Overview: Data Security Analysis for Healthcare Providers: The "meaningful use" rules relating to the adoption of Electronic Medical Records require regular assessment of data security risks. HIPAA re-contains similar requirements.
However, many healthcare providers fail to take the necessary steps to analyze their security risks or assess their vulnerabilities. This presentation would address ways to conduct a security risk analysis to meet the requirements of HIPAA and the "meaningful use" rules. It will also provide examples of checklists and questionnaires to assist in uncovering and correcting for data risks and preventing potential HIPAA violations.
Why should you attend: Attendees will learn what their risk analysis and security analysis obligations are under HIPAA and the new "meaningful use" rules under the HITECH Act. Attendees will receive questionnaires and checklists that can be adapted for use by a healthcare provider to conduct a targeted risk analysis and meet HITECH and HIPAA requirements.
Areas Covered in the Session:
* "Meaningful Use" data security analysis requirements
* HIPAA risk analysis requirements
* Methods for building a customized analytical tool
* Questionnaires and forms
Who Will Benefit:
* Healthcare providers
* Healthcare privacy officers
* Healthcare security officers
* Hospital administrators
* Physician practice administrators
* Healthcare CFOs
However, many healthcare providers fail to take the necessary steps to analyze their security risks or assess their vulnerabilities. This presentation would address ways to conduct a security risk analysis to meet the requirements of HIPAA and the "meaningful use" rules. It will also provide examples of checklists and questionnaires to assist in uncovering and correcting for data risks and preventing potential HIPAA violations.
Why should you attend: Attendees will learn what their risk analysis and security analysis obligations are under HIPAA and the new "meaningful use" rules under the HITECH Act. Attendees will receive questionnaires and checklists that can be adapted for use by a healthcare provider to conduct a targeted risk analysis and meet HITECH and HIPAA requirements.
Areas Covered in the Session:
* "Meaningful Use" data security analysis requirements
* HIPAA risk analysis requirements
* Methods for building a customized analytical tool
* Questionnaires and forms
Who Will Benefit:
* Healthcare providers
* Healthcare privacy officers
* Healthcare security officers
* Hospital administrators
* Physician practice administrators
* Healthcare CFOs