwide by using information and communication technology.

Electronic data interchange: Inter healthcare organization computer-to-computer transmission of business or health information in a standard format; direct transmission from the originating application program to the receiving, or processing, application program; an EDI transmission consists only of business or health data, not any accompanying verbiage or free-form messages; a standard format is one that is approved by a national or international standards organization, as opposed to formats developed by health industry groups, medical practices, clinics or companies; the electronic transmission of secure medical and financial data in the healthcare industrial complex; X12 and similar variable-length formats for the electronic exchange of structured health data. The Centers for Medicare and Medicaid Services (CMS) regulates security and Electronic Data Interchange (EDI).

Electronic data interchange standards: The American National Standards Institute (ANSI) set of EDI standards known as the X12 standards. These standards have been developed by private sector standards development organizations (SDOs) and are maintained by the Accredited Standards Committee (ASC) X12. ANSI ASC X12N standards, Version 4010, were chosen for all of the transactions except retail pharmacy transactions, which continue to use the standard maintained by the National Council for Prescription Drug Programs (NCPDP) because it is already in widespread use. The NCPDP Telecommunications Standard Format Version 5.1 and equivalent NCPDP Batch Standard Version 1.0 have been adopted in this rule (health plans will be required to support one of these two NCPDP formats). The standards are designed to work across industry and company boundaries. Changes and updates to the standards are made by consensus, reflecting the needs of the entire base of standards users, rather than those of a single organization or business sector. Specifically, the following nine healthcare transactions were required to use X12N standard electronic claim formats by October 16, 2003.

Electronic health record: A real-time patient health record with access to evidence-based decision support tools that can be used to aid clinicians in decision-making; the EHR can automate and streamline a clinician’s workflow, ensuring that all clinical information is communicated; prevents delays in response that result in gaps in care; can also support the collection of data for uses other than clinical care, such as billing, quality management, outcome reporting, and public health disease surveillance and reporting; electronic medical record.

Electronic medication administrative record: Electrical file keeping computerized system for tracking clinical medication dispensation and use; integrated with TPAs, PBMs, robotic dispensing devices and CPOEs, etc.

Electronic medical (media) claims: Usually refers to a flat file format used to transmit or transport medical claims, such as the 192-byte UB-92 Institutional EMC format and the 320-byte Professional EMC-NSF.

Electronic prescribing: A type of computer technology whereby physicians use handheld or personal computer devices to review drug and formulary coverage and to transmit prescriptions to a printer or to a local pharmacy; e-prescribing software can be integrated into existing clinical information systems to allow physician access to patient-specific information to screen for drug interactions and allergies.

Electronic preventive services selector: A digital tool for primary care clinicians to use when recommending preventive services for their patients unveiled by the Department of Health and Human Services’ Agency for Healthcare Research and Quality (AHRQ), in November 2006;  designed for use on a personal digital assistant (PDA) or desktop computer to allow clinicians to access the latest recommendations from the AHRQ-sponsored U.S. Preventive Services Task Force; designed to serve as an aid to clinical decision-making at the point of care and contains 110 recommendations for specific populations covering 59 separate preventive services topics; a real time search function allows a clinician to input a patient’s age, gender, and selected behavioral risk factors, such as whether or not they smoke, in the appropriate fields, while the software cross-references the patient characteristics entered with the applicable Task Force recommendations and generates a report specifically tailored for that patient.

Electronic signature: Various date and time stamped electronic security verification systems, such as passwords, encryption, ID numbers, biometrics identifiers, etc; electrical transmission and authentication of real signatories; signatory attribute that is affixed to an electronic health document to bind it to a particular entity; an electronic signature process secures the user authentication (proof of claimed health identity, such as by biometrics (fingerprints, retinal scans, hand written signature verification, etc.), tokens or passwords) at the time the signature is generated; creates the logical manifestation of signature (including the possibility for multiple parties to sign a medical document and have the order of application recognized and proven) and supplies additional information such as time stamp and signature purpose specific to that user; and ensures the integrity of the signed document to enable transportability, interoperability, independent verifiability, and continuity of signature capability; verifying a signature on a document verifies the integrity of the document and associated attributes and verifies the identity of the signer; there are several technologies available for user authentication, including passwords, cryptography, and biometrics (ASTM 1762-95).

Encryption: Changing the original text to a secret message.

Gigabytes (GB): Billions of bytes of data.

Gramm-Leach-Bliley Act: A federal act that requires private data be protected by banks and financial institutions.

Hacker: A person who possesses advanced computer skills and is adept at exploring computers and networks in order to break into them.

HEALTH 1.0This is the dying healthcare system of yesterday and today. Information is communicated from doctors to patients. It is a basic B2C [business-to-consumer] website as the internet became one big encyclopedia by aggregating knowledge silos. Some doctors maintain websites, others do not. Nevertheless, Health 1.0 has a command and control hierarchy; doctors on top of the pyramid, patients on the bottom.

HEALTH 2.0:  According to Matthew Holt [personal communication] Healthcare 2.0 may be defined as: “The foundation of healthcare 2.0 is information exchange plus technology. It employs user-generated content, social networks and decision support tools to address the problems of inaccessible, fragmentary or unusable health care information. Healthcare 2.0 connects users to new kinds of information, fundamentally changing the consumer experience (e.g., buying insurance or deciding on/managing treatment), clinical decision-making (e.g., risk identification or use of best practices) and business processes (e.g., supply-chain management or business analytics)”.

And so, if Health 1.0 was a static book, Health 2.0 is a dynamic discussion

Example: The power of the internet is illustrated in the phenomenon of “crowd-sourcing.” In this context, the term means to harvest the reach of social networking [wisdom of crowds] to solve a problem. A knowledge seeker asks a question and participants respond.  For example, readers can participate on the www.MedicalExecutivePost.com or www.BusinessofMedicalPractice.com sites to improve the administration of any medical practice. And, www.PodiatryPrep.com is an example of how podiatrists connect for global board certification assistance.

***

***

HEALTH 2.0 Plus:The Dictionary of Health Insurance and Managed Care defines this emerging hybrid as a bridge uniting the philosophy of contemporary Health 2.0 with futuristic Health 3.0 technologies. Cisco System’s HealthPresence is one example developed in 2010, by Dr. T. Warner Hudson. Using the network as a platform, HealthPresence combines video, audio and information to create an environment similar to what patients experience when they visit their own doctor.

HEALTH 3.0: Soon, patients will not only be seeking information; but actionable intelligence – whether it is artificial or real. Patients will communicate almost as with another patient or doctor. The internet won’t just blindly do what we tell it to do – it will think and represent some amazing opportunities. For example, imagine your toilet running a SMAC 20 and then being instantly notified of the results by your smart phone? Or; use your iPhone to send pictures and streaming videos of conditions for a second opinion www.KnockingLive.com

Health information technology: The application of information processing involving both computer hardware and software that deals with the storage, retrieval, sharing, and use of health care information, medical data, and knowledge for communication and decision making.

Health information technology auditor: An expert who evaluate a health organization’s computer systems to ensure the proper safeguards are in place to protect and maintain the integrity of the firm’s data; While the position has existed since the mid-1960s, companies that previously employed just a handful of HIT auditors are now significantly adding to their ranks, sometimes doubling, tripling or quadrupling current staff levels; much current demand is due to the Sarbanes-Oxley Act and other legislation aimed at improving corporate governance in the wake of major accounting scandals earlier in the decade; publicly traded hospital systems require the expertise of HIT auditors to meet ongoing compliance requirements; the Gramm-Leach-Bliley Act and the Health Insurance Portability and Accountability Act (HIPAA), among other regulations, also are fueling the need for HIT auditors.  Health IT auditors must have a general understanding of accounting principles and the strategic vision to ensure a health organization’s HIT systems allow it to achieve its short- and long-term objectives. Many hospitals promote from within for this role. Health facilities who look outside the organization for these professionals usually seek candidates with experience, knowledge of healthcare of emerging technologies and issues, and increasingly, certifications such as the certified information systems auditor (CISA) designation.

Health information technology promotion act: Legislation to accelerate the adoption of interoperable electronic health records by ensuring uniform standards, championed by Rep. Nancy Johnson, R-Conn, (H.R. 4157) which would: codify the Office of the National Coordinator for Health Information Technology in statute and delineate its ongoing responsibilities; create exceptions to the fraud and abuse statutes to allow certain providers to fund health information technology equipment and services for other providers; and provide for a study of federal and state health privacy policies.

Health Insurance Portability and Accountability Act (HIPAA): A federal act that requires enterprises in the health sector to guard protected health information and implement policies and procedures to safeguard it.

Health level seven: An international community of healthcare subject matter experts and information technology physicians and scientists collaborating to create standards for the exchange, management and integration of protected electronic healthcare information; the Ann Arbor, Mich.-based Health Level Seven (HL7) standards developing organization has evolved Version 3 of its standard, which includes the Reference Information Model (RIM) and Data Type Specification (both ANSI standards); HL7 Version 3 is the only standard that specifically deals with creation of semantically interoperable healthcare information, essential to building the national infrastructure; HL7 promotes the use of standards within and among healthcare organizations to increase the effectiveness and efficiency of healthcare delivery for the benefit of all patient, payers, and third parties; uses an Open System Interconnection (OSI) and high level seven healthcare electronic communication protocol that is unique in the medical information management technology space and modeled after the International Standards Organization (ISO) and American National Standards Institute (ANSI); each has a particular healthcare domain such as pharmacy, medical devices, imaging or insurance (claims processing) transactions. Health Level Seven’s domain is clinical and administrative data.

Hot site: An alternative backup site that contains the same equipment as found in the organization’s actual IT center.

Human firewall: An employee who practices good security techniques to prevent any security attacks from passing through them.

Incident response team: An employee team charged with gathering and handling the digital evidence of an attack.

Individually identifiable health information: Medical information that is created or received by a covered entity; relates to the physical or mental health condition of an individual, provision of health care or the payment for the provision of health care; identifies the individual or there is reasonable belief that the information can be used to identify the individual.

Information security: A computer or network that is free from threats against it.

Integrity: The security goal that generates the requirement for protection against either intentional or accidental attempts to violate data integrity (the property that data has when it has not been altered in an unauthorized manner) or system integrity (the quality that a system has when it performs its intended function in an unimpaired manner, free from unauthorized manipulation).

Intellectual property: Works created by others such as books, music, plays, paintings, and photographs.

IT-related risk: The net mission impact considering (1) the probability that a particular threat-source will exercise (accidentally trigger or intentionally exploit) system vulnerability and (2) the resulting impact if this should occur. IT-related risks arise from legal liability or mission loss due to:

* Unauthorized (malicious or accidental) disclosure, modification, or destruction of information

* Unintentional errors and omissions

* IT disruptions due to natural or man-made disasters

* Failure to exercise due care and diligence in the implementation and operation of the IT system.

Key-in-knob lock: A basic lock that has the lock mechanism embedded in the knob or handle.

Keystroke logger: A type of hardware spyware that captures keystrokes as they are typed.

Logic bombs: A computer program that lies dormant until it is triggered by a specific event.

Lossless: To compress electronic digital data.

Malicious code: Programs that are intentionally created to break into secure computers or to create havoc after the computers are accessed.

Master patient index: Healthcare facility composite that links and assists in tracking patient, person, or member activity within an organization (or health enterprise) and across patient care settings; hardcopy or electronic identification of all patients treated in a facility or enterprise and lists the medical record or identification number associated with the name; can be maintained manually or as part of a computerized system; typically, those for healthcare facilities are retained permanently, while those for insurers, registries, or others may have different retention periods; a database of all the patients ever registered (within reason) at a facility; name, demographics, insurance, next of kin, spouse, etc.

Medically unbelievablE event: Implemented on Jan. 1, 2007, the CMS blockage of payments for medical services that make no sense based on “anatomic considerations” or medical reasonableness when the same patient, date of service, HCPCS code or provider is involved; unlike other National Correct Coding Initiative (NCCI) edits, MUEs can’t be overridden by a modifier because there will never be a scenario where the physician had a good reason to submit a claim for removing a second appendix from the same person; etc.

Megabytes (MB): Millions of bytes of storage.

Memory stick: USB flash or non-volatile storage device; Sony CompactFlash®, pen or mini-drive; flash card, smart media, slang terms.

Mesh: Medical Subject Headings, the controlled vocabulary of about 16,000 terms used for MEDLINE and certain other MEDLARS databases.

Minimum necessary: The amount of protected health information shared among internal or external parties determined to me the smallest amount needed to accomplish its purpose for Use or Disclosure; the amount of health information or medical data needed to accomplish a purpose varies by job title, CE or job classification.

Minimum necessary rule: HIPAA regulation that suggests any PHI used to identify a patient, such as a social security number, home address or phone number; divulge only essential elements for use in transferring information from patient record to anyone else that requires the information; especially important with financial information; changes the way software is written and vendor access is provided.  The “Minimum Necessary” Rule states the minimum use of PHI that can be used to identify a person, such as a social security number, home address or phone number. Only the essential elements are to be used in transferring information from the patient record to anyone else that needs this information.  This is especially important when financial information is being addressed.  Only the minimum codes necessary to determine the cost should be provided to the financial department.  No other information should be accessed by that department.  Many institutions have systems where a registration or accounting clerk can pull up as much information as a doctor or nurse, but this is now against HIPAA policy and subject to penalties.  The “minimum necessary” rule is also changing the way software is set up and vendor access is provided. 

Mirror site: A secondary location identical to the primary IT site that constantly receives a copy of data from the primary site.

National health information network: The technologies, standards, laws, policies, programs and practices that enable health information to be shared among health decision makers, including consumers and patients, to promote improvements in health and healthcare; vision for the NHII began more than a decade ago with publication of an Institute of Medicine report, The Computer-Based Patient Record. The path to a national network of healthcare information is through the successful establishment of Regional Health Information Organizations (RHIO).

National provider identifier: Originally was an eight-digit alphanumeric identifier. However, the healthcare industry widely criticized this format, claiming that major information systems incompatibilities would make it too expensive and difficult to implement. DHHS therefore revised its recommendation, instead specifying a 10-position numeric identifier with a check digit in the last position to help detect keying errors. The NPI carries no intelligence; in other words, its characters will not in themselves provide information about the provider. More recently, CMS announced that HIPAA-covered entities such as providers completing electronic transactions, healthcare clearinghouses, and large health plans, must use only the NPI to identify covered healthcare providers in standard transactions by May 23, 2007. Small health plans must use only the NPI by May 23, 2008. The proposal for a Standard Unique National Health Plan (Payer) Identifier was withdrawn on February, 2006. (According to CMS, “withdrawn” simply means that there is not a specific publication date at this time. Development of the rule has been delayed; however, when the exact date is determined, the rule will be put back on the agenda.)

Network: A group of interconnected computers.

Notebook safe: A special safe secured to a wall or the trunk of a car used for storing a notebook computer.

Operating system hardening: Steps that can be taken to make a personal computer operating system more secure.

Optical disc: A disc that uses laser technology to record data.

Password: A secret combination of words or numbers that authenticates or identifies the user.

Patch: A software update to correct a problem.

Patch management: Tools, utilities, and processes for keeping computers up to date with new software updates that are developed after a software product is released.

Pharmacy information system: Drug tracking and dispensation related health management information system for hospitals and healthcare organizations.

PhisHing: An attempt to fraudulent gather confidential information by masquerading as a trustworthy entity, person or business in an apparently official email, text message or website; carding or spoofing; video vishing; phish-tank; vish-tank; slang terms.

Physical security: The process of protecting the computer itself.

Port scanning: Sending a flood of information to all of the possible network connections on a computer.

Ports: The network connections on a computer.

Preset lock: A basic lock that has the lock mechanism embedded in the knob or handle.

Privacy: The quality or state of being hidden, encrypted, obscure, or undisclosed; especially medical data or PHI.

Privacy act: Federal legislature of 1974 which required giving patient some control over their PHI.

Privacy enhanced mail: Email message standard protocol for enhanced medical, health data or other security.

Privacy officer: A medical entity’s protected client information and security officer; required by each covered entity, to be responsible for “the development and implementation of the policies and procedures” necessary for compliance.

Privacy rule: The Federal privacy regulations promulgated under the Health Insurance Portability and Accountability Act (HIPAA) of 1996 that created national standards to protect medical records and other protected health information. The Office of Civil Rights (OCR) within the Department of Health and Human Services (DHHS) regulates the privacy rules.

Privacy standards: Any protocol to ensure the confidentiality of PHI.

Private key system: A means of cryptography where the same key is used to both encrypt and decrypt a message.

Public key system: A means of cryptography where two keys are used.

Records, medical: 20 U.S.C. 1232g(a)(4)(B)(iv), all:

* Psychotherapy notes recorded (in any medium) by a health care provider who is a mental health professional documenting or analyzing the contents of conversation during a private counseling session or a group, joint, or family counseling session and that are separated from the rest of the individual’s medical record; excludes medication prescription and monitoring, counseling session start and stop times, the modalities and frequencies of treatment furnished, results of clinical tests, and any summary of the following items: diagnosis, functional status, the treatment plan, symptoms, prognosis, and progress to date.

* Public health authority means an agency or authority of the United States, a State, a territory, a political subdivision of a State or territory, or an Indian tribe, or a person or entity acting under a grant of authority from or contract with such public agency, including the employees or agents of such public agency or its contractors or persons or entities to whom it has granted authority, that is responsible for public health matters as part of its official mandate.

* Required by law means a mandate contained in law that compels a covered entity to make a use or disclosure of protected health information and that is enforceable in a court of law; includes but is not limited to, court orders and court-ordered warrants; subpoenas or summons issued by a court, grand jury, a governmental or tribal inspector general, or an administrative body authorized to require the production of information; a civil or an authorized investigative demand; Medicare conditions of participation with respect to health care providers participating in the program; and statutes or regulations that require the production of information, including statutes or regulations that require such information if payment is sought under a government program providing public benefits.

Regional health information organization: A multi-stakeholder organization that enables the exchange and use of health information, in a secure manner, for the purpose of promoting the improvement of health quality, safety and efficiency; the U.S. Department of Health and Human Services see RHIOs as the building blocks for the national health information network (NHIN) that will provide universal access to electronic health records; other experts maintain that RHIOs will help eliminate some administrative costs associated with paper-based patient records, provide quick access to automated test results and offer a consolidated view of a patient’s history.

Risk assessment: The process of identifying the risks to system security and determining the probability of occurrence, the resulting impact, and additional safeguards that would mitigate this impact.

Risk management: The total process of identifying, controlling, and mitigating information system–related risks. It includes risk assessment; cost-benefit analysis; and the selection, implementation, test, and security evaluation of safeguards.  This overall system security review considers both effectiveness and efficiency, including impact on the mission and constraints due to policy, regulations, and laws.

Royalties: Payment to the owner or creator of intellectual property for their work.

Sarbanes-Oxley Act (Sarbox): A federal act that enforces reporting requirements and internal controls on electronic financial reporting systems.

Scanning: Locating a computer that can be broken into.

Script kiddies: Younger and less sophisticated users who break into a computer with malicious intent.

Secure virtual private network: Cryptographic tunneling protocols to provide the necessary health data confidentiality (preventing snooping), sender authentication (preventing identity spoofing), and message integrity (preventing message alteration) to achieve the medical privacy intended. When properly chosen, implemented, and used, such techniques can provide secure communications over unsecured networks.

Security: A set of healthcare information technology system characteristic and  mechanisms which span the system both logically and physically; electronic access control against unauthorized intervention, both friendly or malicious;  encompasses all of the safeguards in an information system, including hardware, software, personnel policies, information practice policies, disaster preparedness, and the oversight of all these areas; the purpose of health information security is to protect both the system and the information it contains from unauthorized access from without and from misuse from within; through various security measures, a health information system can shield confidential information from unauthorized access, disclosure and misuse, thus protecting privacy of the individuals who are the subjects of the stored data; security life cycle.

Security administration: The physical and electrical protection features of an IT health system needed to be managed in order to meet the needs of a specific installation and to account for changes in the healthcare entities operational environment.

Security compromise: Physical or electronic data, file, program or transmission error due to malicious miscreants or software interventions; health data confidentiality breach.

Security configuration: Measures, practices, and procedures for the safety of information systems that must be coordinated and integrated with each other and other methods, practices, and procedures of the organization established in order to credential safekeeping policy; provides written security plans, rules, procedures, and instructions concerning all components of a healthcare entity’s security; procedures must give instructions on how to report breaches and how those breaches are to be handled within the organization.

Security configuration management: The measurement of practices and procedures for the security of information systems that is coordinated and integrated with each other and other measures, practices and procedures of the organization so as to create a coherent system of health data security (NIST Pub 800-14).

Security domain: A set of subjects, their information objects, and a common security policy; foundation for IT security is the concept of security domains and enforcement of data and process flow restrictions within and between these domains.

Security goals: The five security goals are integrity, availability, confidentiality, accountability, and assurance.

Security information system: security is a system characteristic and a set of mechanisms that span the system both logically and physically.

Security policy: A formal written policy that outlines the importance of security to the organization and establishes how the security program is organized.

Share: An object that is shared with others over a computer network.

Signature files: Files that contain updated antivirus information.

Smart card: A device that contains a chip that stores the user’s private key, login information, and public key digital certificate.

Sniffing: Listening to the traffic on a computer network and then analyzing it.

Social engineering: Relying on trickery and deceit to break security and gain access to computers.

Spam: Unsolicited e-mail messages.

Spy: A person who has been hired to break into a computer and steal data.

Spyware: Hardware or software that “spies” on what the user is doing and captures that activity without their knowledge.

Stealth signal transmitter: Software installed on a notebook computer that sends a signal that can be traced.

Threat analysis: The examination of threat-sources against system vulnerabilities to determine the threats for a particular system in a particular operational environment.

Threat modeling: A process of constructing scenarios of the types of threats that assets face.

Threat: The potential for a threat-source to exercise (accidentally trigger or intentionally exploit) a specific vulnerability.

Threat-source: Either (1) intent and method targeted at the intentional exploitation of a vulnerability or (2) a situation and method that may accidentally trigger a vulnerability.

Token: A security device used to authenticate the user by having the appropriate permission (like a password) embedded into the device.

USA Patriot Act: A federal act designed to broaden the surveillance of law enforcement agencies to enhance the detection and suppression of terrorism.

Username: A unique identifier of a person used to access a computer system.

Virus: A program that secretly attaches itself to other programs and when executed causes harm to a computer.

Vulnerability: A flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach or a violation of the system’s security policy.

Vulnerability assessment: A process to determine what vulnerabilities exist in the current system against these attacks.

Vulnerability assessment managed services: Agencies that use scanning devices connected to probe an organization’s security to look for vulnerabilities.

War driving: A technique used to locate wireless local area networks (WLANs).

WiMax: A more powerful version of Wi-Fi that can provide wireless Internet access over wider geographic location such as a city; an acronym that stands for Worldwide Interoperability for Microwave Access, and is a certification mark for products that pass conformity and interoperability tests for the IEEE 802.16 standards. IEEE 802.16 is working group number 16 of IEEE 802, specializing in point-to-multipoint broadband wireless access.

Wireless hot spot: Specific geographic location in which an access point provides public wireless broadband network services; security is risky for PHI; hotspot.

Wireless local area networks: A computer network that uses radio waves instead of wires to connect computers.

Worm: A program that does not attach itself to other programs or need user intervention to execute.

EDUCATION: Books

ACKNOWLEDGEMENTS: To Richard J. Mata MD MS MI-CIS CMP[Hon]; Mackenzie H. Marcinko PhD of iMBA Inc., and Shahid N. Shah MS, Washington DC.

COMMENTS APPRECIATED

Refer, Like and Subscribe

***

***

CORRELATION: Diversification in Finance and Investments

By Staff Reporters

SPONSOR: http://www.MarcinkoAssociates.com

DEFINITION

***

***

Correlation measures the relationship between two investments–the higher the correlation, the more likely they are to move in the same direction for a given set of economic or market events. Correlation, in the finance and investment industries, is a statistic that measures the degree to which two securities move in relation to each other. Correlations are used in advanced portfolio management, computed as the correlation coefficient which has a value that must fall between -1.0 and +1.0.

So if two securities are highly positively correlated, they will move in the same direction the vast majority of the time. Negatively correlated investments do the opposite–as one security rises, the other falls, and vice versa. No correlation means there is no relationship between the movement of two securities–the performance of one security has no bearing on the performance of the other.

CAUSATION: https://medicalexecutivepost.com/2024/06/05/correlation-is-not-causation/

Correlation is an important concept for portfolio diversification--combining assets with low or negative correlations can improve risk-adjusted performance over time by providing a diversity of payouts under the same financial conditions.

COMMENTS APPRECIATED

Thank You

***

***

ADX: Average Directional Index

By Staff Reporters and AI

SPONSOR: http://www.MarcinkoAssociates.com

***

***

The average directional movement index (ADX) was developed in 1978 by J. Welles Wilder as a technical indicator of trend strength in a series of prices of a financial instrument. ADX has become a widely used indicator for technical analysts, and is provided as a standard in collections of indicators offered by various trading platforms.

The ADX is a combination of two other indicators developed by Wilder, the positive directional indicator (abbreviated +DI) and negative directional indicator (-DI). The ADX combines them and smooths the result with a smoothed moving average.

The average directional index (ADX) is a technical indicator used by traders to determine the strength of a financial security’s price trend. It helps them reduce risk and increase profit potential by trading in the direction of a strong trend. Many traders consider the ADX to be the ultimate trend gauge because it is so reliable.

ADX quantifies trend strength by measuring the degree of directional movement in price. ADX calculations are based on a moving average of price range expansion or contraction over a given period. The default setting is 14 periods, although other settings can be used.

ADX can be used with any financial security, including stocks, exchange-traded funds, and futures.

COMMENTS APPRECIATED

EDUCATION: Books

Like, Subscribe and Refer

***

***

Stocks, Commodities and Bonds

By AI

***

***

  • Stocks: Israel and Iran exchanged missile strikes for a fourth day, but investors are betting that the conflict will remain at least somewhat contained. Reports that Iran wants to de-escalate the conflict and even restart nuclear talks seemed to underline that idea, and markets rose strongly throughout the afternoon.
  • Commodities: Gold fell as hopes of a ceasefire between Israel and Iran made investors more bullish, while Iranian oil infrastructure was spared from the attacks, pushing crude prices lower.
  • Bonds: A $13 billion 20-year bond auction this afternoon yielded strong demand, rounding out a series of solid auctions over the last few days that seemingly point to renewed investor confidence in US fixed income.

COMMENTS APPRECIATED

EDUCATION: Books

Like, Refer and Subscribe

***

***

ETFs: Alternatively Weighted Investments

DEFINITION

By Staff Reporters

SPONSOR: http://www.MarcinkoAssociates.com

***

***

Alternatively Weighted Exchange Traded Funds are designed to track an index that is constructed based on criteria other than market capitalization (the methodology used for most traditional indexes).

Instead, alternatively weighted indexes select and weight securities based on other factors, such as growth, valuation, and price momentum, among others. Examples include:

  • Invesco S&P 500 Equal Weight ETF (NYSEARCA: RSP)
  • SPDR Technology ETF (NYSEARCA: XNTK)
  • First Trust NYSE Arca Biotechnology Index Fund (NYSEARCA: FBT)
  • Amplify Online Retail ETF (NASDAQ: IBUY)
  • iShares MSCI USA Equal Weighted ETF (NYSEARCA: EUSA)
  • ALPS Equal Sector Weight ETF (NYSEARCA: EQL)

These may also be known as “smart beta” funds.

COMMENTS APPRECIATED

Refer and Subscribe

***

***

Doctor V. Forensic Pathologist V. Coroner V. Morgue

By Staff Reporters and CoPilot AI

SPONSOR: http://www.CertifiedMedicalPlanner.org

***

***

A morgue is a place where the bodies of dead persons are kept temporarily pending identification or release for burial or autopsy.

TOD: https://medicalexecutivepost.com/2024/02/18/transfer-on-death-account-tax-implications/

***

A forensic pathologist is a medical doctor who studies diseases and performs autopsies, while a coroner investigates and determines the cause of sudden or unexplained deaths, often without a medical degree.

An autopsy (also referred to as post-mortem examination, obduction, necropsy, or autopsia cadaverum) is a surgical procedure that consists of a thorough examination of a corpse by dissection to determine the cause, mode, and manner of death or the exam may be performed to evaluate any disease or injury that may be present for research or educational purposes. The term necropsy is generally used for non-human animals.

DEATH Eco-Friendly: https://medicalexecutivepost.com/2023/05/29/death-eco-friendly-transitions-and-interment/

Autopsies are usually performed by a specialized medical doctor called a pathologist. Only a small portion of deaths require an autopsy to be performed, under certain circumstances. In most cases, a medical examiner or coroner can determine the cause of death.

  • A coroner is elected or appointed to a local government office, while a forensic pathologist is a medical doctor trained to perform autopsies and other procedures to determine the cause of death.
  • A forensic pathologist is able to perform medical operations while coroners may specialize in the legal paperwork and law enforcement side of a death.
  • The title of “medical examiner” is usually the job title of a forensic pathologist who works for a government.
  • In many jurisdictions, a coroner does not need to possess a medical degree.

DEATH CROSS: https://medicalexecutivepost.com/2024/08/23/what-is-the-stock-market-death-cross-2/

***

EDUCATION: Books

The Medical Executive-Post is a  news and information aggregator and social media professional network for medical and financial service professionals. Feel free to submit education content to the site as well as links, text posts, images, opinions and videos which are then voted up or down by other members. Comments and dialog are especially welcomed. Daily posts are organized by subject. ME-P administrators moderate the activity. Moderation may also conducted by community-specific moderators who are unpaid volunteers.

Invite Dr. Marcinko

COMMENTS APPRECIATED

Like and Refer

***

***

MUTUAL FUNDS, SECTOR FUNDS, ETFs & INDEX FUNDS

By Dr. David Edward Marcinko MBA MEd CMP

***

***

MUTUAL FUNDS, SECTOR FUNDS, ETFs AND INDEX FUNDS

SPONSOR: http://www.MarcinkoAssociates.com

here are many ways for a doctor, osteopath, podiatrist or dentist to financially invest. Traditionally, this meant picking individual stocks and bonds. Today, there are many other ways to purchase securities en mass. For example:

MUTUAL FUND: A regulated investment company that manages a portfolio of securities for its shareholders.

Open End Mutual Funds: An investment company that invests money in accordance with specific objectives on behalf of investors. Fund assets expand or contract based on investment performance, new investments and redemptions. Trade at Net Asset Value or the price the fund shares scheduled with the US Securities and Exchange Commission (SEC) trade. NAV can change on a daily basis. Therefore, per-share NAV can, as well.

Closed End Mutual Funds: Older than open end mutual funds and more complex. A CEMF is an investment company that registers shares SEC regulations and is traded in securities markets at prices determined by investments. Shares of closed-end funds can be purchased and sold anytime during stock market hours. CEMF managers don’t need to maintain a cash reserve to redeem or / repurchase shares from investors. This can reduce performance drag that may otherwise be attributable to holding cash. CEMFs may be able to offer higher returns due to the heavier use of leverage [debt]. They are subject to volatility, less liquid than open-end funds, available only through brokers and may sells at a heavily discount or premium to [NAV] determined by subtracting its liabilities from its assets. The fund’s per-share NAV is then obtained by dividing NAV by the number of shares outstanding.  .

Sector Mutual Funds: Sector funds are a type of mutual fund or Exchange-Traded Fund (ETF) that invests in a specific sector or industry such as technology, healthcare, energy, finance, consumer goods, or real estate. Sector funds focus on a particular industry, allowing investors to gain targeted exposure to specific market areas. The goal is to outperform the overall market by investing in companies within a specific sector that is expected to perform well. However, they are also more susceptible to market fluctuations and specific sector risks, making them a more specialized and potentially higher-risk investment option.

STOCKS, BONDS AND MUTUAL FUNDS: https://medicalexecutivepost.com/2025/06/11/stocks-bonds-and-commodities/

***

***

EXCHANGE TRADED FUNDS:  ETFs are a type of fund that owns various kinds of securities, often of one type. For example, a stock ETF holds stocks, while a bond ETF holds bonds. One share of the ETF gives buyers ownership of all the stocks or bonds in the fund. If an ETF held 100 stocks, then those who owned the fund would own a stake – albeit a very tiny one – in each of those 100 stocks.

ETFs are typically passively managed, meaning that the fund usually holds a fixed number of securities based on a specific preset index of investments. These are tax efficient. In contrast, many mutual funds are actively managed, with professional investors trying to select the investments that will rise and fall.

The Standard & Poor’s 500 Index is perhaps the world’s best-known index, and it forms the basis of many ETFs. Other popular indexes include the Dow Jones Industrial Average and the National Association of Securities Dealers Automated Quotations [NASDAQ] Composite Index.

ETFs based on these funds are called Index Funds and just buy and hold whatever is in the index and make no active trading decisions. ETFs trade on a stock exchange during the day, unlike mutual funds that trade only after the market closes. With an ETF you can place a trade whenever the market is open and know exactly the price you’re paying for the fund.

ETFs: https://medicalexecutivepost.com/2025/01/06/etfs-alternatively-weighted-investments/

INDEX FUNDS: Index funds mirror the performance of benchmarks like the DJIA. These passive investments are an unimaginative way to invest. Passive index funds tracking market benchmarks accounted for just 21% of the U.S. equity fund market in 2012. By 2024, passive index funds had grown to about half of all U.S. fund assets. This rise of passive funds has come as they often outperform their actively managed peers. According to the widely followed S&P Indices Versus Active (SPIVA) scorecards, about 9 out of 10 actively managed funds didn’t match the returns of the S&P 500 benchmark in the past 15 years.

ASSESSMENT

Investing in individual stocks is psychologically and academically different than investing in the above funds, according to psychiatrist and colleague Ken Shubin-Stein MD, MPH, MS, CFA who is a professor of finance at the Columbia University Graduate School of Business  When you buy shares of a company, you are putting all your eggs in one basket. If the company does well, your investment will go up in value. If the company does poorly, your investment will go down. Fund diversification helps reduce this risk.

CONCLUSION

Investing in the above fund types will help mitigate single company security risk.

References: 

1. Fenton, Charles, F: Non-Disclosure Agreements and Physician Restrictive Covenants. In, Marcinko, DE and Hetico, HR: Risk Management, Liability Insurance, and Asset Protection Strategies for Doctors and Advisors [Best Practices from Leading Consultants and Certified Medical Planners™]. Productivity Press, New York, 2015.

Readings:

1. Marcinko, DE and Hetico, HR; Comprehensive Financial Planning Strategies for Doctors and Advisors [Best Practices from Leading Consultants and Certified Medical Planners™] Productivity Press, New York, 2017 

2. Marcinko, DE: Dictionary of Health Economics and Finance. Springer Publishing Company, NY 2006

3.  https://www.ft.com

4. Shubin-Stein, Kenneth: Unifying the Psychological and Financial Planning Divide [Holistic Life Planning, Behavioral Economics, Trading Addiction and the Art of Money]. Marcinko, DE and Hetico, HR; Comprehensive Financial Planning Strategies for Doctors and Advisors [Best Practices from Leading Consultants and Certified Medical Planners™] Productivity Press, New York, 2017

COMMENTS APPRECIATED

Like, Subscribe and Refer

EDUCATION: Books

SPEAKING: Dr. Marcinko will be speaking and lecturing, signing and opining, teaching and preaching, storming and performing at many locations throughout the USA this year! His tour of witty and serious pontifications may be scheduled on a planned or ad-hoc basis; for public or private meetings and gatherings; formally, informally, or over lunch or dinner. All medical societies, financial advisory firms or Broker-Dealers are encouraged to submit a RFP for speaking engagements: MarcinkoAdvisors@outlook.com 

***

***

NATIONAL DEBT: Defined

By AI

***

***

The National Debt Explained

The national debt is the amount of money the federal government has borrowed to cover the outstanding balance of expenses incurred over time. In a given fiscal year (FY), when spending (ex. money for roadways) exceeds revenue (ex. money from federal income tax), a budget deficit results. To pay for this deficit, the federal government borrows money by selling marketable securities such as Treasury bonds, bills, notes, floating rate notes, and Treasury inflation-protected securities (TIPS).

ELDERLY CPI: https://medicalexecutivepost.com/2024/07/13/what-is-the-elderly-cpi/

The national debt is the accumulation of this borrowing along with associated interest owed to the investors who purchased these securities. As the federal government experiences reoccurring deficits, which is common, the national debt grows.

MEDICAL DEBT: https://medicalexecutivepost.com/2024/07/25/on-medical-debt/

Simply put, the national debt is similar to a person using a credit card for purchases and not paying off the full balance each month. The cost of purchases exceeding the amount paid off represents a deficit, while accumulated deficits over time represents a person’s overall debt.

STAGFLATION: https://medicalexecutivepost.com/2022/10/14/what-is-stagflation/

COMMENTS APPRECIATED

Like and Subscribe

***

***

AD&D: Insurance Defined

Accidental Death and Dismemberment

By AI

***

***

What is AD&D insurance?

AD&D insurance combines two types of coverage: an accidental death policy that pays out if you die in an accident, and a dismemberment policy that pays out if you have a serious injury such as losing a limb or becoming paralyzed because of an accident. The beneficiary of your AD&D policy (such as your spouse) collects the money in the case of an accidental death, and you collect it if you suffer one of the injuries outlined in the policy.

NATURAL DISASTERS: https://medicalexecutivepost.com/2025/04/15/insurance-natural-disasters/

Here’s the catch: The death or injury must be the direct result of an accident. So, for example, if you have a heart attack while you’re driving and get into a fatal car crash, your beneficiaries probably won’t receive any money.

***

***

While AD&D insurance can offer financial peace of mind to you and your loved ones in the event of an accident, it won’t pay out if you die from natural causes or a terminal illness — so it’s not a replacement for life insurance. And since it doesn’t cover all injuries or disabilities, it isn’t as comprehensive as disability insurance either.

TERM INSURANCE: https://medicalexecutivepost.com/2025/02/05/insurance-term-policy/

Be aware that insurers often sell accidental death insurance without dismemberment coverage. These policies pay out only if you die and won’t cover an accident that leaves you seriously injured but alive.

AGENTS v. BROKERS: https://medicalexecutivepost.com/2025/04/27/insurance-agents-v-brokers/

COMMENTS APPRECIATED

Like and Refer

***

***