HIPAA / HITECH
Learn to identify and apply differing and conflicting rules with respect to the specific health care practitioner, the specific health care facility practice, and the emerging rules and regulations for electronic medical records confidentiality, security, and disposition. In addition to these clinical requirements of a specific profession, additional state laws set forth the content and retention of other t..
The topic is breaches of the impermissible use or disclosure of protected health information and for state law, personal information. A breach risk assessment is required with 4 questions that must be addressed. We will review the breach risk assessment, identifying a breach, no breach is too small to review and report, and what to do when a major breach (500 records) or more is involved. With a major b..
E-Mailing, Texting, and the Use of Personal Devices by Health Care Professionals – HIPAA and Privacy Myths vs Reality
This informative webinar begins with the most basic of questions: Does the HIPAA Privacy Rule permit health care providers to use e-mail to discuss health issues and treatment with their patients?Find out the answer and examine how the privacy rules of HIPAA allow covered entities and health care providers to communicate electronically, such as through e-mail or texting, with their patients and with other h..
A whistleblower or qui tam action can provide financial rewards to individuals who provide information that a company, hospital, or individual has defrauded the government. The primary statutes under which this relief may be sought are the federal and state False Claims Acts (“FCAs”). State and federal governments pay hundreds of billions of dollars each year for pharmaceutical drugs, medical devices, hospi..
Each year, healthcare organizations are finding that cell phones are more essential than ever before for maximizing employee efficiency and patient connectedness. Join our live webinar to understand how you and your organization can employ cell phones for increased efficiency without leaving your team exposed to legal risk. In this webinar, we willDiscuss the OCR increase in HIPAA enforcementReview the ways..
This webinar provides an overview of core privacy requirements of HIPAA. Then, the subject moves to the social media activities of healthcare practitioners. This webinar provides a brief summary of those basic HIPAA privacy protections then goes into detail on the many ways a health care provider may run afoul of the privacy exceptions via the use of social media. This may occur both when a healthcare pract..
This webinar will cover the following benefits and applications of this material with the start of detailed speaker information to integrate education, training, and experience with detailed course objectives and disclaimers.The webinar will then start with an overview of the core privacy requirements of HIPAA, the basics of which should be well-known and practiced by all health care practitioners. Then, th..
HIPAA and the Administrative Subpoena – How HIPAA Does or Doesn't Protect you When the Government comes Calling for your Patient Records and you are in Trouble
This webinar reviews core privacy requirements of HIPAA then covers in detail the ways state licensure boards and agencies use the authority of state law to cover HIPAA exceptions and gain access to your patient records. This webinar shows how state agencies use state law in concert with HIPAA exceptions to conduct government-lead investigations. These exceptions can also be used by federal agencies in the ..
This webinar provides an overview of core privacy requirements of HIPAA, the basics of which should be well-known and practiced by all health care practitioners. These provisions cover office staff and others. Then, the subject moves to patient privacy in a digital age, with a review of social media activities of health care practitioners and employees.This webinar thus provides a brief summary of those bas..
I will be speaking to real life audits conducted by the Federal government for Phase 2 and beyond (I’ve been on both sides of these audits) what your highest risks are for being fined (some of the risk factors may surprise you). It seems almost daily I am receiving calls from nervous practice managers and compliance officers all over the USA regarding a HIPAA audit letter or call they have received. This le..
There is a lot to know about HIPAA and there have been numerous changes in the past few years most practices are not aware of that could cost your practice in productivity, fines and loss of reputation. We will review HIPAA compliance from A to Z. Everything you need to know will be covered, including your responsibilities of holding the title, HIPAA Compliance Officer. Patient rights to their m..
While the basics of HIPAA privacy are well known, and while health care practitioners know how to maintain privacy and to keep the information confidential, fear exists in not knowing the many exceptions enjoyed by law enforcement as used for government or public purposes. These exceptions not only allow but require a health care practitioner to release information. Uncertainty exists when faced with a high..
This webinar will be addressing how practice/business managers (or compliance offers) need to get their HIPAA house in order before the imminent audits occur. It will also address major changes under the Omnibus Rule and any other applicable updates for 2018. Areas also covered will be texting, email, encryption, medical messaging, voice data and risk factors as they relate to IT. The primary goal is to ens..
This lesson will be addressing how practice/business managers (or compliance offers) need to ensure their organization is complying with the Federal Substance Abuse and Mental Health Administration (SAMHSA) regulations (42 CFR Part 2) and how this differs from the HIPAA (Health Insurance Portability and Accountability Act) Privacy and Security Regulations. Both regulations carry significant civil and even c..
This lesson will be going into great detail regarding your practice or business information technology and how it relates to the HIPAA/HITECH Security Rule and securing PHI in transmission. I will go through multiple examples and specific scenarios and also offer simple common-sense solutions.Areas covered will be texting, email, encryption, medical messaging, voice data, personal devices, and risk factors...