Online Safety Community

Mitigating Risk: How to Prevent HIPAA Data Breaches

Event Details

Mitigating Risk: How to Prevent HIPAA Data Breaches

Time: July 25, 2017 from 10am to 11:30am
Location: Online Event
Street: 161 Mission Falls Lane, Suite 216
City/Town: Fremont
Website or Map: http://www.mentorhealth.com/c…
Phone: 800-385-1607
Event Type: webinar
Organized By: NetZealous LLC-MentorHealth
Latest Activity: May 5, 2017

Export to Outlook or iCal (.ics)

Event Description


Training Options Duration: 90 Minutes
Tuesday, July 25, 2017 | 10:00 AM PDT | 01:00 PM EDT

Overview: The HIPAA Security Rule requires organizations to evaluate risks and vulnerabilities in their environments and to implement reasonable and appropriate security measures to protect against reasonably anticipated threats or hazards to the security or integrity of e-PHI. This is a key step in preventing breaches from occurring.

Another important aspect that will be covered is how to train a workforce and making sure the proper policies and procedures in place. If audited or the subject of a compliance review you will be required to show the government you have all the necessary documentation in place for safeguarding patient Protected Health Information and indicate how you addressed all required security safeguards. This starts with the understanding the fundamentals of a HIPAA compliance.

If your healthcare practice, business, or organization needs to understand best practices and proper security and privacy safeguards, or make sure your current compliance program is adequate and can withstand government scrutiny, please join us for this informative and interactive course.

Why should you Attend: With a substantial increase HIPAA data breaches, organizations must understand the requirements to safeguard protected health information. In 2015, almost 120,000,000 individuals were affected by HIPAA data breaches. This has led to a substantial increase in HIPAA enforcement resulting in much higher fines and penalties. Attendees will leave the course clearly understanding of all the requirements that must be in place for protecting the health records their organizations maintain, create, transmit, or store. After completing this course, a Covered Entity or Business Associate will have a clear understanding for what needs to be place when it comes to preventing HIPAA Data Breaches.

Areas Covered in the Session:

Why was HIPAA created?
Who Must Comply with HIPAA Requirements?
What Privacy Requirements Must be in place?
What are the HIPAA Security and Privacy Rules?
What is a HIPAA Risk Management Plan?
What is meant by "Required"and "Addressable"Implementation Specifications?
What are Administrative, Technical, and Physical Safeguards Requirements?
What is a HIPAA Risk Assessment?
What are HIPAA training requirements?
What is a HIPAA data breach and what happens if it occurs?
What are the penalties and fines for non-compliance and how to avoid them?
HIPAA Breaches -Case Examples
Questions

Who Will Benefit:
Compliance Officer
HIPAA Privacy Officer
HIPAA Security Officer
Medical/Dental Office Managers
Practice Managers
Information Systems Manager
Chief Information Officer
General Counsel/Lawyer
Practice Management Consultants
Any Business Associates that accesses protected Health Information
IT Companies that support Medical/Dental Practices or other Healthcare organizations

Speaker Profile
Jay Hodes president of Colington Security Consulting, LLC, which provides HIPAA consulting services for healthcare providers and business associates. 

Price: $139.00

Contact Info:
Netzealous -MentorHealth
Phone No: 1-800-385-1607
Fax: 302-288-6884
Email: support@mentorhealth.com
Website: http://www.mentorhealth.com/

Comment Wall

Comment

RSVP for Mitigating Risk: How to Prevent HIPAA Data Breaches to add comments!

Join Online Safety Community

Attending (1)

Take our poll!

Take our poll!

Latest Activity

swetha posted a blog post

Nebosh IGC Training course - Chennai

Nebosh course in Chennai can be obtained by the safety individual who is doing work, fresher or any engaged indiviuals. The Nebosh course period is 18 days. As we are offering both class room teaching as well as e-learning training with comprehensive of book resources. If you want to perceive a profession in Health and safety sector GWG will give you a best Nebosh training in Chennani.We are…See More
6 hours ago
Training Doyens posted events
7 hours ago
Tom Clark posted a blog post

5 Reasons Why Teens Get Addicted to Alcohol and Drugs

Teenage can be considered as the most difficult period of life. During the teenage years, boys and girls become so desperate that they can do anything they wish. It is basically a vulnerable time when teens try to navigate the bridge between adulthood and childhood. Teens are the most rebellious and as per the study, this is the reason why they get involved in anti-social activities. Not only that, they often become addicted to drug and alcohol because of their rebellious nature.Now this is not…See More
yesterday
Jam Blanco posted a blog post

Response to Marine Oil Spills

Oil spills can wreak havoc on the environment and cause irreversible damage if they aren’t controlled in a timely manner. However, emergency responders need to be trained to react to emergencies quickly and efficiently to prevent more damage. The type of training they receive should depend on their proximity to the spill and whether they need to stop, contain or recover oil from release.For instance, workers who are assigned as early responders to an oil spill should be given more training…See More
yesterday

Forum

Python Condition Objects Tutorial in 2018

If you have knowledge of other programming languages, then you would know the importance of conditional statements. Conditional statements are required for taking decisions. Whenever we operate the…Continue

Tags: course, certification, training, languages, programming

Started by Elena Lauren Apr 2.

Automation Anywhere. How do I pick a value from dropdown 1 Reply

Automation Anywhere. How do I pick a value from dropdown. I tried 'set text' from a copied variable. Its very slow, and also doesnt…Continue

Tags: anywhere, automation

Started by emmablisa. Last reply by venkatesh Mar 29.

Agile overcome common software security challenges

Paradoxically, security is a negative goal. To secure something, you must understand how insecure it is. Start by trying to break it or by figuring out how other people might break it. The same is…Continue

Tags: agile, scrum, security

Started by nicolewells Mar 23.

Understanding Data Parallelism in MapReduce

In order to understand the goals of MapReduce, it is important to realize for which scenarios MapReduce is optimized. The MapReduce programming model is created for processing data which requires…Continue

Tags: program, Implementation, Mapreduce

Started by gracylayla Mar 14.

TensorFlow serving vs TensorFlow service

I have a question regarding the difference between TensorFlow Serving versus TensorFlow service. (Sorry that I'm not familiar with this at all.)I found TensorFlow serving's definition, which is "…Continue

Tags: training, online, tensorflow

Started by emmablisa Feb 27.

Badge

Loading…

© 2018   Created by Safety Community.   Powered by

Badges  |  Report an Issue  |  Terms of Service