Overview: If you handle any electronic patient information, don't miss this teleconference on compliance with the extensive requirements for policies and procedures in the HIPAA security regulation.
Electronic patient information is everywhere; not only is electronic protected health information in the obvious places such as practice management systems and electronic medical records, but also in less obvious places such as copiers, printers, scanners, cell phones, and portable data devices. All entities covered under HIPAA must take special care of electronic patient health information, including establishing policies and procedures to protect all kinds of PHI and taking regular actions as part of a security management process.
Proposed changes and expansions to HIPAA, going into effect in 2011, dramatically expand the types of entities to which the regulations directly apply, which means that more entities than ever need to adopt the proper HIPAA Security policies and procedures to be in compliance.
HHS compliance audit activity and enforcement penalties are both increased, especially in instances of willful neglect of compliance, if, for instance, your organization hasn't adopted the complete suite of information security policies and procedures needed for compliance.
Learn what it takes to get in compliance and stay there, even as your operations and environment change. Find out what administrative, physical and technical safeguards are necessary and what policies they call for, and how you decide what's right for HIPAA security compliance for your organization. This teleconference will provide the background and details necessary to develop an understanding of the origins of the HIPAA security regulation and the process used in complying with the rule, which leads, inevitably, to the adoption of policies and procedures.
With the expansion of electronic devices and systems in use for health care, remote access and use of data now require special attention to secure protected health information, and special policies and procedures as well, especially now that portable devices are a leading cause of information security breaches.
If you are asked by the US Department of Health and Human Services to show that you are in compliance with the HIPAA security regulation, you will need to show that you have the proper policies and procedures in place as required by the rules and that you have been using them. This teleconference will lay out a structure for the set of policies needed and identify the topic areas that policies should include, making it easier to deal with the dozens of policy details that are required.
Areas Covered in the Session:
* Find out what are the requirements for policies and procedures and why they're a good thing.
* Learn how having good policies and procedures and good documentation can make compliance easier.
* Learn the set of policies that need to be included in four groups of policies: Information Security Management Process, Acces Controls, Data Management, and the Information System User Policy.
* Learn how to use your policies and procedures, and the documentation of use of your policies and procedures, to satisfy audit requirements and avoid penalties.
* Find out about scaling your policies to fit your organization - one size does not fit all!
* Learn with the significant penalties are for non-compliance with policy and procedure requirements.
* Find out what are the first steps to take in developing your polciies and procedures for HIPAA Security compliance.
Who Will Benefit:
* Compliance director
* CEO
* CFO
* Privacy Officer
* Security Officer
* Information Systems Manager
* HIPAA Officer
* Chief Information Officer
* Health Information Manager
* Healthcare Counsel/lawyer
* Office Manager
* Contracts Manager
Price List:
Live : $245.00
Corporate live : $995.00
Recorde
Electronic patient information is everywhere; not only is electronic protected health information in the obvious places such as practice management systems and electronic medical records, but also in less obvious places such as copiers, printers, scanners, cell phones, and portable data devices. All entities covered under HIPAA must take special care of electronic patient health information, including establishing policies and procedures to protect all kinds of PHI and taking regular actions as part of a security management process.
Proposed changes and expansions to HIPAA, going into effect in 2011, dramatically expand the types of entities to which the regulations directly apply, which means that more entities than ever need to adopt the proper HIPAA Security policies and procedures to be in compliance.
HHS compliance audit activity and enforcement penalties are both increased, especially in instances of willful neglect of compliance, if, for instance, your organization hasn't adopted the complete suite of information security policies and procedures needed for compliance.
Learn what it takes to get in compliance and stay there, even as your operations and environment change. Find out what administrative, physical and technical safeguards are necessary and what policies they call for, and how you decide what's right for HIPAA security compliance for your organization. This teleconference will provide the background and details necessary to develop an understanding of the origins of the HIPAA security regulation and the process used in complying with the rule, which leads, inevitably, to the adoption of policies and procedures.
With the expansion of electronic devices and systems in use for health care, remote access and use of data now require special attention to secure protected health information, and special policies and procedures as well, especially now that portable devices are a leading cause of information security breaches.
If you are asked by the US Department of Health and Human Services to show that you are in compliance with the HIPAA security regulation, you will need to show that you have the proper policies and procedures in place as required by the rules and that you have been using them. This teleconference will lay out a structure for the set of policies needed and identify the topic areas that policies should include, making it easier to deal with the dozens of policy details that are required.
Areas Covered in the Session:
* Find out what are the requirements for policies and procedures and why they're a good thing.
* Learn how having good policies and procedures and good documentation can make compliance easier.
* Learn the set of policies that need to be included in four groups of policies: Information Security Management Process, Acces Controls, Data Management, and the Information System User Policy.
* Learn how to use your policies and procedures, and the documentation of use of your policies and procedures, to satisfy audit requirements and avoid penalties.
* Find out about scaling your policies to fit your organization - one size does not fit all!
* Learn with the significant penalties are for non-compliance with policy and procedure requirements.
* Find out what are the first steps to take in developing your polciies and procedures for HIPAA Security compliance.
Who Will Benefit:
* Compliance director
* CEO
* CFO
* Privacy Officer
* Security Officer
* Information Systems Manager
* HIPAA Officer
* Chief Information Officer
* Health Information Manager
* Healthcare Counsel/lawyer
* Office Manager
* Contracts Manager
Price List:
Live : $245.00
Corporate live : $995.00
Recorde