Online Safety Community

Understanding the myths and realities of HIPAA and BYOD

What can be and cannot be done with the use of personal devices under HIPAA is something practices and businesses that need to be compliant with the provisions of HIPAA need to be thoroughly aware of.

With changes expected in 2016 relating to personal devices as well as emailing and texting; staying compliant is extremely important to protect one’s practice or business. It is important to understand the new changes going on at Health and Human Services (HHS) as they relate to enforcement of HIPAA for both Covered Entities and Business Associates relating to portable devices, texting, and emailing of PHI.

Audit risk-proofing practices and business

Practices and businesses need to insulate themselves from becoming vulnerable to audit risk as well as being sued by individuals who have had their PHI wrongfully discloses due to bad IT practices.

The way of getting prepared for a HIPAA audit properly is the teaching of a webinar that is being organized by MentorHealth, a highly reputable provider of professional trainings for the healthcare industry.

Brian Tuttle, a Certified Professional in Health IT (CPHIT), Certified HIPAA Professional (CHP), and Certified Business Resilience Auditor (CBRA) , who brings over 15 years’ experience in Health IT and Compliance Consulting, will be the speaker at this webinar. Log on to http://www.mentorhealth.com/control/w_product/~product_id=800831LIV... to enroll for this highly valuable learning session, where the speaker will explain the facts and myths of HIPAA in the course of bringing the experience of having carried over 600 risk assessments as well as having directly dealt with the Office of Civil Rights HIPAA auditors.

Putting an effective HIPAA compliance program in place

Brian will explain what organizations need to do to put an affective HIPAA compliance program in place that takes into consideration the texting and emailing aspects, as well as updates for 2016. Brian will offer examples of real life audits conducted by the Federal government to explain the highest risks an organization faces for being fined. He will also explain the highest risk factors for being sued for wrongful disclosures of PHI and the manner in which patients are now using state laws to sue for wrongful disclosures.  

Brian will cover the following areas at this webinar:

o  Updates for 2016

o  BYOD

o  Portable devices

o  Doctors and texting

o  Practical solutions

o  Business associates and the increased burden

o  Emailing of PHI

o  Texting of PHI

o  Federal Audit Process.

Views: 20

Comment

You need to be a member of Online Safety Community to add comments!

Join Online Safety Community

Take our poll!

Take our poll!

Latest Activity

Rachel Min posted a blog post
Friday
Profile IconJeff Pacheco, KATE KWAME, Rob Minjock and 2 more joined Online Safety Community
Friday
John Robinson posted a blog post

Learn any professional courses for $10 only

Want to enhance your regulatory compliance career by learning a new course? All that it costs is $10. Yes, GlobalCompliancePanel, a provider of professional trainings, is offering hundreds of high value regulatory compliance courses for a mere $10 each.…See More
Friday
Adam Fleaming posted a blog post

The GDPR differs Significantly from EC Data Protection Directive 95/ 46

The General Data Protection Regulation (GDPR), which has been codified as Regulation (EU) 2016/679, is a very powerful law regarding the protection of data of the half billion people who live in the European Union (EU). Having come into effect as a result of the European Commission having adapted the proposal for its creation on January 25, 2012; it will replace Directive…See More
Wednesday

Forum

Safety - A Prerequisite 11 Replies

Whether working at home or outside, to observe safety should be our pre-requisite. The employer before anything must be sure of the safety of its employees especially the ones working in mines or any…Continue

Tags: products, safety

Started by Enna Henry. Last reply by Tara safe on Wednesday.

Lean Six Sigma Black Belt Training in New York City

Welcome to MSys Training! We thank you for visiting MSys LSSBB training page. Attend our 4 days Lean Six Sigma Black Belt (LSSBB) training program with 100% pass rate, high quality course material,…Continue

Tags: sigma, six

Started by rodriguezcecelia Aug 11.

ITIL Certification Training - MSysTraining

The ITIL® Foundation is an entry level qualification in Information Technology industry. It gives participants information about the key elements, terminologies and concepts used in the ITIL Service…Continue

Tags: itil

Started by rodriguezcecelia Aug 8.

Snowflake and Star Schema in Qlikview

In big name schema all of the facts are stored in one important table and the usage of number one key and overseas key courting different measurement tables are related with the fact desk.SNOWFLAKE…Continue

Tags: processing, transactional, qlikview

Started by Soujanya Naganuri Jul 25.

What is Class Structure in Pega?

Class contains the rule by way of which objects behave. outline rules such as houses, sports, flows, html paperwork, etc. to be had to different subordinate classes. lessons are organized into a…Continue

Started by Soujanya Naganuri Jul 17.

Badge

Loading…

© 2017   Created by Safety Community.   Powered by

Badges  |  Report an Issue  |  Terms of Service