BEGIN:VCALENDAR
PRODID:NingEventWidget-v1
VERSION:2.0
METHOD:PUBLISH
BEGIN:VTIMEZONE
TZID:America/New_York
X-LIC-LOCATION:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:19700308T020000
RRULE:FREQ=YEARLY;BYMONTH=3;BYDAY=2SU
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:19701101T020000
RRULE:FREQ=YEARLY;BYMONTH=11;BYDAY=1SU
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
UID:2140535:Event:79819
DTSTAMP:20260522T085147Z
SUMMARY:HIPAA Breach Evaluation and Reporting - What Qualifies as a Re
 portable Breach and how to Report It
DESCRIPTION:Overview: The HIPAA Breach Notification Rule has been in e
 ffect since 2010 and has beenÂ Overview: The HIPAA Breach Notification
  Rule has been in effect since 2010 and has beenÂ significantly modifi
 ed in 2013. We will discuss the origins of the rule and how it works,Â
  including interactions with other HIPAA rules and penalties for viola
 tions. Whenever there mayÂ be a privacy issue involving Protected Heal
 th Information, there may be a reportable breachÂ under the HIPAA regu
 lations. Not all privacy violations are reportable breaches, though, s
 o itÂ is essential to have a good process for evaluating incidents to 
 see if they have resulted in aÂ reportable breach.Any privacy rule vio
 lation that results in an acquisition, access, use, or disclosure of P
 HI inÂ violation of the HIPAA Privacy Rule may be a breach, unless the
  incident is one of the definedÂ exceptions from the definition. A bre
 ach is reportable unless the information was secured orÂ destroyed in 
 the incident, or unless a risk analysis shows that there is a low prob
 ability ofÂ compromise of the information, based on at least four fact
 ors defined in the rules. We willÂ examine how to determine if a priva
 cy violation is potentially a breach according to theÂ definition, and
  then describe the subsequent steps in the evaluation, if it is determ
 ined thatÂ the definition has been met.Â We will discuss the exception
 s to the breach definition for inadvertent internal uses, or whenÂ it 
 can be determined that the information could not be retained in any wa
 y by the receivingÂ party. Entities can avoid notification if informat
 ion has been encrypted according to FederalÂ standards. We will cover 
 the guidance from the US Department of Health and Human Services thatÂ
  shows how to encrypt so as to prevent the need for notification in th
 e event of lost data.Â Failing that, a risk analysis can be conducted 
 to determine the probability of compromise ofÂ the information, consid
 ering four factors: what the data is and how well identified it is, to
 Â whom was it released and do they have obligations to protect the inf
 ormation, whether or notÂ the information actually exposed, and whethe
 r or not the incident has been mitigated properly.Â However, it must b
 e noted that any compromise of the information by Ransomware that deni
 esÂ access or control of your information should be treated as a repor
 table breach.Â \nPrice - $139\nContact Info:Netzealous LLC - MentorHea
 lthPhone No: 1-800-385-1607Fax: 302-288-6884 Email: support@mentorheal
 th.comWebsite: http://www.mentorhealth.com/Webinar Sponsorship: https:
 //www.mentorhealth.com/control/webinar-sponsorship/Follow us on : http
 s://www.facebook.com/MentorHealth1Follow us on : https://www.linkedin.
 com/company/mentorhealth/Follow us on : https://twitter.com/MentorHeal
 th1\n\nFor more information visit https://medtechiq.ning.com/events/hi
 paa-breach-evaluation-and-reporting-what-qualifies-as-a
DTSTART;TZID=America/New_York:20180817T100000
DTEND;TZID=America/New_York:20180817T113000
CATEGORIES:webinar
LOCATION:Online
WEBSITE:http://www.mentorhealth.com/control/w_product/~product_id=8013
 54LIVE?medtechiq_aug_2018_SEO
URL:http://www.mentorhealth.com/control/w_product/~product_id=801354LI
 VE?medtechiq_aug_2018_SEO
CONTACT:8003851607
ORGANIZER:Netzealous LLC - MentorHealth
ATTACH;FMTTYPE="image/jpeg":http://storage.ning.com/topology/rest/1.0/
 file/get/2562012320?profile=original
ATTENDEE;ROLE=REQ-PARTICIPANT;PARTSTAT=ACCEPTED;RSVP=TRUE;CN="Roger St
 even":https://medtechiq.ning.com/profile/RogerSteven
END:VEVENT
END:VCALENDAR
