Online Safety Community

De-Identification of PHI under HIPAA - Follow the Guidance to Avoid Penalties

Event Details

De-Identification of PHI under HIPAA - Follow the Guidance to Avoid Penalties

Time: October 16, 2017 from 10am to 11:30am
Location: Online
Street: Online
City/Town: Fremont
Website or Map: http://www.mentorhealth.com/c…
Phone: 8003851607
Event Type: webinar
Organized By: NetZealous LLC-MentorHealth
Latest Activity: Oct 3

Export to Outlook or iCal (.ics)

Event Description


Training Options  Duration: 90 Minutes  
Monday, October 16, 2017   |   10:00 AM PDT | 01:00 PM EDT

Overview:Today health information needs to be shared more than ever, but how can that be done most easily within the limits of HIPAA? One way is to de-identify the information. Once PHI has been de-identified, it is no longer protected under HIPAA and may be shared freely without limitation. The problem is that it is not easy to truly de-identify information and if it is not done correctly, the sharing of the information may be considered a breach that requires reporting to HHS and the potential for penalties and corrective action plans.

De-identification of Protected Health Information requires removing all eighteen of the listed identifiers, or anything else that might be used to identify the individual about whom the information exists. Or you can have an expert certify that the information is not identifiable. But neither of these is foolproof. You need to look more closely to be sure the data cannot be identified. You may wish to communicate with another provider, or with an agency that is not covered under HIPAA, using plain e-mail, but you want to strip out the name and use a code that both parties understand. Is that sufficient to allow the use of plain e-mail? You need to run though some examples and some tests to make sure before you go ahead.


Why should you Attend: Health information is proliferating and its sharing among health care providers and researchers is necessary for providing health care services and advancing essential health care research. But health information protected under the Health Insurance Portability and Accountability Act of 1996 (HIPAA) is limited in how it can be shared, and when it is shared, is required to be protected.


Areas Covered in the Session:

De-identification and its Rationale
The De-identification Standard
Preparation for De-identification
Guidance on Satisfying the Expert Determination Method
Who is an expert, how do experts assess the risk of identification of information, what are the approaches by which an expert assesses the risk that health information can be identified, and what are the approaches by which an expert mitigates the risk of identification of an individual in health information
Guidance on Satisfying the Safe Harbor Method


Who Will Benefit:
Compliance Director
CEO
CFO
Privacy Officer
Security Officer
Information Systems Manager
HIPAA Officer
Chief Information Officer
Health Information Manager
Healthcare Counsel/Lawyer
Office Manager
Health Care Researcher

Speaker Profile
Jim Sheldon-Dean is the founder and director of compliance services at Lewis Creek Systems, LLC, a Vermont-based consulting firm founded in 1982, providing information privacy and security regulatory compliance services to a wide variety of health care entities.


Price - $139

Contact Info:
Netzealous LLC -MentorHealth
Phone No: 1-800-385-1607
Fax: 302-288-6884
Email: support@mentorhealth.com
Website: http://www.mentorhealth.com/
Webinar Sponsorship: https://www.mentorhealth.com/control/webinar-sponsorship/

Comment Wall

Comment

RSVP for De-Identification of PHI under HIPAA - Follow the Guidance to Avoid Penalties to add comments!

Join Online Safety Community

Attending (1)

Take our poll!

Take our poll!

Latest Activity

Training Doyens posted events
Friday
Soujanya Naganuri posted a discussion

Flow of SAP MM and SUS Portal

SAP Material Management (MM) and SAP Supplier Self Service (SUS) and some customizable features of SAP SUS.In the Plan-Driven Procurement with Supplier Integration scenario the SAP SUS is installed and configured with SAP MM/SRM. Technically, in a classic scenario SAP SUS maybe connected with one or more MM and/or SRM back-end systems.PO is sent to SAP SUS system, in which supplier can perform the follow-on procurement process, i.e. PO response, ASN, GR response and invoice response.SAP…See More
Thursday
John Robinson posted blog posts
Thursday
Emma Miah posted a blog post

Latest Men’s Fashion Trends For Winter

Most people will agree that fashion trends use to fade, but the style is the one thing that is eternal. So, it’s always suggested that you should only follow the fashion trends that actually suits your personality. Winter is coming now it’s time to…See More
Thursday

Forum

Flow of SAP MM and SUS Portal

SAP Material Management (MM) and SAP Supplier Self Service (SUS) and some customizable features of SAP SUS.In the Plan-Driven Procurement with Supplier Integration scenario the SAP SUS is installed…Continue

Tags: sapmmcourse, sapmmonline, sapmm

Started by Soujanya Naganuri on Thursday.

PEGA Axis error: Parser already accessed

We have a PEGA frontend, from in which we're keying in double byte characters like japanese and being send to allotted java webservice through axis. this is working best when we ship singlebyte…Continue

Tags: pega_training, pega_online, pega

Started by Soujanya Naganuri Dec 6.

VMware player error on install vmware tools.

 I've installed the last version of VMware player (4.0.2) and created a virtual machine with ubuntu 10.04. However, some operations with …Continue

Tags: training, online, vmware

Started by emmablisa Dec 1.

All About QlikView

QlikViewQlik relies on sophisticated analytics that enables data discovery using an in-memory engine to analyze data for patterns not visible via SQL data structures or queries. The company’s two…Continue

Tags: Safety, Qlikview

Started by nicolewells Nov 25.

Occupational Health and Safety 5 Replies

Health and safety are important aspects of an organisation’s smooth and effective functioning.  Did you know that workplace health & safety injuries cost Australian businesses over $60 billion…Continue

Tags: Safety, and, Health, Occupational

Started by WHS Solutions. Last reply by Tara safe Nov 16.

Badge

Loading…

© 2017   Created by Safety Community.   Powered by

Badges  |  Report an Issue  |  Terms of Service