Lessons from OCR Audits – Risk Analysis Explained Step-by-Step

 April 24th, 2019 - April 24th, 2019 

The Phase 2 HIPAA Compliance Audit, increasing breaches of unsecured protected health information and rampant medical identity theft reveal a national crisis in HIPAA compliance. The Office for Civil Rights (OCR), the HIPAA enforcement arm of the U. S. Department of Health and Human Services (HHS), is ramping up enforcement. And a basic HIPAA requirement, … Read more

Cybersecurity in Healthcare – How to Prevent the Next Attack

 April 17th, 2019 - April 17th, 2019 

With the ever-changing landscape of cybersecurity, there are many threats, vulnerabilities, and malicious individuals trying to take down your network or get access to ePHI. With ePHI being the most valuable data on the dark web sometimes selling for over $100 per record, the bad people are targeting your organization. We will first look at … Read more

HIPAA and Having a Compliant Front Office

 April 11th, 2019 - April 11th, 2019 

The problem with HIPAA compliance is that it permeates so many aspects of your practice. Here are a few more examples of areas that could be HIPAA time bombs unless you take action immediately: Social Media Patient Information Access Patient reminder calls Release of Information (to both patients and other providers) Family Member Request for … Read more

HIPAA & The Medical Practice: Requirements for Privacy, Security and Breach Notification

 April 8th, 2019 - April 9th, 2019 

Any provider that transmits any information in electronic form (doctors, clinics, hospitals, surgical centers, psychologists, dentists, chiropractors, nursing homes, assisted living, pharmacies, etc.) is a covered entity under HIPAA and, therefore, must comply with HIPAA laws and regulations. The Health Insurance Portability and Accountability Act of 1996 was passed by Congress in order to require … Read more

HIPAA and Health IT – What you Need to Know as a Business Associate

 February 6th, 2018  

As defined by the Health Information Portability and Accountability Act (HIPAA), a Business Associate can be any organization or person working in association with or providing services to a Covered Entity who handles or discloses Protected Health Information (PHI) or Personal Health Records (PHR). With certain exceptions, a person or entity that creates, receives, maintains, … Read more

HIPAA Requirements for Safeguarding Protected Health Information

 January 24th, 2018  

Being in compliance with HIPAA involves not only ensuring you provide the appropriate patient rights and controls on your uses and disclosures of protected health information, but you also have the proper policies and procedures in place. If audited or the subject of a compliance review you will be required to show the government you … Read more

Webinar on Conducting HIPAA Security Risk Assessment

 December 11th, 2017 - August 1st, 2018

Please note! This event is not a physical conference (like the rest of our events in our directory) but an online Cybersecurity Webinar This course will cover the proper methodologies on conducting a HIPAA Risk Assessment based on the formula used by Federal auditors and via the guidelines of the NIST (National Institute of Standard for … Read more

Understand the HIPAA Security & Privacy Rules

 November 22nd, 2017 - August 1st, 2018

Please note! This event is not a physical conference (like the rest of our events in our directory) but an online Cybersecurity Webinar With a substantial increase HIPAA data breaches and increased government enforcement, organizations must understand the HIPAA Security & Privacy Rules Attendees will leave the course clearly understanding of all the requirements that must … Read more

MentorHealth Webinar On HIPAA and the IT Manager

 November 22nd, 2017 - August 1st, 2018

Please note! This event is not a physical conference (like the rest of our events in our directory) but an online Cybersecurity Webinar This lesson will be going into great detail regarding you practice or business information technology and how it relates to the HIPAA Security Rule, in particular portable devices. Areas covered will be texting, … Read more

Webinar on HIPAA Compliance for a Practice Manager

 November 8th, 2017 - August 1st, 2018

Please note! This event is not a physical conference (like the rest of our events in our directory) but an online Cybersecurity Webinar Being in compliance with HIPAA involves not only ensuring you provide the appropriate patient rights and controls on your uses and disclosures of protected health information, but you also have the proper policies … Read more

HIPAA and the Security Officer Webinar

 November 1st, 2017 - August 1st, 2018

Please note! This event is not a physical conference (like the rest of our events in our directory) but an online Cybersecurity Webinar This webinar will be addressing how practice/business managers (or compliance offers) need to get their HIPAA house in order before the imminent audits occur. It will also address major changes under the Omnibus … Read more

HIPAA and Health IT – What you Need to Know as a Business Associate

 October 25th, 2017 - August 1st, 2018

Attendees will leave the course clearly understanding of all the requirements that must be in place for the Business Associate – Covered Entity arrangement. After completing this course, a Business Associate will have a clear understanding as to what needs to be place when it comes to all of the HIPAA regulations.

HIPAA, Ransomware & Cyber Criminal Chaos Prevent, Prepare, Respond and Recover

 October 24th, 2017 - August 1st, 2018

Please note! This event is not a physical conference (like the rest of our events in our directory) but an online Cybersecurity Webinar This webinar for HIPAA Covered Entities and Business Associates explains how to use the HIPAA Rules to Prevent, Prepare, Respond and Recover from Ransomware Attacks. There is a secret to HIPAA Compliance. The … Read more

De-Identification of PHI under HIPAA

 October 16th, 2017 - August 1st, 2018

If information is not properly de-identified and released inappropriately as a result, it can result in fines and corrective action plans that can reach into the millions of dollars. The right process needs to be followed to ensure that data that is shared is shared appropriately, either as identifiable information, as a partially de-identified Limited … Read more

HIPAA Requirements for Safeguarding Protected Health Information

 October 12th, 2017 - August 1st, 2018

(Although this is not specifically a Cybersecurity Conference we’ve included it because the subject matter is useful and important to the community). Attendees will leave the course clearly understanding of all the requirements that must be in place for protecting the health records their organizations maintain, create, transmit, or store. After completing this course, a … Read more

HIPAA Breach Notification in 5 Steps for Covered Entities and Business Associates

 October 10th, 2017 - August 1st, 2018

Please note! This event is not a physical conference (like the rest of our events in our directory) but an online Cybersecurity Webinar This webinar explains the inter-connected Breach Notification Rule requirements of Covered Entities and Business Associates when a Business Associate or Subcontractor Business Associate suffers a Breach. And it covers the special, more restrictive … Read more