ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

2012 - HIPAA Privacy, Security and Breach Notification Compliance: Understanding the Requirements, Preventing Incidents, Surviving Audits, and Avoiding Penalties - US Seminar 2012 at Boston

Date2012-05-17

Deadline2012-05-17

VenueBoston, USA - United States USA - United States

Keywordsseminar boston,hipaa privacy,breach notification compliance,hipaa regulations,hipaa security policies,jim sheldon dean

Websitehttp://www.globalcompliancepanel.com/con...

Topics/Call fo Papers

Overview: This session is designed to provide intensive, two-day training in HIPAA compliance, including what's currently in the regulations, what’s changing, and what’s going to need to be addressed by covered entities and business associates in the near future. The session provides the background and details for any manager of healthcare information privacy and security to know what are the most important privacy and security issues, what needs to be done for HIPAA compliance, and what can happen without compliance.
Areas Covered in the Session:
How the HIPAA Regulations came to be
Objectives of HIPAA Regulations
Principles of HIPAA Compliance
Outline of the HIPAA Rules
Definition of HIPAA Business Associates
Patient Rights Under HIPAA
Privacy Obligations Under HIPAA
Changes to the HIPAA Privacy Rules
Principles of Information Security
How to Perform a HIPAA Security Risk Analysis
Policies and Procedures for HIPAA Compliance
What Is a HIPAA Audit and How to Prepare for One
How EHRs, Meaningful Use, and HIPAA Are Related
Typical Risk Issues and Mitigation Planning
The New Threats: Portable Devices and Social Media
Using Self-Audits and Drills to Hone Your Compliance Response
Using Documentation to Streamline Continuous Compliance Readiness
Course Modules & Content Details:
Day One :Day one sets the stage with an overview of the HIPAA regulations and then continues with presentation of the specifics of the Privacy Rule, recent and expected changes to the rules, and the basics of the Security Rule.
Day 1, May 17th, 2012
Lecture 1: Overview of HIPAA Regulations
The Origins and Purposes of HIPAA
Privacy Rule History and Objectives
Security Rule History and Objectives
Breach Notification Requirements, Benefits, and Results
Lecture 2: HIPAA Privacy Rule Principles, Policies and Procedures
Patient Rights under HIPAA
Limitations on Uses and Disclosures
Required Policies and Procedures
Training and Documentation Requirements
Lecture 3: Recent and Proposed Changes to the HIPAA Rules
New Penalty Structure
New Audit Requirements
New Patient Rights
New Obligations for Business Associates
Lecture 4: HIPAA Security Rule Principles
General Rules and Flexibility Provisions
The Role of Risk Analysis
Security Safeguards
Training and Documentation
Day 2, May 18, 2012
Day Two: Day two begins with a detailed examination of HIPAA Security Rule requirements and what must be done to survive audits by the US Department of Health and Human Services, including an examination of how risk analysis is used to drive compliance by the systematic examination of information flows and mitigation of risks discovered. Finally, the day concludes with a session on the essential activities of documenting policies, procedures, and activities, training staff and managers in the issues and policies they need to know about, and examining compliance readiness through drills and self-audits.
Lecture 5: HIPAA Security Policies and Procedures and Audits
HIPAA Security Policy Framework
Sample Security Policy Content
Recommended Level of Detail for Policies and Procedures
Using Good Policies and Procedures to Survive Audits
Lecture 6: Risk Analysis for Security and Meaningful Use
Principles of Risk Analysis for Information Security
Information Security Management Process
Risk Analysis Methods
Risk Analysis Example
Lecture 7: Risk Mitigation and Compliance Remediation
Typical Security Risks
Social Media and Privacy
Dealing with Portable Devices and Remote Access
Compliance Planning
Lecture 8: Documentation, Training, Drills and Self-Audits
How to Organize and Use Documentation to Your Advantage
Training Methods and Compliance Improvement
Conducting Drills in Incident Response
Self-Auditing of Compliance
Who will benefit:
Information Security Officers
Risk Managers
Compliance Officers
Privacy Officers
Health Information Managers
Information Technology Managers
Medical Office Managers
Chief Financial Officers
Systems Managers
Legal Counsel and
Operations Directors
Contact Information:
Event Coordinator
Toll free: 800-425-9409
Fax: 302-288-6884
Email: support-AT-globalcompliancepanel.com
http://www.globalcompliancepanel.com
Price: $1,395.00
GlobalCompliancePanel
1000 N West Street, Suite 1200,
Wilmington, DE 19801, USA

Last modified: 2012-03-14 19:37:14