• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
2011 06 23 How To Develop Your Hipaa Security Policies & Procedures
 

2011 06 23 How To Develop Your Hipaa Security Policies & Procedures

on

  • 270 views

** More HIPAA Compliance BootCamp™ and complementary HIPAA HITECH webinars dates released for 2014 - 2015 and beyond! View our schedule or find your nearest event at ...

** More HIPAA Compliance BootCamp™ and complementary HIPAA HITECH webinars dates released for 2014 - 2015 and beyond! View our schedule or find your nearest event at http://www.clearwatercompliance.com **

http://AboutHIPAA.com
http://AboutHIPAALI.org
Do you create, receive, maintain or transmit ePHI? Are you prepared to meet new HIPAA Security Rule compliance requirements mandating a very defined set of over 50 policies and procedures to manage Administrative, Physical and Technical safeguards for PHI?

THE CHALLENGE
Knowing what policies need to be created and drafting, revising and communicating them can be a daunting task for even the largest organizations.

Complying with the HIPAA Security Final Rule itself and as amended by the Health Information Technology for Economic and Clinical Health (HITECH) Act involves many steps and considerations.

THE SOLUTION
If you create, receive, maintain or transmit ePHI, you need to attend this webinar. No matter where you are in your HIPAA-HITECH compliance journey and no matter where you are in the ePHI "chain of trust", you will benefit from you will benefit from learning about:

• The HIPAA Security Final Rule policy framework and new requirements
• How to actually design and develop security policies
• Tools to jump-start your policies and procedures development program

THE RESULT
The HIPAA Security Policy and Procedure design and development process presented in this webinar has been used by organizations of all sizes. Creating HIPAA Security Policies and Procedures is an important and large project for any organization. Early audits by Health and Human Services (HHS) and the Centers for Medicare and Medicaid Services (CMS) have included reviews of policies and procedures. The Office for Civil Rights (OCR) will certainly include these reviews as they roll-out their new random audit program currently being designed by Booz Allen Hamilton.

AGENDA:
• A security policy framework
• The difference between policies and procedures
• Policy design, process and structure
• Step-by-Step Instructions for developing policies
• Tools, templates and forms available to help you

Statistics

Views

Total Views
270
Views on SlideShare
270
Embed Views
0

Actions

Likes
0
Downloads
4
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    2011 06 23 How To Develop Your Hipaa Security Policies & Procedures 2011 06 23 How To Develop Your Hipaa Security Policies & Procedures Document Transcript

    • How to Develop Your HIPAA Security Policies & Procedures Thursday, June 23, 2011 10:00 AM - 11:00 AM CDT Do you create, receive, maintain or transmit ePHI? Are you prepared to meet new HIPAA Security Rule compliance requirements mandating a very defined set of over 50 policies and procedures to manage Administrative, Physical and Technical safeguards for PHI? Knowing what policies need to be created and drafting, revising and communicating them can be a daunting task for even the largest organizations. Complying with the HIPAA Security Final Rule itself and as amended by the Health Information Technology for Economic and Clinical Health (HITECH) Act involves many steps and considerations. THE SOLUTION If you create, receive, maintain or transmit ePHI, you need to attend this webinar. No matter where you are in your HIPAA-HITECH compliance journey and no matter where you are in the ePHI "chain of trust", you will benefit from you will benefit from learning about: • The HIPAA Security Final Rule policy framework and new requirements • How to actually design and develop security policies • Tools to jump-start your policies and procedures development program AGENDA: • A security policy framework • The difference between policies and procedures • Policy design, process and structure • Step-by-Step Instructions for developing policies • Tools, templates and forms available to help youRegister Today: https://www1.gotomeeting.com/register/127199000