The Cutting Edge of Medical Technology Content, Community & Collaboration
Time: May 25, 2017 from 10am to 11:30am
Location: Online Event
Street: 161 Mission Falls Lane suite 216
Website or Map: http://www.mentorhealth.com/c…
Event Type: webinar
Organized By: Roger Steven
Latest Activity: Apr 4
Training Options Duration: 90 Minutes
Thursday, May 25, 2017 | 10:00 AM PDT | 01:00 PM EDT
Overview: In this session we will discuss the HIPAA audit and enforcement programs and how they work, and discuss the areas that caused the most issues in prior audits. We will explore what kind of issues and what kind of entities had the most problems, and show where entities need to improve their compliance the most. We will also explore the typical risk issues that lead to breaches of health information and see how those issues may be a target for auditors in the nxt round of audits.
We will review the contents of the HIPAA Audit Protocol used in 2016 to show what documentation needs to be on hand should your organization be selected for an audit in the new round.We will present methods for using the contents of the HIPAA Audit Protocol to build your own compliance plan by extracting and updating the contents and relating your compliance activities directly to the questions that might be asked.
Why Should you attend: HIPAA Compliance requires that you be prepared to handle Protected Health Information properly and follow the requirements in the HIPAA Privacy, Security, and Breach Notification Rules. If there is a problem that comes to the surface, an enforcement action can result, including financial settlements that can reach into the millions of dollars, and Corrective Action Plans that can take years to complete and can cost many times the expense of the monetary settlements.
Areas Covered in the Session:
Learn how to make the HIPAA Audit Protocol useful to you as a way to organize and track your compliance work, and collect your documentation references.
Find out what you'll need to have documented to survive an audit or compliance review and avoid fines.
Learn how to use an information security management process to evaluate risks and make decisions about how best to protect PHI and meet patient needs and desires.
Find out what policies and procedures you should have in place.
Who Will Benefit:
Information Systems Manager
Chief Information Officer
Health Information Manager
Jim Sheldon-Dean is the founder and director of compliance services at Lewis Creek Systems, LLC, a Vermont-based consulting firm founded in 1982, providing information privacy and security regulatory compliance services to a wide variety of health care entities.
Phone No: 1-800-385-1607