Online Safety Community

De-Identification of PHI under HIPAA - Follow the Guidance to Avoid Penalties

Event Details

De-Identification of PHI under HIPAA - Follow the Guidance to Avoid Penalties

Time: October 16, 2017 from 10am to 11:30am
Location: Online
Street: Online
City/Town: Fremont
Website or Map:…
Phone: 8003851607
Event Type: webinar
Organized By: NetZealous LLC-MentorHealth
Latest Activity: Oct 3, 2017

Export to Outlook or iCal (.ics)

Event Description

Training Options  Duration: 90 Minutes  
Monday, October 16, 2017   |   10:00 AM PDT | 01:00 PM EDT

Overview:Today health information needs to be shared more than ever, but how can that be done most easily within the limits of HIPAA? One way is to de-identify the information. Once PHI has been de-identified, it is no longer protected under HIPAA and may be shared freely without limitation. The problem is that it is not easy to truly de-identify information and if it is not done correctly, the sharing of the information may be considered a breach that requires reporting to HHS and the potential for penalties and corrective action plans.

De-identification of Protected Health Information requires removing all eighteen of the listed identifiers, or anything else that might be used to identify the individual about whom the information exists. Or you can have an expert certify that the information is not identifiable. But neither of these is foolproof. You need to look more closely to be sure the data cannot be identified. You may wish to communicate with another provider, or with an agency that is not covered under HIPAA, using plain e-mail, but you want to strip out the name and use a code that both parties understand. Is that sufficient to allow the use of plain e-mail? You need to run though some examples and some tests to make sure before you go ahead.

Why should you Attend: Health information is proliferating and its sharing among health care providers and researchers is necessary for providing health care services and advancing essential health care research. But health information protected under the Health Insurance Portability and Accountability Act of 1996 (HIPAA) is limited in how it can be shared, and when it is shared, is required to be protected.

Areas Covered in the Session:

De-identification and its Rationale
The De-identification Standard
Preparation for De-identification
Guidance on Satisfying the Expert Determination Method
Who is an expert, how do experts assess the risk of identification of information, what are the approaches by which an expert assesses the risk that health information can be identified, and what are the approaches by which an expert mitigates the risk of identification of an individual in health information
Guidance on Satisfying the Safe Harbor Method

Who Will Benefit:
Compliance Director
Privacy Officer
Security Officer
Information Systems Manager
HIPAA Officer
Chief Information Officer
Health Information Manager
Healthcare Counsel/Lawyer
Office Manager
Health Care Researcher

Speaker Profile
Jim Sheldon-Dean is the founder and director of compliance services at Lewis Creek Systems, LLC, a Vermont-based consulting firm founded in 1982, providing information privacy and security regulatory compliance services to a wide variety of health care entities.

Price - $139

Contact Info:
Netzealous LLC -MentorHealth
Phone No: 1-800-385-1607
Fax: 302-288-6884
Webinar Sponsorship:

Comment Wall


RSVP for De-Identification of PHI under HIPAA - Follow the Guidance to Avoid Penalties to add comments!

Join Online Safety Community

Attending (1)

Take our poll!

Take our poll!

Latest Activity

Mark Nilson posted events
17 minutes ago
Adam Fleaming posted a blog post

Good Documentation Practices Relating to USP

Good Documentation Practices (GDP) is a quintessential part of regulated manufacturing and laboratory environments. GDP has to be adhered to in the regulated industries because it is the only truly authentic method of ensuring that documents are audited and accounted for. GDP is also essential to keep track of and maintain control at all stages of the process and the product. GDP is thus a core requirement of a thoroughly developed Quality System. US Pharmacopeia (USP) has laid out a series of…See More
39 minutes ago
Training Doyens posted events
4 hours ago
Mark Nilson posted events


Understanding Data Parallelism in MapReduce

In order to understand the goals of MapReduce, it is important to realize for which scenarios MapReduce is optimized. The MapReduce programming model is created for processing data which requires…Continue

Tags: program, Implementation, Mapreduce

Started by gracylayla Mar 14.

Automation Anywhere. How do I pick a value from dropdown

Automation Anywhere. How do I pick a value from dropdown. I tried 'set text' from a copied variable. Its very slow, and also doesnt…Continue

Tags: anywhere, automation

Started by emmablisa Mar 9.

TensorFlow serving vs TensorFlow service

I have a question regarding the difference between TensorFlow Serving versus TensorFlow service. (Sorry that I'm not familiar with this at all.)I found TensorFlow serving's definition, which is "…Continue

Tags: training, online, tensorflow

Started by emmablisa Feb 27.

Proper maintenance for Hi Vis clothing

Can you tell me how to properly take care of Hi Vis jackets? I recently purchased a few ones from this…Continue

Started by Lily Osborn Feb 25.

Forklift Operator Requirements 1 Reply

At our company we have a lot of forklift traffic that has to share the same aisles as our pedestrians. We limit the speed of our lifts to 3 mph.  I am wanting to find out what requirements for…Continue

Started by Rick Briggs. Last reply by Tony Ferraro Feb 25.



© 2018   Created by Safety Community.   Powered by

Badges  |  Report an Issue  |  Terms of Service