home   genetic news   bioinformatics   biotechnology   literature   journals   ethics   positions   events   sitemap
 
  HUM-MOLGEN -> Events -> Meetings and Conferences  
 

Complying with HIPAA Security Rules: What's in the rules and how you can most easily prepare for compliance - Webinar By GlobalCompliancePanel

 
  December 06, 2010  
     
 
GlobalCompliancePanel, Online Training Webinar
2011-02-22


Overview: If you handle any electronic patient information, don't miss this teleconference on compliance with the HIPAA security regulation.

Electronic patient information is everywhere; not only is electronic protected health information in the obvious places such as practice management systems and electronic medical records, but also in less obvious places such as copiers, printers, scanners, cell phones, and portable data devices.

Why you should attend: The HIPAA Security Rule, in place and as proposed in amendments going into effect in 2011, calls for all Covered Entities and Business Associates, and their subcontractors, to be in compliance with provisions protecting all kinds of electronic protected health information. While many entities have gone through the processes necessary for HIPAA Security Rule compliance, many are only partially in compliance and have not performed all the steps necessary for compliance. Many may be doing many of the right things for compliance, but have not documented their policies and procedures and compliance activities as required. And many may be exposing themselves to potential breaches of security because of inadequate security practices. Now there are new, increased penalties for HIPAA violations and a new auditing process is being developed so that HIPAA covered entities will be subject to reviews by the US Department of Health and Human Services' Office for Civil Rights even if no one files a complaint. If you haven't done what’s required under the HIPAA Security Rule, you could be liable for willful neglect penalties that begin at $10,000 minimum and go up from there. You need to be sure that you have completed an information flow analysis and a risk analysis and put in place the proper protections to secure protected health information, and documented all your policies and procedures, as well as any actions taken pursuant to your policies and procedures. What's more, with the breach notification regulations established in 2009, the costs of not properly securing your data have increased dramatically. With the ever-increasing use of electronic records and systems, and changes in how you do business, now is the time to review and renew your information security program and avoid violations and penalties for non-compliance.

Areas Covered In the Seminar:
  • Learn what kinds of entities are now covered under the HIPAA Security Rule
  • Find out how the rules have changed and will continue to change
  • See the questions you are likely to be asked in a HIPAA Security compliance audit
  • Learn how to go about developing and implementing your compliance plan
  • Discover how information flow analysis and risk analysis can make sense of your compliance objectives
  • Find out about the special security challenges of remote access and portable devices
  • Come away with a six-step plan to organize your security compliance project
Agenda:
  • Information Security Requirements Under HIPAA
    • The Regulatory Background of HIPAA
    • Overview of Security Requirements
    • Recent Changes to HIPAA Security Requirements
    • Structure of the HIPAA Security Regulation
  • The Security Rule Compliance Process
    • Concepts of Compliance with the Security Rule
    • Flexibility Provisions - one size does not fit all
    • The Six-Step Compliance Plan
    • The HIPAA Security Safeguards
    • Being Prepared for Breach Notification
  • Information Flows and Risk Analysis
    • Why Information Flow Analysis and Risk Analysis Are Essential
    • Concepts of Information Flow Analysis and Risk Analysis
    • Planning Your Compliance Process
Who will benefit:
  • Compliance director
  • CEO
  • CFO
  • Privacy Officer
  • Security Officer
  • Information Systems Manager
  • Office Manager
 
 
Organized by: GlobalCompliancePanel
Invited Speakers: Jim Sheldon-Dean is the founder and director of compliance services at Lewis Creek Systems, LLC, a Vermont-based consulting firm founded in 1982, providing information privacy and security regulatory compliance services to health care firms and businesses throughout the Northeast and nationally. Sheldon-Dean’s firm provides a variety of advisory, training, assessment, policy development, project management and mitigation services for a number of health care providers, businesses, universities, small and large hospitals, urban and rural mental health and social service agencies, health insurance plans and health care business associates.
 
Deadline for Abstracts: 2011-02-22
 
Registration:
Tuesday, February 22, 2011  
10:00 AM PST | 01:00 PM EST
Live live online training only for one participant
Price: $165.00
 
 
 
Corporate Live 4 to 10 participants from a single location (For multiple locations contact Customer Care)
Price: $695.00
 

Recorded Access recorded version only for one participant; unlimited viewing for 6 months ( Access information will be emailed 24 hours after the completion of live webinar)
Price: $215.00
E-mail: webinars@globalcompliancepanel.com
 
   
 
home   genetic news   bioinformatics   biotechnology   literature   journals   ethics   positions   events   sitemap
 
 
 

Generated by meetings and positions 5.0 by Kai Garlipp
WWW: Kai Garlipp, Frank S. Zollmann.
7.0 © 1995- HUM-MOLGEN. All rights reserved. Liability, Copyright and Imprint.