Agenda Discovery Week Month

Curated for Me

How to Ensure your HIPAA Compliance is Up to Date

MentorHealth
Write a Review
Select your rating. ( ) ( ) ( ) ( ) ( )
Endorsed by Curators:
Jan 29 10:00AM - 11:30AM
Overview:

Day One: Research of Your Operations - How do you use PHI and what policies and procedures do you have for Privacy, Security, and Breach Notification? Understand your operations and information flows, and the ways you use or disclose PHI.

Day Two: Limitations on Uses and Disclosures - Establish the proper limitations according to the Privacy Rule, including requirements for Business Associates, handling authorizations, and required processes for uses and disclosures of PHI under HIPAA.Day Three: Patient Rights under HIPAA - Make sure the processes are defined and in place for providing opportunities to access, amend, and restrict uses of PHI, to ask for an accounting of disclosures of PHI, to request alternative means or methods of communication, and to receive a Notice of Privacy Practices.Day Four: HIPAA Risk Analysis - Look at how you handle information, identify the risk issues, and decide their priority for mitigation.Day Five: HIPAA Security Safeguards - Decide what safeguards you will use to address the various Security issues and start implementing physical, technical, and administrative safeguards.Day Six: HIPAA Security and Breach Notification Policies and Procedures - Adopt a thorough process for managing, evaluating, and acting on any incidents involving PHI and breaches of PHI.Day Seven: Documentation of Policies and Procedures - All the things you've been doing need to be properly documented so you can show compliance. Just creating documentation alone is easily a day's work.Day Eight: Training in Policies and Procedures Related to HIPAA - Once you have your HIPAA policies and procedures ready, you can begin training staff on your own policies and procedures relating to privacy, security, and breach notification.Day Nine: Verification and Audits of Compliance - Implementation of HIPAA Privacy, Security, and Breach Notification compliance should be regularly evaluated to ensure that policies are being followed and systems are secured.Day Ten: Long Term Compliance Planning and Risk Management - To establish and maintain compliance, it is essential to implement one- time actions, to schedule compliance activities that should take place regularly, and to identify that which can trigger the need for security maintenance and risk management activities.Why you should Attend:It is essential today to regularly review your HIPAA compliance to make sure you are staying up with rule changes and are prepared to answer questions from inspectors or investigators. This 90- minute session will step through the basics of HIPAA compliance and identify current compliance issues that should be addressed to ensure a clean report in any reviews. The topic of HIPAA compliance will be covered in a format of "10 Days to HIPAA Compliance" wherein focusing the work to be done according to 10 topic areas helps ensure the essential issues are considered. While compliance may take more than 10 days of effort depending on the organization, the 10 topic areas focus the work of the HIPAA Privacy or Security Officer so that progress in compliance can be made and documented.Being in compliance with HIPAA involves not only ensuring you provide the appropriate patient rights and controls on your uses and disclosures, but also that you ensure you have the right policies, procedures, and documentation, and have performed the appropriate analysis of the risks to the confidentiality, integrity, and availability of electronic Protected Health Information. Doing so is essential to protect your PHI from exposure through accidental acts, such as a loss of a device holding data, or intentional acts, including the recent increases in attacks of health information by hackers.The session will include a discussion of the various HIPAA- defined safeguards that must be considered, and the kinds of policies and procedures that must me implemented, in order to properly comply with the rules and protect the privacy and security of PHI from accidental or intentional exposure, misuse, or improper disclosure.Areas Covered in the Session:

Find out how to relate your office's activities to the regulationsLearn what are the ways you can share information under HIPAA, and the ways you may notFind out about HIPAA requirements for access and patient preferences, as well as the requirements to protect PHILearn how to use an information security management process to evaluate risks and make decisions about how best to protect PHI and meet patient needs and desiresFind out what policies and procedures you should have in place for dealing with e- mail and texting, as well as any new technologyLearn about the training and education that must take place to ensure your staff uses e- mail and texting properly and does not risk exposure of PHIFind out the steps that must be followed in the event of a breach of PHILearn about how the HIPAA audit and enforcement activities are now being increased and what you need to do to survive a HIPAA audit

Who Will Benefit:

Compliance DirectorCEOCFOPrivacy OfficerSecurity OfficerInformation Systems ManagerHIPAA OfficerChief Information OfficerHealth Information ManagerHealthcare Counsel/LawyerOffice Manager

Speaker ProfileJim Sheldon-Deanis the founder and director of compliance services at Lewis Creek Systems, LLC, a Vermont-based consulting firm founded in 1982, providing information privacy and security regulatory compliance services to a wide variety of health care entities.

Event link:https://www.mentorhealth.com/webinar/--801888LIVE?channel=tickettailor-JAN_2020_SEObr>
Contact Info:

Netzealous LLC - MentorHealth

Phone No: 1-800-385-1607

Fax: 302-288-6884

Email: mentorhealth84@gmail.com

Website: http://www.mentorhealth.com/br>

Upcoming Events

Write a Review
Select your rating. ( ) ( ) ( ) ( ) ( )
×
Endorsed by Curators:
Stark & Anti-Kickback Issues

Stark & Anti-Kickback Issues

Feb 05 10:00AM - 11:00AM
Overview:The presentation will provide an overview of the Federal Stark and Anti-Kickback laws and corresponding regulations including the history and purpose of these laws.The presenter will provide…
 
Write a Review
Select your rating. ( ) ( ) ( ) ( ) ( )
×
Endorsed by Curators:
Online Webinar on Reimbursement Explained

Online Webinar on Reimbursement Explained

Feb 06 10:00AM - 11:30AM
Overview:Healthcare reimbursement systems can be complex and difficult to understand. Each payor may use a different method to reimburse providers, or they may use a variation of a commonly used…
 
Write a Review
Select your rating. ( ) ( ) ( ) ( ) ( )
×
Endorsed by Curators:
HIPAA, Consents, and 42 CFR Part 2 - Tracking the Release of Information Under Conflicting Rules

HIPAA, Consents, and 42 CFR Part 2 - Tracking the Release of Information Under Conflicting Rules

Feb 10 10:00AM - 11:00AM
Overview:For much of healthcare, HIPAA sets the standards for how to manage uses and disclosures of patient information, known as Protected Health Information (PHI).But when it comes to information…