This training on HIPAA compliance will teach the attendees how to examine their security policies, practices, and risk issues to find and fill any gaps in the documentation that is required by the HIPAA rules to show compliance, survive audits, and avoid enforcement action.
Organizations that have not performed the complete process of Risk Analysis, including Gap Analysis and Risk Assessments, are more likely to suffer incidents and breaches of ePHI, including those caused by inappropriate un-reviewed or uncontrolled internal access, and those caused by external factors, such as Ransomware incidents that can bring an organization to its knees. Even relatively simple processes, like ensuring that all portable devices holding ePHI are properly secured, if undiscovered, can lead to significant breaches and resulting penalties. These kinds of incidents have resulted in the need for notifications to patients and penalties in the millions of dollars for the affected organizations, and could likely have been prevented by performing and following through on a thorough Gap Analysis, Risk Assessment, and Risk Analysis process.
The costs of compliance through Gap Analysis, Risk Assessment, and Risk Analysis are far lower than the costs of not doing what’s required, and suffering the significant expense and consequences of incidents, breaches, and enforcement actions.
Why Should You Attend:
The Health Insurance Portability and Accountability Act (HIPAA) Privacy, Security and Breach Notification Rules require covered entities and their business associates to safeguard electronic protected health information (ePHI) through reasonable and appropriate security measures. One of these measures required by the Security Rule, is a risk analysis, which directs covered entities and business associates to conduct a thorough and accurate assessment the risks and vulnerabilities to ePHI (See 45 CFR § 164.308(a)(1)(ii)(A)). Conducting a risk analysis is the first step in identifying and implementing safeguards that ensure the confidentiality, integrity, and availability of ePHI. A Gap Analysis, to review conformance with the requirements of the HIPAA Rules, is a useful tool to identify whether certain standards and implementation specifications of the Security Rule have been met, and a Risk Assessment of each information handling process is essential to identifying and planning the mitigation of risks to the confidentiality, integrity, and availability of ePHI.Organizations that have not performed the complete process of Risk Analysis, including Gap Analysis and Risk Assessments, are more likely to suffer incidents and breaches of ePHI, including those caused by inappropriate un-reviewed or uncontrolled internal access, and those caused by external factors, such as Ransomware incidents that can bring an organization to its knees. Even relatively simple processes, like ensuring that all portable devices holding ePHI are properly secured, if undiscovered, can lead to significant breaches and resulting penalties. These kinds of incidents have resulted in the need for notifications to patients and penalties in the millions of dollars for the affected organizations, and could likely have been prevented by performing and following through on a thorough Gap Analysis, Risk Assessment, and Risk Analysis process.
The costs of compliance through Gap Analysis, Risk Assessment, and Risk Analysis are far lower than the costs of not doing what’s required, and suffering the significant expense and consequences of incidents, breaches, and enforcement actions.
Areas Covered in the Webinar:
- Requirements for risk management in the HIPAA Security Rule will be explained.
- The results of not managing risks, such as incidents, breaches, and enforcement actions, will be examined.
- How to use risk management methods, such as Gap Analysis, Risk Assessment, and Risk Analysis, to find issues and mitigate them before they cause an incident.
- Learn what is a HIPAA Gap Analysis, how it is performed, and what it tells you.
- Using a process of exploration and discovery to find potential risk issues in information systems and how they are used.
- Understanding the organization-wide risk picture and balancing risk mitigation needs with resource availability.
- Planning the management of risks over time and maintaining the information security management process.
Who Will Benefit:
- This webinar will provide valuable assistance to all personnel in: Medical offices, practice groups, hospitals, academic medical centers, insurers, business associates (shredding, data storage, systems vendors, billing services, etc). the titles are
- Compliance director
- CEO
- CFO
- Privacy Officer
- Security Officer
- Information Systems Manager
- HIPAA Officer
- Chief Information Officer
- Health Information Manager
- Healthcare Counsel/lawyer
- Office Manager
- Contracts Manager
Speaker
Jim Sheldon-DeanCourse Provider
Jim Sheldon-Dean,