home   genetic news   bioinformatics   biotechnology   literature   journals   ethics   positions   events   sitemap
 
  HUM-MOLGEN -> Events -> Courses and Workshops  
 

HIPAA Risk Analysis: The HIPAA Standard, HIPAA Security rule

 
  December 03, 2012  
     
 
ComplianceOnline, Online Event
2013-01-28


Why Should You Attend:

The Security Standards for the Protection of Electronic Protected Health Information (ePHI), commonly known as the HIPAA Security Rule, establishes national standards for securing patient data that is stored or transferred electronically. But Securing information can give many professionals anxiety and sleepless nights, when attempting to identify the numerous ways breaches can occur. The Security Management Process of the Security Rule indicates risk analysis is a necessary tool in reaching substantial compliance with many standards and implementation specifications.

Attend this webinar which will help you analyze and understand two very specific HIPAA-security compliance assessments, you will be able to develop organizational compliance plans that address both privacy and security within your organization, specifically addressing your ability to secure patient information within your company, in both physical and electronic forums.

When assessing the risks and vulnerabilities associated with PHI and ePHI, there are three key questions health care organizations should ask, before performing a risk analysis.

  1. Can you identify the sources of PHI and ePHI within your organization, including all PHI that you create, receive, maintain or transmit?
  2. What are the external sources of PHI/ePHI?
  3. What are the human, natural, and environmental threats to information systems that contain PHI and ePHI?
This webinar will not only address answering the above referenced questions, but moreover, this discussion will allow you to put these questions/answers in perspective to address your internal and external security needs and devise the most comprehensive plan for your organization’s demands.

 

Areas Covered in the Webinar:

This discussion will provide valuable insight and application to a practical and systematic process to initiate and evaluate your organization’s security practices. Within the hour, we will define how to apply a specific methodology, during a risk assessment and to establish a comprehensive analysis:

  1. System Characterization;
  2. Threat Identification;
  3. Vulnerability Identification;
  4. Control Analysis;
  5. Likelihood Determination;
  6. Impact Analysis;
  7. Risk Determination
  8. Control Recommendations; and
  9. Results Documentation.

Understanding these categories will help you look at the depth of your criticalities and define each vulnerability in terms that will afford your company with an action plan to cure the problem and put in place procedures to lessen and/or alleviate the risk.

 
 
Organized by: ComplianceOnline
Invited Speakers: Coy Murchison, is a Compliance professional with over 10 years of progressive compliance experience. She has experience in health care compliance, as well as, title/escrow and non-profit industries. Coy Murchison is well versed in technology security as it relates to HIPAA. She serves as a consultant for Agilishare, a SharePoint Architectural Company.
 
Deadline for Abstracts: 2013-01-28
 
Registration: http://www.complianceonline.com/ecommerce/control/trainingFocus/~product_id=702605?channel=hum-molgen
E-mail: referral@complianceonline.com
 
   
 
home   genetic news   bioinformatics   biotechnology   literature   journals   ethics   positions   events   sitemap
 
 
 

Generated by meetings and positions 5.0 by Kai Garlipp
WWW: Kai Garlipp, Frank S. Zollmann.
7.0 © 1995- HUM-MOLGEN. All rights reserved. Liability, Copyright and Imprint.