BEGIN:VCALENDAR VERSION:2.0 PRODID:icalendar-ruby CALSCALE:GREGORIAN BEGIN:VEVENT DTSTAMP:20240329T005133Z UID:1d1a1bf7-ef69-48f7-b2c8-ebb6bbeae25b DTSTART:20210309T090000 DTEND:20210310T090000 CLASS:PRIVATE DESCRIPTION:\n
*** LIMITED TIME OFFER: FREE $100 AMAZON GIFT CARD! **
*
\nREGISTER TODAY!
 \ ;
\n\nThis two day seminar takes the p articipants through HIPAA compliance from start to compliance.
\ n\nThe first presentation explains the hi story of HIPAA\, why it came to being and its evolution. This covers what HIPAA is\, what steps have to be performed to be HIPAA compliant and what HIPAA compliance is. It also provides definitions to key HIPAA terms\, how to define a Business Associate and how to contract with Business Associat es. The second part of the first presentation is an overview of how to man age the HIPAA compliance project. At the end of these presentations there will be a workshop to demonstrate how to use these tools.
\n\nThe second session describes what a Risk As sessment is and how to perform the risk assessment. The materials take the participant through the factors of HIPAA compliance and how to perform a HIPAA Risk Assessment. This encompasses taking the participants through ho w to do a HIPAA Privacy Risk Assessment\, how to do a HIPAA Security Asses sment and how to interpret the results\, set priorities and develop a plan for addressing the Risk Assessment findings. The end of this session will encompass a short workshop demonstrating how to use the Risk Assessment t ools discussed in the presentation
\n\nThe third session takes the participants through how to prepare a set of HIPAA Policies and Procedures. This includes how to reference the H IPAA regulations in preparing the policies and procedures\, how to referen ce the prior HIPAA Risk Assessments and how to prepare the HIPAA training materials. At the end of the session\, there will be participant workshop on how to prepare a HIPAA policy and procedure.
\n\nThe day'\;s last session shows the participants ho w to develop and give a HIPAA training session. The materials present the basics of what needs to be included in the training program\, who has to b e trained and how to conduct the training.
\n\nThe first session of the second day provides the participa nts with an orientation of the role the IT services in the healthcare orga nization in addressing the organization'\;s HIPAA compliance. This enco mpasses understanding what role IT hardware and software plays in the HIPA A compliance process\, what responsibilities IT vendors should have and ho w to work with vendors. The materials will discuss IT security in the cont ext of an overall organization security program including the value and ap proach of an IT security vulnerability test. At the end of this session wi ll be a discussion of issues facing the participants and how they can use the information in this session in their own organizations.
\n\nThe second session of the second focuses on an area often missed in performing HIPAA assessments: the business cont inuation and disaster recovery planning. This session takes the participan ts through the process of considering what can/may happen that could put t he healthcare organization out of business and how to develop methods for mitigating those risks. At the end of this session will be a sample assess ment discussion and workshop.
\n\nIn the third session\, participants will review what a HIPAA breach is and what to do when a HIPAA breach occurs. This includes determining if a notification occurred\, notification requirements and mitigation options. At the end of this session will be a round table discussion of the issues related to breaches as they affect the participants.
\n\nA lthough healthcare news and the internet is replete with articles and desc riptions of the HIPAA privacy and security regulations\, there remain many misconceptions of what these regulations mean to healthcare organizations and what they\, and their business associates\, need to do to become comp liant. Healthcare organizations know they have to secure patient health ca re information. However\, a number of questions need to be answered to mee t that goal.
\n\nWhat does this mean? Do the HIPAA regulations apply to the organization? What are the or ganization'\;s risks and how does the organization mitigate these risks ? What does the organization have to do and how does the organization do i t? What role does the organization'\;s computer resources have in the r isks? How safe is my computer and paper patient information? How does the organization know if its computer resources provide the needed features an d functions for the organization to become compliant? What resources are n eeded and what do these resources need to do? What is a Risk Assessment an d why does the organization need one? Does the organization need an attorn ey or a consultant? How does the organization know if it is compliant? Wha t is a breach and how does the health care organization know if a breach o ccurred? What happens if there is a breach? What effect do the use of soci al media (Facebook\, Twitter\, etc.) and mobile devices (iphones\, ipads a nd laptops) have on the organization'\;s ability to be HIPAA compliant? What is a Business Associate and how does the organization work with the Business Associates? What are the potential penalties - both organizationa l and individual? Should the organization consider HIPAA insurance?
\n\nShould a breach occur\, the penal ties will depend upon the diligence the organization used to answer these questions and become compliant. Answering these questions and developing a nd executing a plan to become compliant is critical to ensuring that the o rganization commits the needed resources and attains the desired result. span>
\n\n \;
\n SUMMARY:HIPAA Compliance 2021 (ntz) A BEGIN:VALARM ACTION:DISPLAY TRIGGER:-PT1H SUMMARY:HIPAA Compliance 2021 (ntz) A END:VALARM END:VEVENT END:VCALENDAR