Online Safety Community

Mitigating Risk: How to Prevent HIPAA Data Breaches

Event Details

Mitigating Risk: How to Prevent HIPAA Data Breaches

Time: July 25, 2017 from 10am to 11:30am
Location: Online Event
Street: 161 Mission Falls Lane, Suite 216
City/Town: Fremont
Website or Map: http://www.mentorhealth.com/c…
Phone: 800-385-1607
Event Type: webinar
Organized By: NetZealous LLC-MentorHealth
Latest Activity: May 5, 2017

Export to Outlook or iCal (.ics)

Event Description


Training Options Duration: 90 Minutes
Tuesday, July 25, 2017 | 10:00 AM PDT | 01:00 PM EDT

Overview: The HIPAA Security Rule requires organizations to evaluate risks and vulnerabilities in their environments and to implement reasonable and appropriate security measures to protect against reasonably anticipated threats or hazards to the security or integrity of e-PHI. This is a key step in preventing breaches from occurring.

Another important aspect that will be covered is how to train a workforce and making sure the proper policies and procedures in place. If audited or the subject of a compliance review you will be required to show the government you have all the necessary documentation in place for safeguarding patient Protected Health Information and indicate how you addressed all required security safeguards. This starts with the understanding the fundamentals of a HIPAA compliance.

If your healthcare practice, business, or organization needs to understand best practices and proper security and privacy safeguards, or make sure your current compliance program is adequate and can withstand government scrutiny, please join us for this informative and interactive course.

Why should you Attend: With a substantial increase HIPAA data breaches, organizations must understand the requirements to safeguard protected health information. In 2015, almost 120,000,000 individuals were affected by HIPAA data breaches. This has led to a substantial increase in HIPAA enforcement resulting in much higher fines and penalties. Attendees will leave the course clearly understanding of all the requirements that must be in place for protecting the health records their organizations maintain, create, transmit, or store. After completing this course, a Covered Entity or Business Associate will have a clear understanding for what needs to be place when it comes to preventing HIPAA Data Breaches.

Areas Covered in the Session:

Why was HIPAA created?
Who Must Comply with HIPAA Requirements?
What Privacy Requirements Must be in place?
What are the HIPAA Security and Privacy Rules?
What is a HIPAA Risk Management Plan?
What is meant by "Required"and "Addressable"Implementation Specifications?
What are Administrative, Technical, and Physical Safeguards Requirements?
What is a HIPAA Risk Assessment?
What are HIPAA training requirements?
What is a HIPAA data breach and what happens if it occurs?
What are the penalties and fines for non-compliance and how to avoid them?
HIPAA Breaches -Case Examples
Questions

Who Will Benefit:
Compliance Officer
HIPAA Privacy Officer
HIPAA Security Officer
Medical/Dental Office Managers
Practice Managers
Information Systems Manager
Chief Information Officer
General Counsel/Lawyer
Practice Management Consultants
Any Business Associates that accesses protected Health Information
IT Companies that support Medical/Dental Practices or other Healthcare organizations

Speaker Profile
Jay Hodes president of Colington Security Consulting, LLC, which provides HIPAA consulting services for healthcare providers and business associates. 

Price: $139.00

Contact Info:
Netzealous -MentorHealth
Phone No: 1-800-385-1607
Fax: 302-288-6884
Email: support@mentorhealth.com
Website: http://www.mentorhealth.com/

Comment Wall

Comment

RSVP for Mitigating Risk: How to Prevent HIPAA Data Breaches to add comments!

Join Online Safety Community

Attending (1)

Take our poll!

Take our poll!

Latest Activity

Mark Nilson posted events
5 hours ago
gracylayla posted a blog post

What Are The Search Commands In Splunk?

The Splunk Commands are one of the programming commands which makes your search processing simple with the subset of language by the Splunk Enterprise commands. These commands are used to transform the values of the specified cell into numeric values. The following are the listed Splunk Search commands that are sorted according to the various categories.Correlation:These are one of the commands which can be used…See More
6 hours ago
Training Doyens posted events
7 hours ago
Jam Blanco posted a blog post

Communication Towers: Commonly Encountered Hazards

Workers who maintain or install communication towers have to climb towers with the aid of ladders and other support structures. Their workplace is about 100 feet in the air in excess of 2000 feet and they have to work in all weather conditions.Needless to say, workers who work on communication towers are constantly exposed to a number of hazards. Some of the common ones include:ElectrocutionFallsFalling object hazardsEquipment failureDetrimental weather conditionsStructural failure of…See More
8 hours ago

Forum

5 TECHNOLOGY-BASED LONE WORKER SAFETY SOLUTIONS

ABOUT 75% OF EMPLOYEES IN NORTH AMERICA ARE MOBILE WORKERS. ADVANCES IN COMMUNICATIONS TECHNOLOGY MEANS THESE WORKERS CAN WORK ANYWHERE AT ANY TIME. THESE NEW TECHNOLOGIES ALSO MEAN THESE MOBILE…Continue

Tags: Solutions, People, IoT, Monitoring, Remote

Started by Jen McDade May 31.

Road Safety Solutions 14 Replies

The Road Safety Signs ,Barriers,Humps,Hazard Markers and Visual Warnings are some of the important marks to be observed. Signs such as "keep left",stop, "give way" should not be casually treated.…Continue

Tags: safety, gear, wear, Equipment, &

Started by Enna Henry. Last reply by Jen McDade May 31.

Remote Monitoring

Get "Safe Assets and Sound Productivity" Through Remote Monitoring.Visit:…Continue

Tags: Solutions, People, IoT, Monitoring, Remote

Started by Jen McDade May 23.

Python Condition Objects Tutorial in 2018 1 Reply

If you have knowledge of other programming languages, then you would know the importance of conditional statements. Conditional statements are required for taking decisions. Whenever we operate the…Continue

Tags: course, certification, training, languages, programming

Started by Elena Lauren. Last reply by Jim Chesters May 15.

Power BI Visualization Types

Visualizations in Power BI displays the visual insights from a data. In power bi service a visual can be pinned from reports to create dashboards. Visuals are used in reports.List of visualizations…Continue

Tags: COURSE, TRAINING, BI, POWER

Started by Azharuddin May 15.

Badge

Loading…

© 2018   Created by Safety Community.   Powered by

Badges  |  Report an Issue  |  Terms of Service