Recorded Webinars
4-Hour Virtual Seminar on How to be HIPAA Compliant
This 4-hour seminar takes the participants through HIPAA compliance from start to compliance.
- Jim Wener
- Recorded
- Price: $495.00
- View Details
4-Hour Virtual Seminar on How to be HIPAA Compliant
This 4-hour seminar takes the participants through HIPAA compliance from start to compliance.
- Jim Wener
- Recorded
- Price: $495.00
- View Details
4-Hour Virtual Seminar on How to be HIPAA Compliant
This 4-hour webinar takes the participants through HIPAA compliance from start to compliance.
- Jim Wener
- Recorded
- Price: $495.00
- View Details
4-Hour Virtual Seminar on How to be HIPAA Compliant
This 4-hour webinar takes the participants through HIPAA compliance from start to compliance.
- Jim Wener
- Recorded
- Price: $495.00
- View Details
How to Perform a HIPAA Risk Assessment
The primary goal of this session is to demonstrate why the health care organization needs to perform a risk assessment and how to perform the risk assessment.
- Jim Wener
- Recorded
- Price: $179.00
- View Details
Key Factors to Develop HIPAA Policies and Procedures
One of the major requirements of the health care organization to be HIPAA compliant is to develop and implement a set of HIPAA privacy and security policies and procedures. This can be a daunting task for those not knowing where to start and what a set of HIPAA privacy and security policies and procedures should look like.
- Jim Wener
- Recorded
- Price: $179.00
- View Details
Key Factors to Develop HIPAA Policies and Procedures
One of the major requirements of the health care organization to be HIPAA compliant is to develop and implement a set of HIPAA privacy and security policies and procedures. This can be a daunting task for those not knowing where to start and what a set of HIPAA privacy and security policies and procedures should look like. For the cost conscious health care organization, the HIPAA policies and procedures can have multiple uses: first, they can become a basis for training the health care organization workforce second, they can be used as a basis for conducting a HIPAA self-assessment and third, they can be used to demonstrate due diligence should there be a breach or an external HIPAA compliance audit.
- Jim Wener
- Recorded
- Price: $179.00
- View Details
How to Perform a HIPAA Risk Assessment
The primary goal of this session is to demonstrate why the health care organization needs to perform a risk assessment and how to perform the risk assessment. This includes a description of the types of breaches of protected health information that have already occurred and the reasons those breaches happened. The presentation then provides that reasons that a risk assessment is required in a health care organization and who needs to perform the assessment.
- Jim Wener
- Recorded
- Price: $179.00
- View Details
How to Ensure a Successful Health Care Systems Implementation
The presentation takes the participant through the steps needed to ensure a successful health care computer system implementation. Once presented the participant will see the logic of the tools and processes and be able to apply them to their system implementation. The tools and processes presented in this material have been developed by implementing health care systems for over 40 years and seeing what has worked and WHY it has worked. These tools and processes have been equally and successfully applied to the implementation of large, complex systems and smaller, simpler systems for large, multidepartment organizations and for small health care organizations.
- Jim Wener
- Recorded
- Price: $179.00
- View Details
How to Perform a HIPAA Risk Assessment
The primary goal of this session is to demonstrate why the health care organization needs to perform a risk assessment and how to perform the risk assessment. This includes a description of the types of breaches of protected health information that have already occurred and the reasons those breaches happened. The presentation then provides that reasons that a risk assessment is required in a health care organization and who needs to perform the assessment.
- Jim Wener
- Recorded
- Price: $179.00
- View Details
Key Factors to Develop HIPAA Policies and Procedures
One of the major requirements of the health care organization to be HIPAA compliant is to develop and implement a set of HIPAA privacy and security policies and procedures. This can be a daunting task for those not knowing where to start and what a set of HIPAA privacy and security policies and procedures should look like. For the cost conscious health care organization, the HIPAA policies and procedures can have multiple uses: first, they can become a basis for training the health care organization workforce; second, they can be used as a basis for conducting a HIPAA self-assessment; and third, they can be used to demonstrate due diligence should there be a breach or an externalHIPAA compliance audit.
- Jim Wener
- Recorded
- Price: $179.00
- View Details
How to Perform a HIPAA Risk Assessment
The primary goal of this session is to demonstrate why the health care organization needs to perform a risk assessment and how to perform the risk assessment. This includes a description of the types of breaches of protected health information that have already occurred and the reasons those breaches happened. The presentation then provides that reasons that a risk assessment is required in a health care organization and who needs to perform the assessment.
- Jim Wener
- Recorded
- Price: $179.00
- View Details
Key Factors to Develop HIPAA Policies and Procedures
One of the major requirements of the health care organization to be HIPAA compliant is to develop and implement a set of HIPAA privacy and security policies and procedures. This can be a daunting task for those not knowing where to start and what a set of HIPAA privacy and security policies and procedures should look like. For the cost conscious health care organization, the HIPAA policies and procedures can have multiple uses: first, they can become a basis for training the health care organization workforce; second, they can be used as a basis for conducting a HIPAA self-assessment; and third, they can be used to demonstrate due diligence should there be a breach or an externalHIPAA compliance audit.
- Jim Wener
- Recorded
- Price: $179.00
- View Details
How to Perform a HIPAA Risk Assessment
The primary goal of this session is to demonstrate why the health care organization needs to perform a risk assessment and how to perform the risk assessment. This includes a description of the types of breaches of protected health information that have already occurred and the reasons those breaches happened. The presentation then provides that reasons that a risk assessment is required in a health care organization and who needs to perform the assessment.
- Jim Wener
- Recorded
- Price: $179.00
- View Details
Key Factors to Develop HIPAA Policies and Procedures
One of the major requirements of the health care organization to be HIPAA compliant is to develop and implement a set of HIPAA privacy and security policies and procedures. This can be a daunting task for those not knowing where to start and what a set of HIPAA privacy and security policies and procedures should look like. For the cost conscious health care organization, the HIPAA policies and procedures can have multiple uses: first, they can become a basis for training the health care organization workforce; second, they can be used as a basis for conducting a HIPAA self-assessment; and third, they can be used to demonstrate due diligence should there be a breach or an externalHIPAA compliance audit.
- Jim Wener
- Recorded
- Price: $179.00
- View Details
Key Factors to Develop HIPAA Policies and Procedures
One of the major requirements of the health care organization to be HIPAA compliant is to develop and implement a set of HIPAA privacy and security policies and procedures. This can be a daunting task for those not knowing where to start and what a set of HIPAA privacy and security policies and procedures should look like. For the cost conscious health care organization, the HIPAA policies and procedures can have multiple uses: first, they can become a basis for training the health care organization workforce; second, they can be used as a basis for conducting a HIPAA self-assessment; and third, they can be used to demonstrate due diligence should there be a breach or an external HIPAA compliance audit.
- Jim Wener
- Recorded
- Price: $179.00
- View Details
How to Perform a HIPAA Risk Assessment
The primary goal of this session is to demonstrate why the health care organization needs to perform a risk assessment and how to perform the risk assessment. This includes a description of the types of breaches of protected health information that have already occurred and the reasons those breaches happened. The presentation then provides that reasons that a risk assessment is required in a health care organization and who needs to perform the assessment.
- Jim Wener
- Recorded
- Price: $179.00
- View Details
How to Perform a HIPAA Risk Assessment
The primary goal of this session is to demonstrate why the health care organization needs to perform a risk assessment and how to perform the risk assessment. This includes a description of the types of breaches of protected health information that have already occurred and the reasons those breaches happened. The presentation then provides that reasons that a risk assessment is required in a health care organization and who needs to perform the assessment.
- Jim Wener
- Recorded
- Price: $179.00
- View Details
Key Factors to Develop HIPAA Policies and Procedures
One of the major requirements of the health care organization to be HIPAA compliant is to develop and implement a set of HIPAA privacy and security policies and procedures. This can be a daunting task for those not knowing where to start and what a set of HIPAA privacy and security policies and procedures should look like. For the cost conscious health care organization, the HIPAA policies and procedures can have multiple uses: first, they can become a basis for training the health care organization workforce; second, they can be used as a basis for conducting a HIPAA self-assessment; and third, they can be used to demonstrate due diligence should there be a breach or an external HIPAA compliance audit.
- Jim Wener
- Recorded
- Price: $179.00
- View Details
How to Perform a HIPAA Risk Assessment
The primary goal of this session is to demonstrate why the health care organization needs to perform a risk assessment and how to perform the risk assessment. This includes a description of the types of breaches of protected health information that have already occurred and the reasons those breaches happened. The presentation then provides that reasons that a risk assessment is required in a health care organization and who needs to perform the assessment.
- Jim Wener
- Recorded
- Price: $179.00
- View Details
How to Ensure a Successful Health Care Systems Implementation
The presentation takes the participant through the steps needed to ensure a successful health care computer system implementation. Once presented the participant will see the logic of the tools and processes and be able to apply them to their system implementation. The tools and processes presented in this material have been developed by implementing health care systems for over 40 years and seeing what has worked and WHY it has worked. These tools and processes have been equally and successfully applied to the implementation of large, complex systems and smaller, simpler systems for large, multidepartment organizations and for small health care organizations.
- Jim Wener
- Recorded
- Price: $179.00
- View Details
Key Factors to Develop HIPAA Policies and Procedures
One of the major requirements of the health care organization to be HIPAA compliant is to develop and implement a set of HIPAA privacy and security policies and procedures. This can be a daunting task for those not knowing where to start and what a set of HIPAA privacy and security policies and procedures should look like. For the cost conscious health care organization, the HIPAA policies and procedures can have multiple uses: first, they can become a basis for training the health care organization workforce; second, they can be used as a basis for conducting a HIPAA self-assessment; and third, they can be used to demonstrate due diligence should there be a breach or an external HIPAA compliance audit.
- Jim Wener
- Recorded
- Price: $179.00
- View Details
How to Ensure a Successful Health Care Systems Implementation
The presentation takes the participant through the steps needed to ensure a successful health care computer system implementation. Once presented the participant will see the logic of the tools and processes and be able to apply them to their system implementation. The tools and processes presented in this material have been developed by implementing health care systems for over 40 years and seeing what has worked and WHY it has worked. These tools and processes have been equally and successfully applied to the implementation of large, complex systems and smaller, simpler systems for large, multidepartment organizations and for small health care organizations.
- Jim Wener
- Recorded
- Price: $179.00
- View Details
Key Factors to Develop HIPAA Policies and Procedures
One of the major requirements of the health care organization to be HIPAA compliant is to develop and implement a set of HIPAA privacy and security policies and procedures. This can be a daunting task for those not knowing where to start and what a set of HIPAA privacy and security policies and procedures should look like. For the cost conscious health care organization, the HIPAA policies and procedures can have multiple uses: first, they can become a basis for training the health care organization workforce; second, they can be used as a basis for conducting a HIPAA self-assessment; and third, they can be used to demonstrate due diligence should there be a breach or an external HIPAA compliance audit.
- Jim Wener
- Recorded
- Price: $179.00
- View Details
How to Ensure a Successful Health Care Systems Implementation
The presentation takes the participant through the steps needed to ensure a successful health care computer system implementation. Once presented the participant will see the logic of the tools and processes and be able to apply them to their system implementation. The tools and processes presented in this material have been developed by implementing health care systems for over 40 years and seeing what has worked and WHY it has worked. These tools and processes have been equally and successfully applied to the implementation of large, complex systems and smaller, simpler systems for large, multidepartment organizations and for small health care organizations.
- Jim Wener
- Recorded
- Price: $225.00
- View Details
Key Factors to Develop HIPAA Policies and Procedures
One of the major requirements of the health care organization to be HIPAA compliant is to develop and implement a set of HIPAA privacy and security policies and procedures. This can be a daunting task for those not knowing where to start and what a set of HIPAA privacy and security policies and procedures should look like. For the cost conscious health care organization, the HIPAA policies and procedures can have multiple uses: first, they can become a basis for training the health care organization workforce; second, they can be used as a basis for conducting a HIPAA self-assessment; and third, they can be used to demonstrate due diligence should there be a breach or an external HIPAA compliance audit.
- Jim Wener
- Recorded
- Price: $225.00
- View Details