This 90-minute webinar on HIPAA Breach Notification will show how to create an effective breach notification policy for your organization and how to follow through when a breach occurs. You will learn about the kinds of threats that exist for PHI, information security methods you can use to keep breaches from happening, and be in compliance with the HIPAA Security Rule as well.
The presentation will cover what goes into an effective breach notification policy, how to prevent breaches as much as reasonably possible and what steps to take when a security incident or breach has occurred. We will cover the essentials of information security methods you can use to keep breaches from happening, and be in compliance with the HIPAA Security Rule as well. We'll also discuss the new penalties for non compliance, including mandatory penalties for 'willful neglect' that begin at $10,000.
The presenter will explain, based on historical analysis of reported breaches, what measures must be taken today to protect information from the most common threats, as well as discuss information security trends and explain what kinds of efforts will need to be undertaken in the future to protect the security of PHI. We will discuss the kinds of threats that exist for PHI and how they're changing as the hackers gain experience and abilities, and why you need to prepare for next-generation attacks now.
Why Should You Attend:
The HIPAA Breach Notification Rule has been in effect since September 23, 2009 and most organizations are not prepared to respond to a breach of PHI and report and document it properly. We will discuss the origins of the rule and how it works, including interactions with other HIPAA rules and penalties for violations.The presentation will cover what goes into an effective breach notification policy, how to prevent breaches as much as reasonably possible and what steps to take when a security incident or breach has occurred. We will cover the essentials of information security methods you can use to keep breaches from happening, and be in compliance with the HIPAA Security Rule as well. We'll also discuss the new penalties for non compliance, including mandatory penalties for 'willful neglect' that begin at $10,000.
The presenter will explain, based on historical analysis of reported breaches, what measures must be taken today to protect information from the most common threats, as well as discuss information security trends and explain what kinds of efforts will need to be undertaken in the future to protect the security of PHI. We will discuss the kinds of threats that exist for PHI and how they're changing as the hackers gain experience and abilities, and why you need to prepare for next-generation attacks now.
Learning Objectives:
- Learn about the HIPAA Breach Notification Rule
- Find out what is a breach
- What to do to prevent a Breach
- What to do to prepare for a Breach
- What to do when a Breach occurs
- What you have to report, to whom, and when
- How to avoid Breach Notification
- What are the most common types of breaches you can avoid
- What are the new threats to the security of health information
Areas Covered in the Seminar:
- Breach Notification Laws
- State Breach Notification Laws.
- Changes to HIPAA.
- Federal Breach Notification Law and Regulation.
- The Who, What, and How of Breach Notification.
- Preventing and Preparing for Breaches
- Using an Information Security Management Process.
- Using Risk Analysis and Risk Assessment.
- Most Common Types of Breaches.
- Information Security, Incident, and Breach Notification Policies.
- The Importance of Documentation.
- Enforcement and Audits
- New HIPAA Violation Categories and Penalties.
- Preparing for HIPAA Audits.
- Case Studies.
- Future Trends and New Threats to Prepare For
- History vs. the Future
- Why Attack Trends Are Changing
- Implications of New Directions in Attacks and Targets
Who Will Benefit:
- Information Security Officers
- Risk Managers
- Compliance Officers
- Privacy Officers
- Health Information Managers
- Information Technology Managers
- Medical Office Managers
- Chief Financial Officers
- Systems Managers
- Legal Counsel
- Operations Directors
- Medical offices, practice groups, hospitals, academic medical centers, insurers and business associates (shredding, data storage, systems vendors, billing services, etc.) will also benefit.
Course Provider
Jim Sheldon-Dean,