Topics
- The elements of a HIPAA Security Risk Analysis will be explained
- The requirements of the HIPAA Security Rule will be presented
- Typical policy considerations for laptops and portable devices, and their security, will be discussed
- A framework of security polices will be presented
- Tools to be used for policy management and documentation will be presented
- We will discuss how to use Risk Analysis to deal with difficult compliance issues, such as texting and social networking
- The HIPAA Audit Protocol will be presented, and its use as a compliance tool will be explained
- How to adopt policies, train on them, and conduct drills on them will be discussed
Who should Attend
CEOs, Compliance directors, Privacy Officers, CFOs, Information Systems Managers, Security Officers, Chief Information Officers, HIPAA Officers, Healthcare Counsel/lawyers, Health Information Managers, Contracts Managers and Office Managers from practice groups, Medical offices, academic medical centers, hospitals, insurers, business associates (data storage, shredding, billing services, systems vendors, etc).