Online Safety Community

De-Identification of PHI under HIPAA - Follow the Guidance to Avoid Penalties

Event Details

De-Identification of PHI under HIPAA - Follow the Guidance to Avoid Penalties

Time: October 16, 2017 from 10am to 11:30am
Location: Online
Street: Online
City/Town: Fremont
Website or Map: http://www.mentorhealth.com/c…
Phone: 8003851607
Event Type: webinar
Organized By: NetZealous LLC-MentorHealth
Latest Activity: Oct 3

Export to Outlook or iCal (.ics)

Event Description


Training Options  Duration: 90 Minutes  
Monday, October 16, 2017   |   10:00 AM PDT | 01:00 PM EDT

Overview:Today health information needs to be shared more than ever, but how can that be done most easily within the limits of HIPAA? One way is to de-identify the information. Once PHI has been de-identified, it is no longer protected under HIPAA and may be shared freely without limitation. The problem is that it is not easy to truly de-identify information and if it is not done correctly, the sharing of the information may be considered a breach that requires reporting to HHS and the potential for penalties and corrective action plans.

De-identification of Protected Health Information requires removing all eighteen of the listed identifiers, or anything else that might be used to identify the individual about whom the information exists. Or you can have an expert certify that the information is not identifiable. But neither of these is foolproof. You need to look more closely to be sure the data cannot be identified. You may wish to communicate with another provider, or with an agency that is not covered under HIPAA, using plain e-mail, but you want to strip out the name and use a code that both parties understand. Is that sufficient to allow the use of plain e-mail? You need to run though some examples and some tests to make sure before you go ahead.


Why should you Attend: Health information is proliferating and its sharing among health care providers and researchers is necessary for providing health care services and advancing essential health care research. But health information protected under the Health Insurance Portability and Accountability Act of 1996 (HIPAA) is limited in how it can be shared, and when it is shared, is required to be protected.


Areas Covered in the Session:

De-identification and its Rationale
The De-identification Standard
Preparation for De-identification
Guidance on Satisfying the Expert Determination Method
Who is an expert, how do experts assess the risk of identification of information, what are the approaches by which an expert assesses the risk that health information can be identified, and what are the approaches by which an expert mitigates the risk of identification of an individual in health information
Guidance on Satisfying the Safe Harbor Method


Who Will Benefit:
Compliance Director
CEO
CFO
Privacy Officer
Security Officer
Information Systems Manager
HIPAA Officer
Chief Information Officer
Health Information Manager
Healthcare Counsel/Lawyer
Office Manager
Health Care Researcher

Speaker Profile
Jim Sheldon-Dean is the founder and director of compliance services at Lewis Creek Systems, LLC, a Vermont-based consulting firm founded in 1982, providing information privacy and security regulatory compliance services to a wide variety of health care entities.


Price - $139

Contact Info:
Netzealous LLC -MentorHealth
Phone No: 1-800-385-1607
Fax: 302-288-6884
Email: support@mentorhealth.com
Website: http://www.mentorhealth.com/
Webinar Sponsorship: https://www.mentorhealth.com/control/webinar-sponsorship/

Comment Wall

Comment

RSVP for De-Identification of PHI under HIPAA - Follow the Guidance to Avoid Penalties to add comments!

Join Online Safety Community

Attending (1)

Take our poll!

Take our poll!

Latest Activity

Adam Fleaming posted a blog post

When SSARS does and does not Apply to Preparation Engagements

The Statement on Standards for Accounting and Review Services (SSARS) is a section of the professional standards set out by The American Institute of CPA’s (AICPA), seeking to review earlier standards for reviewing and compiling financial statements and setting out the terms of engagement between the CPA’s and the parties. This section has…See More
13 hours ago
John Robinson shared their discussion on Twitter
13 hours ago
John Robinson posted a discussion

Risk Management Solutions

Risk is defined as the potential hazard, harm or side effect of an activity. Almost all activities come with some or another form of risk, which needs to be mitigated or eliminated. Risk management is a major issue for regulatory compliance professionals. Our resources directory is a medium that helps them understand and overcome challenges. A few ISO standards, such as ISO 9004 cover risk management.Risk Management is a key component of ISO 9004:2000There is an intricate link between ISO…See More
13 hours ago
John Robinson posted blog posts
14 hours ago

Forum

Risk Management Solutions

Risk is defined as the potential hazard, harm or side effect of an activity. Almost all activities come with some or another form of risk, which needs to be mitigated or eliminated. Risk management…Continue

Tags: risk, Banking, management, healthcare, Process

Started by John Robinson 13 hours ago.

Occupational Health and Safety 4 Replies

Health and safety are important aspects of an organisation’s smooth and effective functioning.  Did you know that workplace health & safety injuries cost Australian businesses over $60 billion…Continue

Tags: Safety, and, Health, Occupational

Started by WHS Solutions. Last reply by John Robinson yesterday.

Introduction to PEGA-PRPC

Pega/PRPC is a popular rules engine and BPM tool from Pega systems that is gaining good market share among large corporations. Architects and developers build the Pega/PRPC instance while…Continue

Tags: training, course, online, pega

Started by Soujanya Naganuri Oct 6.

Introduction to PEGA-PRPC

Pega/PRPC is a popular rules engine and BPM tool from Pega systems that is gaining good market share among large corporations. Architects and developers build the Pega/PRPC instance while…Continue

Tags: training, course, online, pega

Started by Soujanya Naganuri Oct 6.

Introduction to PEGA-PRPC

Pega/PRPC is a popular rules engine and BPM tool from Pega systems that is gaining good market share among large corporations. Architects and developers build the Pega/PRPC instance while…Continue

Tags: training, course, online, pega

Started by Soujanya Naganuri Oct 6.

Badge

Loading…

© 2017   Created by Safety Community.   Powered by

Badges  |  Report an Issue  |  Terms of Service