Overview:
The process of risk analysis starts with the simple principle that you must know you have an asset in order to protect it. This session will focus on methods to identify, prioritize, evaluate and strengthen controls within systems. In this session we will review tools and processes that allow organizations to quickly, but effectively review these systems.
With hundreds of systems that maintain Protected Health Information, how do you answer HIPAA questions, such as do you have audit trail of system activity? Do you have sufficient backup? Password controls?
User will be able to use the processes immediately to assist them in creating processes to meet the HIPAA requirements.
It will be important to see what the FDA regulations and the ICH GCP recommendations are in this regard. The key is that the PI and all clinical staff know and follow the research plan (Protocol) exactly as it is written. To do this is ethical research. To not follow the protocol and document study conduct carelessly is folly.
Why should you attend:Data, Data everywhere, do you know where all of your data is? One of the first questions that is asked within the OCR audit protocol is "Determine if the covered entity has identified all systems that contain, process, or transmit ePHI. "
Many organizations have 100's of systems that maintains electronic protected health information which meet the HIPAA standards.
However, the HIPAA rule allows organizations to determine what security to be implemented based upon their risk analysis. In this session we will be providing a mechanism for prioritizing your application systems, then analyzing the systems, documenting the controls and finally creating plans to strengthen controls.
Organizations can benefit by prioritizing application systems into different levels. By using a mathematical approach that calculates a relative risk score for each application; organizations can determine which systems require stronger controls.
Organizations can rank all applications systems from 1 (highest priority system) to lowest priority system. This will allow an organization to answer questions about key controls from the HIPAA rule. Which systems should organizations spend the most time, effort and resource to control? This webinar will help you answer these important questions.
This session will illustrate how to prioritize application systems, evaluate the controls and then strengthen the controls at the application system level.
Areas Covered in the Session:
by : Paul R. Hales
Date : Tuesday, April 8, 2025 10:00 AM PDT | 01:00 PM EDT
Duration : 90 Minutes
Price : US$139.00
View Details