Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors

    Receive Latest News

    Feedburner
    Share Us


    HIPAA and Social Media: Using New Communication Technologies and Staying Compliant

    View: 227

    Website https://compliance2go.com/product/?pid=CP2014-377 | Want to Edit it Edit Freely

    Category Healthcare

    Deadline: December 02, 2014 | Date: December 02, 2014

    Venue/Country: Houston, U.S.A

    Updated: 2014-11-03 18:31:31 (GMT+9)

    Call For Papers - CFP

    DESCRIPTION

    It seems everyone is signig up for social media and wants to use it in all the incredible ways it can be used, including for health care purposes. Social networking sites offer individuals new ways to relate to each other and share experiences.

    The Internet has changed the way people communicate and introduced new risks into the process of providing health care services. Now patients want to be able to communicate with their health care providers, and providers want to communicate with each other using social networking sites, and to be able to access, send, and receive health information. But communications using social networking sites has some inherent privacy and security risks that may put providers out of compliance.

    New technologies present new challenges to health care providers, as there are simultaneously new requirements to share information with patients, and a new enforcement effort to ensure the privacy and security of Protected Health Information (PHI). Meeting both challenges requires careful consideration of all the regulations and technologies, as well as patient preferences and work flow.

    In order to integrate the use of social networking into patient communications, it is essential to perform the proper steps in an information security compliance process to evaluate and address the risks of using the technology. This session will describe the information security compliance process, how it works, and how it can help you decide how to integrate new technologies into your organization in a compliant way. The process, including the use of information security risk analysis, will be explained, and the policies needed to support the process will be described.

    The process must include consideration of various patient access requirements in the HIPAA Privacy Rule. There are new requirements to provide patients electronic access of electronically held PHI which raise new questions of how that access will be provided and how the information will be protected during and after access. And there has long been a HIPAA requirement for covered entities to do their best to meet the requests of their patients for particular modes of communication, and using social networking is no exception.

    The stakes are high ? any improper exposure of PHI may result in an official breach that must be reported to the individual and to the US Department of Health and Human Services, at great cost and with the potential to bring fines and other enforcement actions if a violation of rules is involved. Likewise, complaints by a patient if they are not afforded the access they desire can bring about HHS inquiries and enforcement actions, so it is essential to find the right balance of access and control.

    HHS compliance audit activity and enforcement penalties are both increased, especially in instances of willful neglect of compliance, if, for instance, your organization hasn't adopted the complete suite of policies and procedures needed for compliance, or hasn’t adequately considered the impact of social networking on your compliance. It is essential to consider social networking sites and how their use affects the privacy and security of PHI; not doing so is inviting enforcement action by HHS.

    Why should you attend :

    "This 90-minute webinar will discuss the requirements, the risks, and the issues in using social networking for patient communications. We will review policies and procedures, documentation, major compliance areas and training to ensure they are updated to meet these new challenges.

    Learn about how providers and patients want to use social media for communications and how they may cause privacy and security issues. Learn how requirements under the Privacy Rule allow patients to choose their communication method, with new rules for electronic access of records held electronically.

    Learn about using an integrated information security management process to integrate new technologies into business processes safely and securely. Discover how your information security Risk Analysis must be updated to include social media, and how a lack of consideration for new technologies can lead to breaches and enforcement actions.

    Learn about the importance of policies and procedures and documentation of their training and use in order to provide the proper privacy and security protections and preparation for the new random audit program, now getting under way.

    The session will discuss the uses patients and providers have for social media and what must be considered for compliance, and provide a road map for how to use them safely and effectively, to increase the quality of health care and patient satisfaction, and avoid breaches and penalties.

    Areas Covered in the Session:

    How Patients and Providers want to use social networking.

    How to evaluate the use of new technologies under HIPAA

    Issues with using non-HIPAA designations for non-covered activities.

    Using Risk Analysis to make sound compliance decisions without breaking any rules or asking patients to yield their rights.

    What needs to be in your social networking policy.

    What secure alternatives there are to “regular” social networking.

    The impacts of using non-compliant technologies.

    The importance of thorough, regular training to safe technology use.

    Potential penalties for non-compliance.

    Who will benefit: (Titles)

    Compliance director, CEO, CFO, Privacy Officer, Security Officer, Information Systems Manager, HIPAA Officer, Chief Information Officer, Health Information Manager, Healthcare Counsel/lawyer, Office Manager, Contracts Manager

    Webinar Includes:

    Q/A Session with the Expert to ask your question

    PDF print only copy of PowerPoint slides

    90 Minutes Live Presentation

    Certificate


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.