Online Safety Community

Understanding the HIPAA’s requirements for safeguarding PHI

For an organization that needs to show HIPAA compliance; having the proper policies and procedures in place is as important as ensuring that it is providing the appropriate patient rights and controls on its uses and disclosures of Protected Health Information (PHI). It makes sense for an organization that is the subject of a compliance review or is being audited, to demonstrate to the government that it has both the documentation necessary for safeguarding patient PHI, as well as the ability to show how it is addressing all of the required security safeguards.

Required: A good understanding of the fundamentals

To do all this, a healthcare practice, business or organization needs to have a good grasp of the fundamentals of what it takes to protect PHI. It also needs to make sure that its current safeguards are sufficient to withstand government scrutiny. Another reason for the need for understanding what requirements need to be met to safeguard PHI is that there has been a substantial increase in HIPAA data breaches

The ways by which an organization can do all these will be the topic of a webinar from MentorHealth, a leading provider of professional trainings for the healthcare industry. To enroll for this webinar, just log on to http://www.mentorhealth.com/control/w_product/~product_id=800871LIV....

The speaker at this webinar is Jay Hodes, who is President and Founder, Colington Security Consulting, LLC. He will offer a thorough understanding of all the requirements that need to be put in place for protecting the health records that participants’ organizations maintain, create, transmit, or store. This course will offer a Covered Entity or Business Associate a solid understanding of what needs to be in place when it comes to complying with all of the HIPAA’s regulations.

Jay will cover the following areas at this discussion:

  • Why was HIPAA created?
  • Who Must Comply with HIPAA Requirements?
  • What are the HIPAA Security and Privacy Rules?
  • What is a HIPAA Risk Management Plan?
  • What is meant by "Required" and "Addressable" Implementation Specifications?
  • What are Administrative, Technical, and Physical Safeguards Requirements?
  • What is a HIPAA Risk Assessment?
  • What are HIPAA training requirements?
  • What is a HIPAA data breach and what happens if it occurs?
  • What are the penalties and fines for non-compliance and how to avoid them?
  • Creating a Culture of Compliance
  • Questions

 

Views: 30

Comment

You need to be a member of Online Safety Community to add comments!

Join Online Safety Community

Take our poll!

Take our poll!

Latest Activity

Rachel Min posted a blog post
Friday
Profile IconJeff Pacheco, KATE KWAME, Rob Minjock and 2 more joined Online Safety Community
Friday
John Robinson posted a blog post

Learn any professional courses for $10 only

Want to enhance your regulatory compliance career by learning a new course? All that it costs is $10. Yes, GlobalCompliancePanel, a provider of professional trainings, is offering hundreds of high value regulatory compliance courses for a mere $10 each.…See More
Friday
Adam Fleaming posted a blog post

The GDPR differs Significantly from EC Data Protection Directive 95/ 46

The General Data Protection Regulation (GDPR), which has been codified as Regulation (EU) 2016/679, is a very powerful law regarding the protection of data of the half billion people who live in the European Union (EU). Having come into effect as a result of the European Commission having adapted the proposal for its creation on January 25, 2012; it will replace Directive…See More
Wednesday

Forum

Safety - A Prerequisite 11 Replies

Whether working at home or outside, to observe safety should be our pre-requisite. The employer before anything must be sure of the safety of its employees especially the ones working in mines or any…Continue

Tags: products, safety

Started by Enna Henry. Last reply by Tara safe on Wednesday.

Lean Six Sigma Black Belt Training in New York City

Welcome to MSys Training! We thank you for visiting MSys LSSBB training page. Attend our 4 days Lean Six Sigma Black Belt (LSSBB) training program with 100% pass rate, high quality course material,…Continue

Tags: sigma, six

Started by rodriguezcecelia Aug 11.

ITIL Certification Training - MSysTraining

The ITIL® Foundation is an entry level qualification in Information Technology industry. It gives participants information about the key elements, terminologies and concepts used in the ITIL Service…Continue

Tags: itil

Started by rodriguezcecelia Aug 8.

Snowflake and Star Schema in Qlikview

In big name schema all of the facts are stored in one important table and the usage of number one key and overseas key courting different measurement tables are related with the fact desk.SNOWFLAKE…Continue

Tags: processing, transactional, qlikview

Started by Soujanya Naganuri Jul 25.

What is Class Structure in Pega?

Class contains the rule by way of which objects behave. outline rules such as houses, sports, flows, html paperwork, etc. to be had to different subordinate classes. lessons are organized into a…Continue

Started by Soujanya Naganuri Jul 17.

Badge

Loading…

© 2017   Created by Safety Community.   Powered by

Badges  |  Report an Issue  |  Terms of Service