ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

HIPAA Security, Compliance Training, conference, e 2011 - Live webcast on HIPAA Security Compliance - How Risk Analysis simplifies priorities and ensures compliance BY Compliance2go

Date2011-12-08

Deadline2011-12-07

Venuetexas, USA - United States USA - United States

Keywordshealthcare;medical devies;biotech

Websitehttps://compliance2go.com/index.php?opti...

Topics/Call fo Papers

HIPAA Security Compliance - How Risk Analysis simplifies priorities and ensures compliance

Thursday, December 08, 2011

Description

Information security risk analysis is required for HIPAA Security Rule compliance and EHR incentive funding but is an unknown topic for many healthcare providers.
Why should you Attend:

Health Care entities are subject to a number of standards and regulations that require them to assess the risks to the personal and private information of their patients and take steps to reduce those risks where they can. In particular, the HIPAA Security Rule and the PCI Data Security Standard for payment card information, as well as state laws in Massachusetts and Nevada, require a thorough and complete risk analysis. In addition, if health care providers want to receive funding from the Federal government for the adoption of Electronic Health Records, one of the required standards for meaningful use is to protect the privacy and security of patient information by performing a risk analysis consistent with the requirements of the HIPAA Security Rule.

Discount: Get 15 % Discount as a early bird registrations. Use Promo code CGO15

Description of the topic:

? This session will present the background of the regulations that call for information security risk analysis and show how it fits in to an overall information security management process. The risk analysis process will be presented within the context of the overall risk prioritization and risk mitigation process, using an example.
? The Information Security Risk Analysis Process presented utilizes a non-technical approach, involving interviewing staff knowledgeable about operations and systems to discover how information is retained and moved, and reveal the risks inherent in such storage and transmission. Interview content is organized as departmental stories that are successively refined into process descriptions, lists of information in place or in motion, diagrams of information flows, and lists of information systems and flows to be assessed for risks.
? Attendees will gain insights into the managment of risks and reduction of exposure to breaches and penalties, and will be able to implement new procedures that will reduce risks immediately
Areas Covered in the Session:
o Learn how to conduct an information security risk analysis suitable to aid in compliance with the HIPAA Security Rule and other information security regulations relevant to health information managers.
o Find out what the rules are that health care providers must follow, why they are important, and what the penalties are for not complying, including the new penalties for willful neglect of compliance, which begin at $10,000.
o See how the risk analysis requirement for meeting the privacy and security objective of meaningful use, necessary for federal funding, fits in with HIPAA compliance.
Who will benefit
Compliance director
CEO
CFO
Privacy Officer
Security Officer
Information Systems Manager
HIPAA Officer
Chief Information Officer
Health Information Manager
Healthcare Counsel/lawyer
Office Manager
Contracts Manager
Jim Sheldon-Dean is the founder and director of compliance services at Lewis Creek Systems, LLC, a Vermont-based consulting firm founded in 1982, providing information privacy and security regulatory compliance services to a variety of health care providers, businesses, universities, small and large hospitals, urban and rural mental health and social service agencies, health insurance plans, and health care business associates. He serves on the HIMSS Information Systems Security Workgroup, has co-chaired the Workgroup for Electronic Data Interchange Privacy and Security Workgroup, and is a recipient of the 2011 WEDI Award of Merit.
Sheldon-Dean has nearly 30 years of experience in policy analysis and implementation, business process analysis, information systems and software development. Sheldon-Dean received his B.S. degree, summa cum laude, from the University of Vermont and his master’s degree from the Massachusetts Institute of Technology.

Purchase formats: Live: $189.00 One Dial In - Unlimited attendance $249 Recorded: $289.00, CD: $349.00

For any assistance contact us at support-AT-compliance2go.com or call us at 877.782.4696

http://www.compliance2go.com/index.php?option=com_...

Last modified: 2011-11-30 05:48:24