A Leer, A Pat, A Joke, A Gesture, An Innuendo, A Kiss: Are You Prepared To Be the Next Social Media Blitz, Identified on #MeToo, or a Headline in the Newspaper?
Harvey Weinstein, Matt Lauer, Charlie Rose, Al Franken, Garrison Keillor, members of Congress, and various State lawmakers have been accused of sexual harassment and/or sexual assault. But there is a difference between pulling one’s pants down in front of a female colleague at work and touching a woman on her buttocks during a photo op—isn’t there? What is that difference? Are both examples considered sexua..
A whistleblower or qui tam action can provide financial rewards to individuals who provide information that a company, hospital or individual has defrauded the government. The primary statutes under which this relief may be sought are the federal and state False Claims Acts (“FCAs”). State and federal governments pay hundreds of billions of dollars each year for pharmaceutical drugs, medical devices, hospit..
E-Mailing, Texting, and the Use of Personal Devices by Health Care Professionals – HIPAA and Privacy Myths vs Reality
This informative webinar begins with the most basic of questions: Does the HIPAA Privacy Rule permit health care providers to use e-mail to discuss health issues and treatment with their patients?Find out the answer and examine how the privacy rules of HIPAA allow covered entities and health care providers to communicate electronically, such as through e-mail or texting, with their patients and with o..
This webinar provides an overview of core privacy requirements of HIPAA. Then, the subject moves to the social media activities of healthcare practitioners. This webinar provides a brief summary of those basic HIPAA privacy protections then goes into detail on the many ways a health care provider may run afoul of the privacy exceptions via the use of social media. This may occur both when a healthcare pract..
While the basics of HIPAA privacy are well known, and while health care practitioners know how to maintain privacy and to keep the information confidential, fear exists in not knowing the many exceptions enjoyed by law enforcement as used for government or public purposes. These exceptions not only allow but require a health care practitioner to release information. Uncertainty exists when faced with a high..
When contemplating the use of a supplier you would normally have many requirements and expectations that must be met. These include technical, regulatory, quality, responsiveness, location, readiness, and those less defined but critical. One of the tools at your disposal to verify the supplier’s acceptability is to audit its operation. This webinar is designed to provide the participants a working knowledge..
I will be speaking to real life audits conducted by the Federal government for Phase 2 and beyond (I’ve been on both sides of these audits) what your highest risks are for being fined (some of the risk factors may surprise you). It seems almost daily I am receiving calls from nervous practice managers and compliance officers all over the USA regarding a HIPAA audit letter or call they have received. This le..
This webinar will be addressing how practice/business managers (or compliance offers) need to get their HIPAA house in order before the imminent audits occur. It will also address major changes under the Omnibus Rule and any other applicable updates for 2018. Areas also covered will be texting, email, encryption, medical messaging, voice data and risk factors as they relate to IT. The primary goal is to ens..
This lesson will be addressing how practice/business managers (or compliance offers) need to ensure their organization is complying with the Federal Substance Abuse and Mental Health Administration (SAMHSA) regulations (42 CFR Part 2) and how this differs from the HIPAA (Health Insurance Portability and Accountability Act) Privacy and Security Regulations. Both regulations carry significant civil and even c..
This webinar will cover the following benefits and applications of this material with the start of detailed speaker information to integrate education, training, and experience with detailed course objectives and disclaimers.The webinar will then start with an overview of the core privacy requirements of HIPAA, the basics of which should be well-known and practiced by all health care practitioners. Then, th..
This webinar will follow the concept of “Culture” from its anthropological roots to sociology, business and then audit testing. Participants will learn what defines culture and why it is important. Then we will explore various ideas on what constitutes a successful corporate culture. Once we are comfortable with these concepts we will then link them to auditable tests and explain to auditors, and others, ex..
Hot topics and new developments in the legal separation of powers doctrine in state government: The impact, success, and failure of a Governor’s executive orders as applied to state health care licensure boards, agencies, and commissions governing health care regulation.This webinar will cover the following benefits and applications of this material with the start of detailed speaker information to integrat..
This webinar explains the risks related to application development, implementation, and use. After exploring each risk we delve into ways that those risks can be mitigated or managed in accordance with an organization's risk appetite and/or tolerance.In this webinar we will look at managing risks from two distinct perspectives: 1) as individual applications and 2) as a portfolio of applications. Each perspe..
This webinar explores what it means to be trusted, how to give advice and what it takes to be an advisor. We start by looking at behaviors and organizational challenges that auditors exhibit or face. From expected roles and responsibilities to tradition to regulator dependence, auditors must deal with several influences that seem to deter progress in this area.We then provide a profile of what a trusted adv..
The holistic approach to fraud management will address all key components of fraud management: from the fraud risk assessment to board reporting. While we will not dwell on the fraud risk assessment we will specifically focus, in detail, on Governance Practices, Control Activities, Fraud Investigations, Fraud Monitoring, and Auditing Fraud Risk Management. Participants will learn the keys to implementing be..