2019 - Texting and Mobile Devices in Healthcare - HIPAA and CMS Requirements for Security of PHI
Date2019-05-16
Deadline2019-05-16
VenueOnline Event, USA - United States
KeywordsHIPAA; The Joint Commission; Healthcare communications
Topics/Call fo Papers
Find out the ways that patients want to use texting to communicate with providers, and the ways providers want to use texting to enable better patient care.
Learn what are the risks of using texting, what can go wrong, and what can result when it does.
Learn how to use an information security management process to evaluate risks and make decisions about how best to protect PHI and meet patient needs and desires.
Find out about limitations on the use of messages and calls to cell phones under The Telephone Consumer Protection Act of 1991.
Discover how The Joint Commission decided to allow and then withdraw allowing the use of texting for physician orders.
Find out what policies and procedures you should have in place for dealing with texting, as well as any new technology.
Learn about the training and education that must take place to ensure your staff uses texting properly and does not risk exposure of PHI.
Find out the steps that must be followed in the event of a breach of PHI.
Learn about how the HIPAA audit and enforcement activities are now being increased and what you need to do to survive a HIPAA audit.
Learn what are the risks of using texting, what can go wrong, and what can result when it does.
Learn how to use an information security management process to evaluate risks and make decisions about how best to protect PHI and meet patient needs and desires.
Find out about limitations on the use of messages and calls to cell phones under The Telephone Consumer Protection Act of 1991.
Discover how The Joint Commission decided to allow and then withdraw allowing the use of texting for physician orders.
Find out what policies and procedures you should have in place for dealing with texting, as well as any new technology.
Learn about the training and education that must take place to ensure your staff uses texting properly and does not risk exposure of PHI.
Find out the steps that must be followed in the event of a breach of PHI.
Learn about how the HIPAA audit and enforcement activities are now being increased and what you need to do to survive a HIPAA audit.
Other CFPs
- Emerging Issues: E-Signatures, E-Verification, Etc
- ISETE - International Conference on Robotics, Smart Technology, Communication and Electronics Engineering (ICRMTCEE)
- ISETE - International Conference on Recent Developments in Electrical and Power Engineering (ICRDEPE)
- ISETE - International Conference on Mechanical, Manufacturing, Industrial and Civil Engineering (ICMMICE)
- ISETE - International Conference on Innovative Research Practices in Economics, Business and Social Sciences(ICIRPEBS)
Last modified: 2019-04-12 22:02:07