Health Care 2012 - HIPAA Security Policies and Procedures: New finalized regulations bring new obligations
Date2012-03-02
Deadline2012-03-02
VenuePalo Alto, USA - United States
KeywordsHIPAA Security Policies; HIPAA Security Procedures; HIPAA; risk assessment; risk analysis; HITECH; PCI; DSS; Security Rule; Breach Notification; Business Associate; meaningful use
Topics/Call fo Papers
This 3-hr virtual seminar on HIPAA Security Policies and Procedures will show how you can comply with the extensive requirements for policies and procedures in the HIPAA security regulation.
Why Should You Attend:
This session will discuss the most common information security issues and breaches so you will know what to concentrate on first in your compliance efforts.
Learn what it takes to get in compliance and stay there, even as your operations and environment change. We will cover the administrative, physical and technical safeguards that are necessary and what policies they call for, and how you decide what’s right for HIPAA security compliance for your organization. This virtual seminar will provide the background and details necessary to develop an understanding of the origins of the HIPAA security regulation and the process used in complying with the rule, which leads, inevitably, to the adoption of policies and procedures.
Areas Covered in the Seminar:
- Requirements for HIPAA Security Policies and Procedures.
- Why We Need Policies and Procedures?
- HIPAA Security General Rules and Flexibility.
- The Information Security Management Process.
- What the HIPAA Security Rule Calls For.
- Risk Analysis.
- Safeguards.
- Business Associates.
- Security Policy Framework.
- Information Security Management Process Policy.
- Information System Access Management Policy.
- Backup, Disposal, and Contingency Planning Policy.
- Information System User Policy.
- Documentation, Enforcement, and Audits.
- Documentation Requirements and Benefits.
- New Enforcement and Penalties.
- HIPAA Security Rule Audit Examples.
- Typical Issues.
- Issues Reported by HHS OCR.
- Lessons Learned.
- Laundry List of Issues.
Why Should You Attend:
This session will discuss the most common information security issues and breaches so you will know what to concentrate on first in your compliance efforts.
Learn what it takes to get in compliance and stay there, even as your operations and environment change. We will cover the administrative, physical and technical safeguards that are necessary and what policies they call for, and how you decide what’s right for HIPAA security compliance for your organization. This virtual seminar will provide the background and details necessary to develop an understanding of the origins of the HIPAA security regulation and the process used in complying with the rule, which leads, inevitably, to the adoption of policies and procedures.
Areas Covered in the Seminar:
- Requirements for HIPAA Security Policies and Procedures.
- Why We Need Policies and Procedures?
- HIPAA Security General Rules and Flexibility.
- The Information Security Management Process.
- What the HIPAA Security Rule Calls For.
- Risk Analysis.
- Safeguards.
- Business Associates.
- Security Policy Framework.
- Information Security Management Process Policy.
- Information System Access Management Policy.
- Backup, Disposal, and Contingency Planning Policy.
- Information System User Policy.
- Documentation, Enforcement, and Audits.
- Documentation Requirements and Benefits.
- New Enforcement and Penalties.
- HIPAA Security Rule Audit Examples.
- Typical Issues.
- Issues Reported by HHS OCR.
- Lessons Learned.
- Laundry List of Issues.
Other CFPs
- HIPAA Privacy and Security Audits and Enforcement: What the new program is about, how it works, and what happens if a violation is found
- 2012 International Conference on Convergence Computer Technology (IC3T)
- 2012 2nd International Conference on Power, Control and Embedded Systems (ICPCES)
- HIPAA Security Rule Compliance and Risk Analysis: Finding the best ways to reduce security risks and prevent breaches
- DMR & DHR - What Is Really Required
Last modified: 2011-12-08 21:20:25