Online Safety Community

Webinar on Understand the HIPAA Security & Privacy Rules

Event Details

Webinar on Understand the HIPAA Security & Privacy Rules

Time: November 22, 2017 from 10am to 11:30am
Location: Online
Street: 161 Mission Falls Lane, Suite 216
City/Town: Fremont
Website or Map: http://www.mentorhealth.com/c…
Phone: 8003851607
Event Type: webinar
Organized By: Netzealous LLC -MentorHealth
Latest Activity: Oct 10, 2017

Export to Outlook or iCal (.ics)

Event Description

Overview:    Being in compliance with HIPAA involves not only ensuring you provide the appropriate patient rights and controls on your uses and disclosures of protected health information, but you also have the proper policies and procedures in place. If audited or the subject of a compliance review you will be required to show the government you have all the necessary documentation in place for safeguarding patient Protected Health Information and indicate how you addressed all required security safeguards. This starts with the understanding the fundamentals of the HIPAA Security & Privacy Rules.

If your healthcare practice, business, or organization needs to understand what is required to protect health records or make sure your current safeguards are adequate and can withstand government scrutiny, please join us for this informative and interactive course.

Why should you Attend: With a substantial increase HIPAA data breaches and increased government enforcement, organizations must understand the HIPAA Security & Privacy Rules Attendees will leave the course clearly understanding of all the requirements that must be in place for meeting these rules for the protection of personal health information their organizations maintain, create, transmit, or store. After completing this course, a Covered Entity or Business Associate will have a clear understanding for what needs to be place when it comes to meeting these HIPAA rules.

Areas Covered in the Session:

Why was HIPAA created?
Who Must Comply with HIPAA Requirements?
What are the HIPAA Security and Privacy Rules?
What is a HIPAA Risk Management Plan?
What is meant by "Required" and "Addressable" Implementation Specifications?
What are Administrative, Technical, and Physical Safeguards Requirements?
What is a HIPAA Risk Assessment?
What are HIPAA training requirements?
What is a HIPAA data breach and what happens if it occurs?
What are the penalties and fines for non-compliance and how to avoid them?
Creating a Culture of Compliance
Questions

Who Will Benefit:
Compliance Officer
HIPAA Privacy Officer
HIPAA Security Officer
Medical/Dental Office Managers
Practice Managers
Information Systems Manager
Chief Information Officer
General Counsel/Lawyer
Practice Management Consultants
Any Business Associates that accesses protected health information
IT Companies that support Medical/Dental practices or other healthcare organizations

Speaker Profile
Jay Hodes president of Colington Security Consulting, LLC, which provides HIPAA consulting services for healthcare providers and business associates. Mr. Hodes has over 30 years of combined experience in risk assessments, site security evaluation, regulatory compliance, policy and procedures assessments, and federal law enforcement management. He is the former Assistant Inspector General for Investigations at the U.S. Department of Health and Human Services.

Mr. Hodes has been the keynote speaker and provided presentations regarding HIPAA compliance to a number of professional healthcare organizations. He has published over 30 educational articles regarding HIPAA compliance, been featured in Part B news articles and provided a guest post for the Electronic Health Reporter.

Price - $139
Contact Info:
Netzealous LLC -MentorHealth
Phone No: 1-800-385-1607
Fax: 302-288-6884
Email: support@mentorhealth.com
Website: http://www.mentorhealth.com/
Webinar Sponsorship: https://www.mentorhealth.com/control/webinar-sponsorship/

Comment Wall

Comment

RSVP for Webinar on Understand the HIPAA Security & Privacy Rules to add comments!

Join Online Safety Community

Attending (1)

Take our poll!

Take our poll!

Latest Activity

Mark Nilson posted events
7 hours ago
gracylayla posted a blog post

What Are The Search Commands In Splunk?

The Splunk Commands are one of the programming commands which makes your search processing simple with the subset of language by the Splunk Enterprise commands. These commands are used to transform the values of the specified cell into numeric values. The following are the listed Splunk Search commands that are sorted according to the various categories.Correlation:These are one of the commands which can be used…See More
9 hours ago
Training Doyens posted events
9 hours ago
Jam Blanco posted a blog post

Communication Towers: Commonly Encountered Hazards

Workers who maintain or install communication towers have to climb towers with the aid of ladders and other support structures. Their workplace is about 100 feet in the air in excess of 2000 feet and they have to work in all weather conditions.Needless to say, workers who work on communication towers are constantly exposed to a number of hazards. Some of the common ones include:ElectrocutionFallsFalling object hazardsEquipment failureDetrimental weather conditionsStructural failure of…See More
10 hours ago

Forum

5 TECHNOLOGY-BASED LONE WORKER SAFETY SOLUTIONS

ABOUT 75% OF EMPLOYEES IN NORTH AMERICA ARE MOBILE WORKERS. ADVANCES IN COMMUNICATIONS TECHNOLOGY MEANS THESE WORKERS CAN WORK ANYWHERE AT ANY TIME. THESE NEW TECHNOLOGIES ALSO MEAN THESE MOBILE…Continue

Tags: Solutions, People, IoT, Monitoring, Remote

Started by Jen McDade May 31.

Road Safety Solutions 14 Replies

The Road Safety Signs ,Barriers,Humps,Hazard Markers and Visual Warnings are some of the important marks to be observed. Signs such as "keep left",stop, "give way" should not be casually treated.…Continue

Tags: safety, gear, wear, Equipment, &

Started by Enna Henry. Last reply by Jen McDade May 31.

Remote Monitoring

Get "Safe Assets and Sound Productivity" Through Remote Monitoring.Visit:…Continue

Tags: Solutions, People, IoT, Monitoring, Remote

Started by Jen McDade May 23.

Python Condition Objects Tutorial in 2018 1 Reply

If you have knowledge of other programming languages, then you would know the importance of conditional statements. Conditional statements are required for taking decisions. Whenever we operate the…Continue

Tags: course, certification, training, languages, programming

Started by Elena Lauren. Last reply by Jim Chesters May 15.

Power BI Visualization Types

Visualizations in Power BI displays the visual insights from a data. In power bi service a visual can be pinned from reports to create dashboards. Visuals are used in reports.List of visualizations…Continue

Tags: COURSE, TRAINING, BI, POWER

Started by Azharuddin May 15.

Badge

Loading…

© 2018   Created by Safety Community.   Powered by

Badges  |  Report an Issue  |  Terms of Service