SlideShare a Scribd company logo
1 of 2
Download to read offline
HIPAA Security and Breach Rule Compliance - How the HIPAA Security Officer can use
Risk Analysis, Policies and Procedures to meet require ments and respond to incidents: One
and half day In-Person Seminar
Course Description:

With the recent implementation of new HIPAA regulations in the HIPAA Omnibus Update of
2013, healthcare organizations are reviewing their compliance and making sure they have the
proper policies, procedures, and forms in place. HIPAA Security Officers have been renewing
their compliance activities and reviewing their documentation to make sure they can meet the
challenges of the new rules and avoid breaches and penalties for compliance violations.
This seminar is designed to provide intensive, two-day training in HIPAA Security and Breach
Notification Rule compliance, including:
What’s new in the regulations?
What’s changed recently?
What needs to be addressed for compliance by covered entities and business associates?
What are the most important security issues?
What needs to be done for HIPAA compliance?
What can happen when compliance is not adequate?

This session will also explain HIPAA Security safeguards and the role of risk analysis in
effectively evaluating and implementing Security Rule compliance. Audits and enforcement will
be explained, as well as security breaches and how to prevent them. Numerous references and
sample documents will be provided.

Learning Objectives:
Understand the structure of the HIPAA Regulations and how they work together
Learn what has changed in the rules based on the HIPAA Omnibus Update Rule
What has to be modified to meet the new rules and how to interpret them
Understand how to use Risk Analysis to make compliance decisions
Know what safeguards must be considered to provide security for health information
Understand what makes a good information security policy
Know how to respond to breaches and violations of Privacy and Security rules
Work through practical examples of risk analysis
Learn how to deal with the modern portable technologies and communication methods
Understand how to use policies, documentation, training, and drills to prepare for audits and
incidents, and achieve good compliance
Who will Benefit

This seminar will provide valuable assistance to all personnel in medical offices, practice groups,
hospitals, academic medical centers, insurers, business associates (shredding, data storage,
systems vendors, billing services, etc.). The following personnel will find this session valuable:
Compliance director
CEO
COO
CFO
Privacy Officer
Security Officer
Information Systems Manager
HIPAA Officer
Chief Information Officer
Health Information Manager
Healthcare Counsel/lawyer
Office Manager
Contracts Manager

For more details visit us at:

http://www.complianceonline.com/ecomme rce/control/seminar/~product_id=80143SEM

More Related Content

More from complianceonline123

Sec what you need to know
Sec what you need to knowSec what you need to know
Sec what you need to know
complianceonline123
 
Auditing your grc programs
Auditing your grc programsAuditing your grc programs
Auditing your grc programs
complianceonline123
 
Workplace harrasment
Workplace harrasmentWorkplace harrasment
Workplace harrasment
complianceonline123
 
Information security threats
Information security threatsInformation security threats
Information security threats
complianceonline123
 
Understanding 21 cfr part 11
Understanding 21 cfr part 11Understanding 21 cfr part 11
Understanding 21 cfr part 11
complianceonline123
 
Flsa what you need to know
Flsa  what you need to knowFlsa  what you need to know
Flsa what you need to know
complianceonline123
 

More from complianceonline123 (20)

Excel spreadsheets how to ensure 21 cfr part 11 compliance
Excel spreadsheets  how to ensure 21 cfr part 11 complianceExcel spreadsheets  how to ensure 21 cfr part 11 compliance
Excel spreadsheets how to ensure 21 cfr part 11 compliance
 
Retail loss
Retail lossRetail loss
Retail loss
 
Hipaa privacy rule
Hipaa privacy ruleHipaa privacy rule
Hipaa privacy rule
 
Fda warning letters
Fda  warning lettersFda  warning letters
Fda warning letters
 
Dietary supplement
Dietary supplementDietary supplement
Dietary supplement
 
Out in the open protecting your privacy in the digital age
Out in the open  protecting your privacy in the digital ageOut in the open  protecting your privacy in the digital age
Out in the open protecting your privacy in the digital age
 
Reaching Clean Power Plan Goals at No Cost: Securing the Smart Grid’s Potential
Reaching Clean Power Plan Goals at No Cost: Securing the Smart Grid’s PotentialReaching Clean Power Plan Goals at No Cost: Securing the Smart Grid’s Potential
Reaching Clean Power Plan Goals at No Cost: Securing the Smart Grid’s Potential
 
Audit Process: How to Successfully Plan Audit
Audit Process: How to Successfully Plan Audit Audit Process: How to Successfully Plan Audit
Audit Process: How to Successfully Plan Audit
 
Basics of internal audit
Basics of internal auditBasics of internal audit
Basics of internal audit
 
Free trade zones
Free trade zonesFree trade zones
Free trade zones
 
Sec what you need to know
Sec what you need to knowSec what you need to know
Sec what you need to know
 
Auditing your grc programs
Auditing your grc programsAuditing your grc programs
Auditing your grc programs
 
Aml non bank finanacial institutions
Aml non bank finanacial institutionsAml non bank finanacial institutions
Aml non bank finanacial institutions
 
Gdp how to manage documentation lifecycle
Gdp  how to manage documentation lifecycleGdp  how to manage documentation lifecycle
Gdp how to manage documentation lifecycle
 
Workplace harrasment
Workplace harrasmentWorkplace harrasment
Workplace harrasment
 
Good documentation practices
Good documentation practicesGood documentation practices
Good documentation practices
 
Information security threats
Information security threatsInformation security threats
Information security threats
 
I 9 compliance- how to avoid errors
I 9 compliance- how to avoid errorsI 9 compliance- how to avoid errors
I 9 compliance- how to avoid errors
 
Understanding 21 cfr part 11
Understanding 21 cfr part 11Understanding 21 cfr part 11
Understanding 21 cfr part 11
 
Flsa what you need to know
Flsa  what you need to knowFlsa  what you need to know
Flsa what you need to know
 

Hipaa security and breach rule compliance

  • 1. HIPAA Security and Breach Rule Compliance - How the HIPAA Security Officer can use Risk Analysis, Policies and Procedures to meet require ments and respond to incidents: One and half day In-Person Seminar Course Description: With the recent implementation of new HIPAA regulations in the HIPAA Omnibus Update of 2013, healthcare organizations are reviewing their compliance and making sure they have the proper policies, procedures, and forms in place. HIPAA Security Officers have been renewing their compliance activities and reviewing their documentation to make sure they can meet the challenges of the new rules and avoid breaches and penalties for compliance violations. This seminar is designed to provide intensive, two-day training in HIPAA Security and Breach Notification Rule compliance, including: What’s new in the regulations? What’s changed recently? What needs to be addressed for compliance by covered entities and business associates? What are the most important security issues? What needs to be done for HIPAA compliance? What can happen when compliance is not adequate? This session will also explain HIPAA Security safeguards and the role of risk analysis in effectively evaluating and implementing Security Rule compliance. Audits and enforcement will be explained, as well as security breaches and how to prevent them. Numerous references and sample documents will be provided. Learning Objectives: Understand the structure of the HIPAA Regulations and how they work together Learn what has changed in the rules based on the HIPAA Omnibus Update Rule What has to be modified to meet the new rules and how to interpret them Understand how to use Risk Analysis to make compliance decisions Know what safeguards must be considered to provide security for health information Understand what makes a good information security policy Know how to respond to breaches and violations of Privacy and Security rules Work through practical examples of risk analysis Learn how to deal with the modern portable technologies and communication methods Understand how to use policies, documentation, training, and drills to prepare for audits and incidents, and achieve good compliance
  • 2. Who will Benefit This seminar will provide valuable assistance to all personnel in medical offices, practice groups, hospitals, academic medical centers, insurers, business associates (shredding, data storage, systems vendors, billing services, etc.). The following personnel will find this session valuable: Compliance director CEO COO CFO Privacy Officer Security Officer Information Systems Manager HIPAA Officer Chief Information Officer Health Information Manager Healthcare Counsel/lawyer Office Manager Contracts Manager For more details visit us at: http://www.complianceonline.com/ecomme rce/control/seminar/~product_id=80143SEM