HIPAA and Mobile Devices 2016 - Webinar on HIPAA and Mobile Devices 2016
Date2016-10-04
Deadline2016-10-03
VenueOnline Event, USA - United States
KeywordsHIPAA Risk Assessment; HIPAA and Mobile Devices; Maintaining Privacy and Securi
Topics/Call fo Papers
Overview:
This session will review the requirements and current issues pertaining to mobile devices and present ways for the attendees to consider how to meet patient desires and stay within the regulations, including processes for managing portable devices, policies needed for ensuring secure communications and storage where needed, and procedures for meeting and documenting patient requests.
The session will explain the HIPAA regulations that apply to the use of portable devices, both as tools for staff to use, and as a means of communication with patients. Proper use of portable devices requires consideration of a variety of purposes: for personal use, for business use not involving any identifiable patient information, for business use that does involve identifiable patient information, and for commnications with patients. Each type of use requires careful consideration of the rules and the risks to the confidentiality, integrity, and availability of information.
For business uses with no patient information, the constraints are few, so long as you are sure there is no patient information involved with those uses, But if you include any patient information, you need to ensure the information is protected. Even so, patients are allowed to ask to communicate with you in any way you can reasonably handle. Just what is reasonable and what is allowed according to guidance from HHS is discussed.
When it comes to using mobile devices to interact with medical records systems, the National Institute of Standards and Technology has issued draft guidance on such use (NIST SP 1800-1), including recommendations on how to secure communications and how to vet your HIPAA business associates providing communications. The guidance will be presented and discussed.
Once patient information is involved, the devices used by a provider or their staff must be properly secured through the use of good passscodes and encryption with remote wiping of data if lost or stolen, and if you allow staff to use their own devices for business work, what happens when they trade in their old phone when the new one comes out?
If you communicate with patients using portable devices, you need to consider the issues of privacy and security, as well as those of triaging incoming connuications and documenting conversations. Just plain texting is not readily adaptable to the requirements of patient care and documentation, but secure, appropriate solutions are available.
Finally, we will discuss the enforcement of HIPAA rules and how they relate to mobile devices, the issues that can lead to enforcement, and the impacts of enforcement actions, including monetary settlements and corrective action plans.
Why should you Attend:
The HIPAA regulations require the use of the mode of communication requested by the individual, if the provider has the capability to reasonably do so, and also require the consideration of secure technologies for communications and storage of data. The result is that the use of portable devices by patients and staff can be complicated and requires careful consideration of the regulations, how the devices will be used and secured, and patient desires.
HHS compliance audit activity and enforcement penalties are both increased, especially in instances of willful neglect of compliance, if, for instance, your organization hasn’t adequately considered the impact of mobile devices on your compliance. Given that mobile devices are a leading source of breaches of PHI, it is essential to consider these devices and how their use affects the privacy and security of PHI; not doing so is inviting enforcement action by HHS.
Areas Covered in the Session:
Presentation of information security issues related to communications and the risks associated with insecure communications, so you can know how to explain the risks of insecure communications to patients.
Presentation of information security issues related to communications and the risks associated with insecure communications, so you can know how to explain the risks of insecure communications to patients.
Presentation of the new NIST SP 1800-1 guidance on using mobile technology with medical records systems.
Discussion of policies and procedures for managing and auditing the use of insecure communications including communications made at the request of patients.
Presentation of requirements for encryption according to best practices
Explanation of technologies that can provide such encryption and security, to help you know when secure communications are required and what must be done to secure communications and devices.
Learn about the training and education that must take place and be documented to ensure your staff uses portable health information properly and does not risk exposure of PHI.
Who Will Benefit:
Compliance director
CEO
CFO
Privacy Officer
Security Officer
Information Systems Manager
HIPAA Officer
Chief Information Officer
Health Information Manager
Healthcare Counsel/lawyer
Office Manager
Speaker Profile :
Jim Sheldon Dean is the founder and director of compliance services at Lewis Creek Systems, LLC, a Vermont-based consulting firm founded in 1982, providing information privacy and security regulatory compliance services to a wide variety of health care entities.
Sheldon-Dean serves on the HIMSS Information Systems Security Workgroup, has co-chaired the Workgroup for Electronic Data Interchange Privacy and Security Workgroup, and is a recipient of the WEDI 2011 Award of Merit. He is a frequent speaker regarding HIPAA and information privacy and security compliance issues at seminars and conferences, including speaking engagements at numerous regional and national healthcare association conferences and conventions and the annual NIST/OCR HIPAA Security Conference in Washington, D.C.
Sheldon-Dean has more than 30 years of experience in policy analysis and implementation, business process analysis, information systems and software development. His experience includes leading the development of health care related Web sites; award-winning, best-selling commercial utility software; and mission-critical, fault-tolerant communications satellite control systems. In addition, he has eight years of experience doing hands-on medical work as a Vermont certified volunteer emergency medical technician. Sheldon-Dean received his B.S. degree, summa cum laude, from the University of Vermont and his master’s degree from the Massachusetts Institute of Technology.
Price : $139.00
Contact Info:
MentorHealth
Phone No: 1-800-385-1607
FaX: 302-288-6884
support-AT-mentorhealth.com
Event Link: http://bit.ly/HIPAA-and-Mobile-Devices
http://www.mentorhealth.com/
LinkedIn Follow us ? https://www.linkedin.com/company/mentorhealth
Twitter Follow us ? https://twitter.com/MentorHealth1
Facebook Like us? https://www.facebook.com/MentorHealth1
This session will review the requirements and current issues pertaining to mobile devices and present ways for the attendees to consider how to meet patient desires and stay within the regulations, including processes for managing portable devices, policies needed for ensuring secure communications and storage where needed, and procedures for meeting and documenting patient requests.
The session will explain the HIPAA regulations that apply to the use of portable devices, both as tools for staff to use, and as a means of communication with patients. Proper use of portable devices requires consideration of a variety of purposes: for personal use, for business use not involving any identifiable patient information, for business use that does involve identifiable patient information, and for commnications with patients. Each type of use requires careful consideration of the rules and the risks to the confidentiality, integrity, and availability of information.
For business uses with no patient information, the constraints are few, so long as you are sure there is no patient information involved with those uses, But if you include any patient information, you need to ensure the information is protected. Even so, patients are allowed to ask to communicate with you in any way you can reasonably handle. Just what is reasonable and what is allowed according to guidance from HHS is discussed.
When it comes to using mobile devices to interact with medical records systems, the National Institute of Standards and Technology has issued draft guidance on such use (NIST SP 1800-1), including recommendations on how to secure communications and how to vet your HIPAA business associates providing communications. The guidance will be presented and discussed.
Once patient information is involved, the devices used by a provider or their staff must be properly secured through the use of good passscodes and encryption with remote wiping of data if lost or stolen, and if you allow staff to use their own devices for business work, what happens when they trade in their old phone when the new one comes out?
If you communicate with patients using portable devices, you need to consider the issues of privacy and security, as well as those of triaging incoming connuications and documenting conversations. Just plain texting is not readily adaptable to the requirements of patient care and documentation, but secure, appropriate solutions are available.
Finally, we will discuss the enforcement of HIPAA rules and how they relate to mobile devices, the issues that can lead to enforcement, and the impacts of enforcement actions, including monetary settlements and corrective action plans.
Why should you Attend:
The HIPAA regulations require the use of the mode of communication requested by the individual, if the provider has the capability to reasonably do so, and also require the consideration of secure technologies for communications and storage of data. The result is that the use of portable devices by patients and staff can be complicated and requires careful consideration of the regulations, how the devices will be used and secured, and patient desires.
HHS compliance audit activity and enforcement penalties are both increased, especially in instances of willful neglect of compliance, if, for instance, your organization hasn’t adequately considered the impact of mobile devices on your compliance. Given that mobile devices are a leading source of breaches of PHI, it is essential to consider these devices and how their use affects the privacy and security of PHI; not doing so is inviting enforcement action by HHS.
Areas Covered in the Session:
Presentation of information security issues related to communications and the risks associated with insecure communications, so you can know how to explain the risks of insecure communications to patients.
Presentation of information security issues related to communications and the risks associated with insecure communications, so you can know how to explain the risks of insecure communications to patients.
Presentation of the new NIST SP 1800-1 guidance on using mobile technology with medical records systems.
Discussion of policies and procedures for managing and auditing the use of insecure communications including communications made at the request of patients.
Presentation of requirements for encryption according to best practices
Explanation of technologies that can provide such encryption and security, to help you know when secure communications are required and what must be done to secure communications and devices.
Learn about the training and education that must take place and be documented to ensure your staff uses portable health information properly and does not risk exposure of PHI.
Who Will Benefit:
Compliance director
CEO
CFO
Privacy Officer
Security Officer
Information Systems Manager
HIPAA Officer
Chief Information Officer
Health Information Manager
Healthcare Counsel/lawyer
Office Manager
Speaker Profile :
Jim Sheldon Dean is the founder and director of compliance services at Lewis Creek Systems, LLC, a Vermont-based consulting firm founded in 1982, providing information privacy and security regulatory compliance services to a wide variety of health care entities.
Sheldon-Dean serves on the HIMSS Information Systems Security Workgroup, has co-chaired the Workgroup for Electronic Data Interchange Privacy and Security Workgroup, and is a recipient of the WEDI 2011 Award of Merit. He is a frequent speaker regarding HIPAA and information privacy and security compliance issues at seminars and conferences, including speaking engagements at numerous regional and national healthcare association conferences and conventions and the annual NIST/OCR HIPAA Security Conference in Washington, D.C.
Sheldon-Dean has more than 30 years of experience in policy analysis and implementation, business process analysis, information systems and software development. His experience includes leading the development of health care related Web sites; award-winning, best-selling commercial utility software; and mission-critical, fault-tolerant communications satellite control systems. In addition, he has eight years of experience doing hands-on medical work as a Vermont certified volunteer emergency medical technician. Sheldon-Dean received his B.S. degree, summa cum laude, from the University of Vermont and his master’s degree from the Massachusetts Institute of Technology.
Price : $139.00
Contact Info:
MentorHealth
Phone No: 1-800-385-1607
FaX: 302-288-6884
support-AT-mentorhealth.com
Event Link: http://bit.ly/HIPAA-and-Mobile-Devices
http://www.mentorhealth.com/
LinkedIn Follow us ? https://www.linkedin.com/company/mentorhealth
Twitter Follow us ? https://twitter.com/MentorHealth1
Facebook Like us? https://www.facebook.com/MentorHealth1
Other CFPs
- 2017 6th International Conference on Software and Information Engineering (ICSIE 2017)
- PSIKOPEDAGOGIA Jurnal Bimbingan dan Konseling
- 8th International Conference on Modern Trends in Science, Engineering and Technology 2017
- IABE 2017 Dubai Winter Conference - Seek Share Innovate Transform
- Conference on Leadership and Team Development for Managerial Success
Last modified: 2016-08-18 18:47:49