HIPAA Security and Breach Notification Rules - Protecting Security of PHI | Events in America Top Trade Shows | Trade Show List | Trade Show and Conference Calendar | Top Technology Trade Shows List | Top Technology Conference List | Top Healthcare Trade Shows List | Top Healthcare Conference List | Top Medical Devices Trade Shows List | Top Medical Devices Conference List | Top Consumer Electronics Trade Shows List | Top Consumer Electronics Conference List | Top Supply Chain Trade Shows List | Top Supply Chain Conference List | Top Military and Defense Trade Shows List | Top Military and Defense Conference List | Top Agriculture Trade Shows and Fairs List | Top Agriculture Conference List | Top Energy Trade Shows List | Top Energy Conference List | Top Health & Fitness Trade Shows List | Top Health & Fitness Conference List | Top Food & Hospitality Trade Shows List | Top Food & Hospitality Conference List | Top Government Trade Shows List | Top Government Conference List | Top Home Shows List | Top Home & Interior Design Conference List | Top Boat Shows List | Top Flower Shows List | Top Orchid Shows List | Top Women Shows List | Top Fashion & Beauty Trade Shows List | Top Apparel Trade Shows List | Top Retailer Trade Shows List | Top Medical & Pharma Trade Shows List | Top Medical & Pharma Conference List | Top Auto Shows List | Top Franchise Trade Shows List | Top Book Shows Expos List | Top Publisher Industry Conference List | Professional Speakers | Top Speaker’s Bureau List | Trade Show Supplier Directory | Trade Show Exhibitor Tools | Largest Trade Show Exhibitor List by Industries | Largest Conference Sponsor List by Industry | Top Medical & Pharma Exhibitor List | Top Virtual Events List | Top Virtual Conference List | Top Online Trade Shows List | Top Supply Chain Virtual Events List | Best Practices for Trade Shows | Best Practices for Trade Show Exhibitors | How to Build Virtual Booths | Top Travel & Tourism Trade Shows List | Top Travel & Tourism Conference List | Top Manufacturing Trade Shows List | Top Manufacturing Conference List | Top Audio Visual Services Providers List | Top Venues for Trade Shows | Top Conference Centers List | Top Convention Centers List | Las Veas Trade Shows List | Top Trade Shows Las Vegas List | Top Trade Shows Orlando List | Top Trade Shows Houston List | Top Trade Shows Boston List | Top Trade Shows San Diego List | Top Trade Shows Honolulu List | Top Trade Shows Miami List | Miami Beach Convention Center Event Calendar | Las Vegas Convention Center Event Calendar | Orlando Convention Center Event Calendar | Event Planner Tools | Association Event Management Registration Tools | Association Event Management Software | Online Event Management System | Online Event Registration | Suppliers and exhibitors

Designed for trade association, exhibitors, academic institutions and speakers, List and promote your online events

Largest database of verified shows since 2015, Detailed profiles of verified trade shows, conferences and consumer shows. Create your event and attract attendees and exhibitiors, Listing tools for verification, institution and corporation.

Connect with verified event organizers, Listing and RFP tools for verified venue operators.Size events by verified attendee and exhibitor count database

Research verified b2b events by industry and profession, Review virtual exhibitor showcase. Create Profile. Connect with verified event organizers and exhibitors.

Search 900k verified exhibitor database organizedby 2,000+ events since 2018.

loader

HIPAA Security and Breach Notification Rules - Protecting Security of PHI

Why Attend

Event Overview:

Staying HIPAA compliant entails ensuring you have the right policies, procedures, and documentation, and have performed the appropriate risk analysis of confidentiality, integrity, and availability of the electronic protected health information (PHI). This course will discuss how to create the right breach notification policy for your organization and how to follow through when an incident occurs. In addition, a policy framework to help establish good security practices will be presented.

Why Should You Attend:

Having a solid information security management process is key to ensuring you can protect your data and avoid breaches, as well as prepare you for breaches that do occur despite your best efforts.

Compliance with the HIPAA Security Rule has always required that the risks to PHI be assessed and any issues be addressed by mitigation as necessary. But new changes to the HIPAA Breach Notification Rule add a new role for risk assessment, in determining whether or not a breach has a “low probability of compromise.” In addition, recent audits and enforcement actions have highlighted the requirement for performing a proper risk analysis as part of the management of security risks, and to satisfy documentation requirements.

This webinar will illustrate why good security controls and protection from breaches go hand-in-hand and are topics of current interest. You need to have good controls in place to help prevent issues that may lead to breaches, and to understand what has happened when a breach may have taken place. This session will explore the relationship of security to breach notification and shows how considering HIPAA requirements together can lead to the most secure, most compliant systems and organizations.

Areas Covered in the Webinar:

  • Being in compliance with HIPAA involves not only ensuring you provide the appropriate patient rights and controls on your uses and disclosures, but also that you ensure you have the right policies, procedures, and documentation, and have performed the appropriate analysis of the risks to the confidentiality, integrity, and availability of electronic protected health information.
  • Using risk analysis can help you make defensible, documented decisions about your compliance in a variety of circumstances, for a variety of regulations. Risk analysis is the key to making your health information privacy and security regulatory compliance work more sensibly as well as defensibly.
  • The HIPAA Breach Notification Rule has been in effect since September 23, 2009 and had recently been significantly modified. The course will discuss the origins of the rule and how it works, including interactions with other HIPAA rules and penalties for violations.
  • HIPAA covered entities and business associates need to know where and what information they have, so they can know if there has been a breach, and then decide if they need to notify or not. The course will cover how the rules have been changed to eliminate the "harm standard" and replace it with a risk assessment.
  • Entities can avoid notification if information has been encrypted according to federal standards. The webinar will cover the guidance from the US Department of Health and Human Services that shows how to encrypt so as to prevent the need for notification in the event of lost data.
  • It will discuss how to create the right breach notification policy for your organization and how to follow through when an incident occurs. In addition, a policy framework to help establish good security practices will be presented.
  • It will cover the essentials of information security methods you can use to keep breaches from happening, and stay compliant with the HIPAA Security Rule as well. The course will also discuss new penalties for non-compliance, including mandatory penalties for "willful neglect" that begin at $10,000.
  • The course will help you understand what isn’t a breach and under what circumstances you don’t have to consider breach notification. Attendees will find out how to report the smaller breaches (less than 500 individuals), and learn why you want to avoid a breach involving more than 500 individuals – media notices, website notices, and immediate notification of HHS, including posting on the HHS breach notification “wall of shame” on the web.
  • The webinar instructor will explain, based on historical analysis of reported breaches, what measures must be taken today to protect information from the most common threats, as well as discuss information security trends and explain what kinds of efforts will need to be undertaken in the future to protect the security of PHI.

 

For Registrationhttp://www.complianceonline.com/hipaa-security-and-breach-notification-rules-and-protecting-security-of-phi-webinar-training-703869-prdw?channel=eventsinamerica

Note: Use coupon code 232082 and get 10% off on registration.

Source : Event Website

Key Metrics

Attendees
-
Exhibitors
-
Register






Promo Items

Apparel
Awards
Bags
Drinkware
Headwear
Writing
Banners
Tents
Lanyards
Signs
Covers
Others
< 300 characters





Contacts