Add this event to your calendar
Cybersecurity Conference Description [Submitted by Organizer/ Or Written By Us]
As defined by the Health Information Portability and Accountability Act (HIPAA), a Business Associate can be any organization or person working in association with or providing services to a Covered Entity who handles or discloses Protected Health Information (PHI) or Personal Health Records (PHR). With certain exceptions, a person or entity that creates, receives, maintains, or transmits PHI for a function or activity regulated by the HIPAA Privacy Rule for a Covered Entity is a Business Associate.
The HITECH Act, a recent update made to overall HIPAA regulations require Business Associates to comply with HIPAA mandates regarding the handling and use of health information. As a Business Associate you must comply with a wide-range of regulatory obligations, including certain privacy obligations, security standards, and breach notification requirements.
If your business needs to understand what it means to be a Business Associate and know what required safeguards, policies and procedures must be in place or make sure your current compliance program is adequate and can withstand government scrutiny, please join us for this informative and interactive session.
Why should you Attend: There is a lot of confusion about the role and requirements of being a Business Associate. Organizations must be prepared prior to entering into these contracts for services as a vendor and subcontractor.
Attendees will leave the course clearly understanding of all the requirements that must be in place for the Business Associate – Covered Entity arrangement. After completing this course, a Business Associate will have a clear understanding as to what needs to be place when it comes to all of the HIPAA regulations.
Do You Have A Question Regarding This Event?
About Our Service
We've been listing Cybersecurity Conferences and InfoSec Events for the last seven years which is a VERY long time in cyberspace!
What started as a simple blog post in 2012 spawned into this mega directory which lists, literally, every single IT Security event that takes place around the world at any given time.
We hope you enjoy our resource, and as ever, we'd really appreciate it if you could link back to our site.