HIPAA Security 101: Revisiting the Rule and How it Applies to the Challenges of Today

MentorHealth
Duration: 90 Minutes
Instructor: William Miaoulis
Webinar Id: 800287

Recorded

$225.
One Attendee

Overview:

This session will walk the users through each of the HIPAA standards of Administrative, Physical, Technical and Organizational and provide insight that will be helpful in evaluating the current practices at an organization. It will start with a process to determine if an organization is HIPAA compliant and discuss what HIPAA compliance actually means.

Understanding the difference between required and addressable standards and implementation features. Remember, all standards are required, although some implementation features may be addressable, they are not optional.

Why should you attend: As organizations faced increased pressures from OCR HIPAA Audits, it is clear that there is a need to better understand exactly what is required to meet HIPAA Compliance. Many healthcare organizations have paid fines, penalties or agreed to settle HIPAA violations based on a lack of HIPAA Compliance. In addition, Meaningful use audits include a review of the organizations HIPAA risk Analysis.

Often times, organizations worked on HIPAA Security, but have since moved on to different projects. Now is the time to check your understanding of HIPAA. In other cases, organizations did not create the necessary policies and procedures. The best time to have been compliant was in 2005, the next best time is today and organizations must be compliant as soon as possible.This session will review each of the HIPAA Standards and provide insight in what the rule is requiring and how to meet the standard.

This session has been created for the beginners in HIPAA Security, seasoned Security Professionals who are new to Healthcare as well as experienced Healthcare Security Personnel. This session provides value to Hospital, Physician Practices and Business Associates.

Areas Covered in the Session:

  • What is HIPAA Security?
  • Administrative Safeguards
  • Physical Safeguards
  • Administrative Safeguards
  • Organizational Requirements
    • Policies and Procedures (What policies are needed and how to evaluate your current policies and procedures)
    • Documentation Requirements (What, When How and Why)
  • How to build a HIPAA Compliant Program
  • Outside Resources you can Use
  • What Business Associates should be doing?

Who Will Benefit:
  • Practice Managers
  • Privacy and Security Officers
  • IT Technical Security Personnel
  • IT Application Managers
  • Corporate Compliance Officers
  • Legal Department
  • Business Associates
  • Chief Information Officers

Educational Objectives(S)
Upon completion of this activity, participants will be able to:
  • Discuss the difference between required and addressable standards and implementation features.

CME Credit Statement
This activity has been planned and implemented in accordance with the Essential Areas and Policies of the Accreditation Council for Continuing Medical Education (ACCME) through the joint sponsorship of CFMC and MentorHealth. CFMC is accredited by the ACCME to provide continuing medical education for physicians.

CFMC designates this educational activity for a maximum of 1.5 AMA PRA Category 1 Credits™. Physicians should only claim credit commensurate with the extent of their participation in the activity.

Other Healthcare Professionals Credit Statement
This educational activity has been planned and implemented following the administrative and educational design criteria required for certification of health care professions continuing education credits. Registrants attending this activity may submit their certificate along with a copy of the course content to their professional organizations or state licensing agencies for recognition for 1.5 hours.

Disclosure Statement
It is the policy of CFMC and MentorHealth that the faculty discloses real or apparent conflicts of interest relating to the topics of the educational activity. All members of the faculty and planning team have nothing to disclose nor do they have any vested interests or affiliations

#
Obtaining Certificate of Credit

Colorado Foundation for Medical Care (CFMC) hosts an online activity evaluation system, certificate and outcomes measurement process. Following the activity, you must link to CFMC's online site (link below) to complete the evaluation form in order to receive your certificate of credit. Once the evaluation form is complete and submitted, you will be automatically sent a copy of your certificate via email. Please note, participants must attend the entire activity to receive all types of credit. Continuing Education evaluation and request for certificates will be accepted up to 60 days post activity date. CFMC will keep a record of attendance on file for 6 years.

Speaker Profile
William Miaoulis CISA, CISM, is a senior healthcare information system (IS) professional with more than 20 years of healthcare Information Security experience. Bill is the founder and primary consultant for HSP Associates. Prior to starting HSP Associates in January of 2013, Bill was the Chief Information Security Officer (CISO) and led the HIPAA security and privacy consulting efforts for Phoenix Health Systems for over 11 years and also was the HIPAA Consulting Manager for SAIC for 18 months. For seven years, Miaoulis was the University of Alabama Birmingham (UAB) Medical Center’s Information Security Officer, where he instituted the first security and privacy programs at UAB starting in October 1992.

Miaoulis contributes to the industry by frequently speaking at conferences on security matters, including recent sessions on Risk Analysis/Risk Management, Creating and Implementing Effective Security Policies, Understanding the HIPAA Security Rule, and Creating Effective Security Incident Response Procedures. Miaoulis has been interviewed and quoted by numerous publications including: SC Magazine, Health Data Management, Briefings on Healthcare Security, Computerworld; and Health Information Compliance Insider. Miaoulis has worked with AHIMA to produce the book “Preparing for a HIPAA Security Compliance Assessment” and also has worked on updating the AHIMA Security Practice Briefs.


You Recently Viewed