Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors

    Receive Latest News

    Feedburner
    Share Us


    Online event HIPAA Security and Breach Rule Compliance: Minimizing Risks and Avoiding Penalties

    View: 214

    Website https://compliance2go.com/product/?pid=CP2014-379 | Want to Edit it Edit Freely

    Category Healthcare

    Deadline: February 10, 2015 | Date: February 11, 2015

    Venue/Country: Online, U.S.A

    Updated: 2015-01-27 15:26:47 (GMT+9)

    Call For Papers - CFP

    DESCRIPTION

    - Being in compliance with HIPAA involves not only ensuring you provide the appropriate patient rights and controls on your uses and disclosures, but also that you ensure you have the right policies, procedures, and documentation, and have performed the appropriate analysis of the risks to the confidentiality, integrity, and availability of electronic Protected Health Information.

    - Using Risk Analysis can help you make defensible, documented decisions about your compliance in a variety of circumstances, for a variety of regulations. Risk Analysis is the key to making your health information privacy and security regulatory compliance work more sensible as well as defensible.

    - The HIPAA Breach Notification Rule has been in effect since September 23, 2009 and had recently been significantly modified. We will discuss the origins of the rule and how it works, including interactions with other HIPAA rules and penalties for violations.

    - HIPAA Covered Entities and Business Associates need to know where and what information they have, so they can know if there has been a breach, and then decide if they need to notify or not. We'll cover how the rules have been changed to eliminate the ""harm standard"" and replace it with a risk assessment.

    - Entities can avoid notification if information has been encrypted according to Federal standards. We will cover the guidance from the US Department of Health and Human Services that shows how to encrypt so as to prevent the need for notification in the event of lost data.

    - We will discuss how to create the right breach notification policy for your organization and how to follow through when an incident occurs. In addition, a policy framework to help establish good security practices is presented.

    - We will cover the essentials of information security methods you can use to keep breaches from happening, and be in compliance with the HIPAA Security Rule as well. We'll also discuss the new penalties for non compliance, including mandatory penalties for ""willful neglect"" that begin at $10,000.

    - We will help you understand what isn’t a breach and under what circumstances you don’t have to consider breach notification. You’ll find out how to report the smaller breaches (less than 500 individuals), and you’ll know why you want to avoid a breach involving more than 500 individuals ? media notices, Web site notices, and immediate notification of HHS, including posting on the HHS breach notification “wall of shame” on the Web.

    - We will explain, based on historical analysis of reported breaches, what measures must be taken today to protect information from the most common threats, as well as discuss information security trends and explain what kinds of efforts will need to be undertaken in the future to protect the security of PHI. "

    Why should you attend :

    "Compliance with HIPAA Rules requires being able to make decisions about how to implement the rules in your own circumstances, and using a risk analysis approach can make that process more logical and better documented. The HIPAA Security Rule requires that all entities periodically evaluate the risks to the confidentiality, integrity, and availability of Protected Health Information, and the rules are now backed up with new fines, and penalties, and a new enforcement effort. The changes to the rules create new challenges for HIPAA entities, and new risks for non-compliance and penalties.

    Any violation of the HIPAA Privacy Rule may be a reportable breach under the HIPAA Breach Notification rules, requiring notification of individuals and HHS when information security is breached. Any incident involving a HIPAA issue must be evaluated to see if it is reportable, and any decisions or actions must be fully documented.

    Having a solid information security management process is key to ensuring you can protect your data and avoid breaches, as well as prepare you for breaches that do occur despite your best efforts.

    Compliance with the HIPAA Security Rule has always required that the risks to protected health information (PHI) be assessed and any issues be addressed by mitigation as necessary. But new changes to the HIPAA Breach Notification Rule add a new role for Risk Assessment, in determining whether or not a breach has a “low probability of compromise.” In addition, recent audits and enforcement actions have highlighted the requirement for performing a proper risk analysis as part of the management of security risks, and to satisfy documentation requirements.

    Good security controls and protection from breaches go hand-in-hand and are topics of current interest. You need to have good controls in place to help prevent issues that may lead to breaches, and to understand what has happened when a breach may have taken place. This session will explore the relationship of Security to Breach Notification and shows how considering HIPAA requirements together can lead to the most secure, most compliant systems and organizations."

    Areas Covered in the Session:

    "I. HIPAA Security Compliance

    A. What the HIPAA Security Rule requires

    B. The policies you should have for security compliance

    C. How to do risk assessment and analysis

    D. Planning management of your risks

    E. Planning your next reviews and your information security management process

    II. Breach Notification Laws

    A. State Breach Notification Laws

    B. Changes to HIPAA Breach Notification

    C. Federal Breach Notification Law and Regulation

    D. The Who, What, and How of Breach Notification

    E. The Risk Assessment Process in Breach Notification

    III. Preventing and Preparing for Breaches

    A. Using an Information Security Management Process

    B. Using Risk Analysis and Risk Assessment Before a Breach

    C. Most Common Types of Breaches

    D. Information Security, Incident, and Breach Notification Policies

    E. The Importance of Documentation

    IV. Enforcement and Audits

    A. New HIPAA Violation Categories and Penalties

    B. Preparing for HIPAA Audits"

    Who will benefit: (Titles)

    Compliance director, CEO, CFO, Privacy Officer, Security Officer, Information Systems Manager, HIPAA Officer, Chief Information Officer, Health Information Manager, Healthcare Counsel/lawyer, Office Manager, Contracts Manager

    Webinar Includes:

    Q/A Session with the Expert to ask your question

    PDF print only copy of PowerPoint slides

    90 Minutes Live Presentation

    Certificate


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.