Effective Security Policies 2014 - Creating and Implementing Effective Security Policies - Webinar By MentorHealth
Date2014-09-10
Deadline2014-09-10
VenueOnline event, USA - United States
KeywordsHow to treat obstructive sleep; What is obstructive sleep apne; Online Healthcare Compliance
Topics/Call fo Papers
Overview: Before creating effective security policies and procedures it is important for organizations to understand the significant differences in these two terms. This presentation will explain why you need policies, the key steps to creating effective policies, whom to involve, and the characteristics of an effective policy.
In this session we will review these steps and create a draft policy example on training and its importance in policy creation, promulgation, enforcement and compliance.. We will also review the key HIPAA Standards and offer recommendations with regards to what should be included and why.
Why should you attend: The key to the HIPAA Security rule compliance is creating, implementing and monitoring effective security policies. Organizations subjected to an OCR audit will be asked for their written policies and procedures. Policies are management’s desires on how they want the organization to operate and procedures are the process to implement management’s wishes. In this session, we will review techniques to create policies with muscle that are effective in reducing risks to the organization. HIPAA requires that organizations have written policies that are implemented.
Areas Covered in the Session:
How to create policies and Procedures
Educate your users
Monitoring your Policies
Establishing Security Sanctions for your Policies
Who Will Benefit:
Information Security Officers
Compliance Officers
Chief Information Officers
William Miaoulis CISA, CISM, is a senior healthcare information system (IS) professional with more than 20 years of healthcare Information Security experience. Bill is the founder and primary consultant for HSP Associates. Prior to starting HSP Associates in January of 2013, Bill was the Chief Information Security Officer (CISO) and led the HIPAA security and privacy consulting efforts for Phoenix Health Systems for over 11 years and also was the HIPAA Consulting Manager for SAIC for 18 months. For seven years, Miaoulis was the University of Alabama Birmingham (UAB) Medical Center’s Information Security Officer, where he instituted the first security and privacy programs at UAB starting in October 1992.
Miaoulis contributes to the industry by frequently speaking at conferences on security matters, including recent sessions on Risk Analysis/Risk Management, Creating and Implementing Effective Security Policies, Understanding the HIPAA Security Rule, and Creating Effective Security Incident Response Procedures. Miaoulis has been interviewed and quoted by numerous publications including: SC Magazine, Health Data Management, Briefings on Healthcare Security, Computerworld; and Health Information Compliance Insider. Miaoulis has worked with AHIMA to produce the book “Preparing for a HIPAA Security Compliance Assessment” and also has worked on updating the AHIMA Security Practice Briefs.
MentorHealth
Roger Steven
Phone No: 800-385-1607
FaX: 302-288-6884
webinars-AT-mentorhealth.com
Event Link: http://bit.ly/1tB6LZs
http://www.mentorhealth.com/
In this session we will review these steps and create a draft policy example on training and its importance in policy creation, promulgation, enforcement and compliance.. We will also review the key HIPAA Standards and offer recommendations with regards to what should be included and why.
Why should you attend: The key to the HIPAA Security rule compliance is creating, implementing and monitoring effective security policies. Organizations subjected to an OCR audit will be asked for their written policies and procedures. Policies are management’s desires on how they want the organization to operate and procedures are the process to implement management’s wishes. In this session, we will review techniques to create policies with muscle that are effective in reducing risks to the organization. HIPAA requires that organizations have written policies that are implemented.
Areas Covered in the Session:
How to create policies and Procedures
Educate your users
Monitoring your Policies
Establishing Security Sanctions for your Policies
Who Will Benefit:
Information Security Officers
Compliance Officers
Chief Information Officers
William Miaoulis CISA, CISM, is a senior healthcare information system (IS) professional with more than 20 years of healthcare Information Security experience. Bill is the founder and primary consultant for HSP Associates. Prior to starting HSP Associates in January of 2013, Bill was the Chief Information Security Officer (CISO) and led the HIPAA security and privacy consulting efforts for Phoenix Health Systems for over 11 years and also was the HIPAA Consulting Manager for SAIC for 18 months. For seven years, Miaoulis was the University of Alabama Birmingham (UAB) Medical Center’s Information Security Officer, where he instituted the first security and privacy programs at UAB starting in October 1992.
Miaoulis contributes to the industry by frequently speaking at conferences on security matters, including recent sessions on Risk Analysis/Risk Management, Creating and Implementing Effective Security Policies, Understanding the HIPAA Security Rule, and Creating Effective Security Incident Response Procedures. Miaoulis has been interviewed and quoted by numerous publications including: SC Magazine, Health Data Management, Briefings on Healthcare Security, Computerworld; and Health Information Compliance Insider. Miaoulis has worked with AHIMA to produce the book “Preparing for a HIPAA Security Compliance Assessment” and also has worked on updating the AHIMA Security Practice Briefs.
MentorHealth
Roger Steven
Phone No: 800-385-1607
FaX: 302-288-6884
webinars-AT-mentorhealth.com
Event Link: http://bit.ly/1tB6LZs
http://www.mentorhealth.com/
Other CFPs
- Obstructive Sleep Apnea and the Perioperative Period - Webinar By MentorHealth
- The International Conference on Computational Intelligence, Communication and Signal Processing
- 2015 5th International Conference on Applied Physics and Mathematics
- 2015 the 2nd International Conference on Advances in Electronics Engineering
- 2015 International Conference on Mechanical Manufacturing and Optimization(ICMMO 2015)
Last modified: 2014-08-12 15:33:13