Professional Documents
Culture Documents
Live Webinar on
Overview:
Day One: Research of Your Operations - How do you use PHI and what policies and procedures do
you have for Privacy, Security, and Breach Notification? Understand your operations and information
flows, and the ways you use or disclose PHI.
Day Two: Limitations on Uses and Disclosures - Establish the proper limitations according to the Privacy
Rule, including requirements for Business Associates, handling authorizations, and required processes for
uses and disclosures of PHI under HIPAA.
Day Three: Patient Rights under HIPAA - Make sure the processes are defined and in place for
providing opportunities to access, amend, and restrict uses of PHI, to ask for an accounting of disclosures
of PHI, to request alternative means or methods of communication, and to receive a Notice of Privacy
Practices.
Day Four: HIPAA Risk Analysis - Look at how you handle information, identify the risk issues, and
decide their priority for mitigation.
Day Five: HIPAA Security Safeguards - Decide what safeguards you will use to address the various
Security issues and start implementing physical, technical, and administrative safeguards.
Day Six: HIPAA Security and Breach Notification Policies and Procedures - Adopt a thorough process
for managing, evaluating, and acting on any incidents involving PHI and breaches of PHI.
Day Seven: Documentation of Policies and Procedures - All the things you've been doing need to be
properly documented so you can show compliance. Just creating documentation alone is easily a day's
work.
Day Eight: Training in Policies and Procedures Related to HIPAA - Once you have your HIPAA policies
and procedures ready, you can begin training staff on your own policies and procedures relating to
privacy, security, and breach notification.
Day Nine: Verification and Audits of Compliance - Implementation of HIPAA Privacy, Security, and
Breach Notification compliance should be regularly evaluated to ensure that policies are being followed
and systems are secured.
Day Ten: Long Term Compliance Planning and Risk Management - To establish and maintain
compliance, it is essential to implement one- time actions, to schedule compliance activities that should
take place regularly, and to identify that which can trigger the need for security maintenance and risk
management activities.
Why should you Attend:It is essential today to regularly review your HIPAA compliance to make sure you are staying
up with rule changes and are prepared to answer questions from inspectors or investigators. This 90- minute
session will step through the basics of HIPAA compliance and identify current compliance issues that should be
addressed to ensure a clean report in any reviews. The topic of HIPAA compliance will be covered in a format of "10
Days to HIPAA Compliance" wherein focusing the work to be done according to 10 topic areas helps ensure the
essential issues are considered. While compliance may take more than 10 days of effort depending on the
organization, the 10 topic areas focus the work of the HIPAA Privacy or Security Officer so that progress in
compliance can be made and documented.
Being in compliance with HIPAA involves not only ensuring you provide the appropriate patient rights and controls on
your uses and disclosures, but also that you ensure you have the right policies, procedures, and documentation,
and have performed the appropriate analysis of the risks to the confidentiality, integrity, and availability of electronic
Protected Health Information. Doing so is essential to protect your PHI from exposure through accidental acts, such
as a loss of a device holding data, or intentional acts, including the recent increases in attacks of health information
by hackers.
The session will include a discussion of the various HIPAA- defined safeguards that must be considered, and the
kinds of policies and procedures that must me implemented, in order to properly comply with the rules and protect
the privacy and security of PHI from accidental or intentional exposure, misuse, or improper disclosure.
Jim Sheldon-Dean
l Compliance Director is the founder and director of compliance services at Lewis
l CEO Creek Systems, LLC, a Vermont-based consulting firm
l CFO founded in 1982, providing information privacy and security
regulatory compliance services to a wide variety of health
l Privacy Officer
care entities. Sheldon-Dean serves on the HIMSS
l Security Officer Information Systems Security Workgroup, has co-chaired
l Information Systems Manager the Workgroup for Electronic Data Interchange Privacy and
l HIPAA Officer Security Workgroup, and is a recipient of the WEDI 2011
Award of Merit. He is a frequent speaker regarding HIPAA
l Chief Information Officer and information privacy and security compliance issues at
l Health Information Manager seminars and conferences, including speaking
l Healthcare Counsel/Lawyer engagements at numerous regional and national
healthcare association conferences and conventions and
l Office Manager
the annual NIST/OCR HIPAA Security Conference in
Washington, D.C. ... more
Click here to register for this webinar Suggest a Topic More Webinars
It would be really nice if you can circulate this mail to all your deserving colleagues who can immensely benefit
from this program.
For more information, please contact the event coordinator. We look forward to seeing you at the webinar.
Best regards,
Event-coordinator
MentorHealth
About MentorHealth
MentorHealth is a comprehensive training source for healthcare professionals. Our trainings are high on value, but not on cost.
MentorHealth is the right training solution for healthcare professionals. With MentorHealth, healthcare professionals can make use
of the best benefits relating to their professional training.
MentorHealth
www.mentorhealth.com
161 Mission Falls Lane,, Suite 216, Fremont, CA 94539, USA.
Phone: 800-385-1607 or
Fax your PO to: 302-288-6884
If you do not wish to receive this training alerts from MentorHealth Click Unsubscribe