SlideShare a Scribd company logo
1 of 1
The Ethical & Secure Use of Patient Data
   Now that you have data do you know how to handle it securely and ethically?
Join us at the 2012 Tri-State Healthcare Information Technology Conference to learn from industry experts how your organization
 can take the necessary steps to identify data security red flags and eliminate potential issues before they turn into a costly data
                                                               breach.

                                                        Did you know?
Currently, a total of 46 states and four territories, including the District of Columbia, Puerto Rico, Guam, and the U.S. Virgin Islands,
                                                  have breach notification laws in place.

       New U.S. Department of Health and Human Services (HHS) guidelines require patient notification of data breaches.
                    Enforcement of the Federal Trade Commission's Red Flags Rule began December 31, 2010.
  Presented by: Information Technology Architect, IVY TECH Community College and the University of Southern Indiana and the
                                                  Chamber of Commerce SWIN

                             IS YOUR HEALTHCARE ORGANIZATION AT RISK?
  As more and more patient data is being collected, stored on mobile devices and transmitted electronically, the risk that your
                  organization could experience a catastrophic data breach is becoming more and more likely.
 Whether the data breach is caused by employee negligence, a 3rd Party service provider or by a lost or stolen mobile device, the
                                        impact to your organization can be devastating.

In fact, many Healthcare Professionals regard data security as the industry's number one priority and are advising every healthcare
      provider the best way to prevent a data breach is by implementing effective training and ongoing awareness programs.

                             Keynote speakers during morning and afternoon sessions are:
                             T.J. Houske – HIPAA- Executive Consultant & President of House Key, LLC.
                                                     Topic - HITECH Compliance
                    Will Showalter, Vice President, Chief Information Officer of Mercy Health in Joplin, Missouri
                                  Topic - How Advanced Planning and Resolve Are Helping Us Rebuild
                                              Other speakers will be announced soon!


                    RESERVE YOUR SEAT TODAY BEFORE IT IS TOO LATE!
                                     Where: IVY Tech – 3501 N. First Avenue, Evansville, IN 47710
                                     When: October 11, 2012 Registration Begins at 7:30am CST
                                     Costs: $75.00 Early registration before Sept 27th
                                            $100.00 After Sept. 27th
                                            $50.00 for ½ day attendance –open to all industries and professions
                                            $40.00 for students

More Related Content

Viewers also liked

Colegio san josé de la sall1
Colegio san josé de la sall1Colegio san josé de la sall1
Colegio san josé de la sall1Jaynlynn
 
선릉오피&수원오피#사이트【http://dasom10.net】선릉역오피
선릉오피&수원오피#사이트【http://dasom10.net】선릉역오피선릉오피&수원오피#사이트【http://dasom10.net】선릉역오피
선릉오피&수원오피#사이트【http://dasom10.net】선릉역오피dasomnet33
 
27 Wingreen_8x11_Horizontal
27 Wingreen_8x11_Horizontal27 Wingreen_8x11_Horizontal
27 Wingreen_8x11_HorizontalSue Durio
 
A Survey of Key Management Framework for Wireless Mobile Environment
A Survey of Key Management Framework for Wireless Mobile EnvironmentA Survey of Key Management Framework for Wireless Mobile Environment
A Survey of Key Management Framework for Wireless Mobile EnvironmentAM Publications,India
 
안산오피&목동오피#사이트【http://dasom10.net】일산오피
안산오피&목동오피#사이트【http://dasom10.net】일산오피안산오피&목동오피#사이트【http://dasom10.net】일산오피
안산오피&목동오피#사이트【http://dasom10.net】일산오피dasomnet33
 
Hojita evangelio domingo xv to b color
Hojita  evangelio domingo xv to b colorHojita  evangelio domingo xv to b color
Hojita evangelio domingo xv to b colorNelson Gómez
 
Coarse Grain Reconfigurable Floating Point Unit
Coarse Grain Reconfigurable Floating Point UnitCoarse Grain Reconfigurable Floating Point Unit
Coarse Grain Reconfigurable Floating Point UnitAM Publications,India
 
Program breakdown by advisor
Program breakdown by advisorProgram breakdown by advisor
Program breakdown by advisorPamela Bobbitt
 
Plaza Construction - case study
Plaza Construction - case studyPlaza Construction - case study
Plaza Construction - case studyBrian Fennelly
 
수원오피&안양오피#사이트【http://dasom10.net】수원오피
수원오피&안양오피#사이트【http://dasom10.net】수원오피수원오피&안양오피#사이트【http://dasom10.net】수원오피
수원오피&안양오피#사이트【http://dasom10.net】수원오피dasomnet33
 
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...AM Publications,India
 

Viewers also liked (19)

Npc force weekly 9 13 jul 2012
Npc force weekly 9 13 jul 2012Npc force weekly 9 13 jul 2012
Npc force weekly 9 13 jul 2012
 
Mbs college
Mbs collegeMbs college
Mbs college
 
Colegio san josé de la sall1
Colegio san josé de la sall1Colegio san josé de la sall1
Colegio san josé de la sall1
 
선릉오피&수원오피#사이트【http://dasom10.net】선릉역오피
선릉오피&수원오피#사이트【http://dasom10.net】선릉역오피선릉오피&수원오피#사이트【http://dasom10.net】선릉역오피
선릉오피&수원오피#사이트【http://dasom10.net】선릉역오피
 
BILL PAY POOL
BILL PAY POOLBILL PAY POOL
BILL PAY POOL
 
27 Wingreen_8x11_Horizontal
27 Wingreen_8x11_Horizontal27 Wingreen_8x11_Horizontal
27 Wingreen_8x11_Horizontal
 
JoshRes
JoshResJoshRes
JoshRes
 
Resume
ResumeResume
Resume
 
airartssticker
airartsstickerairartssticker
airartssticker
 
A Survey of Key Management Framework for Wireless Mobile Environment
A Survey of Key Management Framework for Wireless Mobile EnvironmentA Survey of Key Management Framework for Wireless Mobile Environment
A Survey of Key Management Framework for Wireless Mobile Environment
 
Documento
DocumentoDocumento
Documento
 
안산오피&목동오피#사이트【http://dasom10.net】일산오피
안산오피&목동오피#사이트【http://dasom10.net】일산오피안산오피&목동오피#사이트【http://dasom10.net】일산오피
안산오피&목동오피#사이트【http://dasom10.net】일산오피
 
Hojita evangelio domingo xv to b color
Hojita  evangelio domingo xv to b colorHojita  evangelio domingo xv to b color
Hojita evangelio domingo xv to b color
 
Coarse Grain Reconfigurable Floating Point Unit
Coarse Grain Reconfigurable Floating Point UnitCoarse Grain Reconfigurable Floating Point Unit
Coarse Grain Reconfigurable Floating Point Unit
 
Program breakdown by advisor
Program breakdown by advisorProgram breakdown by advisor
Program breakdown by advisor
 
Plaza Construction - case study
Plaza Construction - case studyPlaza Construction - case study
Plaza Construction - case study
 
SPT Mirror- May 2016
SPT Mirror- May 2016SPT Mirror- May 2016
SPT Mirror- May 2016
 
수원오피&안양오피#사이트【http://dasom10.net】수원오피
수원오피&안양오피#사이트【http://dasom10.net】수원오피수원오피&안양오피#사이트【http://dasom10.net】수원오피
수원오피&안양오피#사이트【http://dasom10.net】수원오피
 
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
 

Similar to Hit Conference Flyer 2012 6.26

Information+security rutgers(final)
Information+security rutgers(final)Information+security rutgers(final)
Information+security rutgers(final)Amy Stowers
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Haydenhaydens
 
Running head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxRunning head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxwlynn1
 
PLEASE POST EACH DISCUSSION SEPARATELYEach healthcare organi
PLEASE POST EACH DISCUSSION SEPARATELYEach healthcare organiPLEASE POST EACH DISCUSSION SEPARATELYEach healthcare organi
PLEASE POST EACH DISCUSSION SEPARATELYEach healthcare organisamirapdcosden
 
Case Study: Combating Medical Identity Theft
Case Study: Combating Medical Identity TheftCase Study: Combating Medical Identity Theft
Case Study: Combating Medical Identity TheftBooz Allen Hamilton
 
HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
HEALTHCARE IT: IS YOUR INFORMATION AT RISK? HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
HEALTHCARE IT: IS YOUR INFORMATION AT RISK? IJNSA Journal
 
Webinar: Overcoming it challenges
Webinar: Overcoming it challengesWebinar: Overcoming it challenges
Webinar: Overcoming it challengesModern Healthcare
 
B johnson unit 3 final project completion
B johnson unit 3 final project completionB johnson unit 3 final project completion
B johnson unit 3 final project completionBrittany Johnson
 
A Personal Health Record ( Ehr )
A Personal Health Record ( Ehr )A Personal Health Record ( Ehr )
A Personal Health Record ( Ehr )Tasha Holloway
 
Life Science Patient Data Privacy
Life Science Patient Data PrivacyLife Science Patient Data Privacy
Life Science Patient Data PrivacyTracey Zdravkovic
 
rlkmettprivacyconfidentialitytraining
rlkmettprivacyconfidentialitytrainingrlkmettprivacyconfidentialitytraining
rlkmettprivacyconfidentialitytrainingrlkmett
 
Discussion2
Discussion2 Discussion2
Discussion2 amberlinn
 
Maheu+ica+2014+legal+&+ethical+strategies+for+successful+distance+counseling
Maheu+ica+2014+legal+&+ethical+strategies+for+successful+distance+counselingMaheu+ica+2014+legal+&+ethical+strategies+for+successful+distance+counseling
Maheu+ica+2014+legal+&+ethical+strategies+for+successful+distance+counselingTom Wilson
 

Similar to Hit Conference Flyer 2012 6.26 (20)

Information+security rutgers(final)
Information+security rutgers(final)Information+security rutgers(final)
Information+security rutgers(final)
 
CYVA_EMA3PageVentureSummaryAngelAM020150717
CYVA_EMA3PageVentureSummaryAngelAM020150717CYVA_EMA3PageVentureSummaryAngelAM020150717
CYVA_EMA3PageVentureSummaryAngelAM020150717
 
CYVA_EMA3PageVentureSummaryAngelAM020150717
CYVA_EMA3PageVentureSummaryAngelAM020150717CYVA_EMA3PageVentureSummaryAngelAM020150717
CYVA_EMA3PageVentureSummaryAngelAM020150717
 
CYVA_EMA3PageVentureSummaryAngelAM020150717
CYVA_EMA3PageVentureSummaryAngelAM020150717CYVA_EMA3PageVentureSummaryAngelAM020150717
CYVA_EMA3PageVentureSummaryAngelAM020150717
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Hayden
 
Running head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxRunning head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docx
 
PLEASE POST EACH DISCUSSION SEPARATELYEach healthcare organi
PLEASE POST EACH DISCUSSION SEPARATELYEach healthcare organiPLEASE POST EACH DISCUSSION SEPARATELYEach healthcare organi
PLEASE POST EACH DISCUSSION SEPARATELYEach healthcare organi
 
Case Study: Combating Medical Identity Theft
Case Study: Combating Medical Identity TheftCase Study: Combating Medical Identity Theft
Case Study: Combating Medical Identity Theft
 
Data Breach: It Can Happen To You
Data Breach: It Can Happen To YouData Breach: It Can Happen To You
Data Breach: It Can Happen To You
 
HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
HEALTHCARE IT: IS YOUR INFORMATION AT RISK? HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
 
Webinar: Overcoming it challenges
Webinar: Overcoming it challengesWebinar: Overcoming it challenges
Webinar: Overcoming it challenges
 
Hippa breaches
Hippa breachesHippa breaches
Hippa breaches
 
B johnson unit 3 final project completion
B johnson unit 3 final project completionB johnson unit 3 final project completion
B johnson unit 3 final project completion
 
A Personal Health Record ( Ehr )
A Personal Health Record ( Ehr )A Personal Health Record ( Ehr )
A Personal Health Record ( Ehr )
 
Life Science Patient Data Privacy
Life Science Patient Data PrivacyLife Science Patient Data Privacy
Life Science Patient Data Privacy
 
rlkmettprivacyconfidentialitytraining
rlkmettprivacyconfidentialitytrainingrlkmettprivacyconfidentialitytraining
rlkmettprivacyconfidentialitytraining
 
Confidentiality Training
Confidentiality Training Confidentiality Training
Confidentiality Training
 
Discussion2
Discussion2 Discussion2
Discussion2
 
HIPAA
HIPAAHIPAA
HIPAA
 
Maheu+ica+2014+legal+&+ethical+strategies+for+successful+distance+counseling
Maheu+ica+2014+legal+&+ethical+strategies+for+successful+distance+counselingMaheu+ica+2014+legal+&+ethical+strategies+for+successful+distance+counseling
Maheu+ica+2014+legal+&+ethical+strategies+for+successful+distance+counseling
 

Hit Conference Flyer 2012 6.26

  • 1. The Ethical & Secure Use of Patient Data Now that you have data do you know how to handle it securely and ethically? Join us at the 2012 Tri-State Healthcare Information Technology Conference to learn from industry experts how your organization can take the necessary steps to identify data security red flags and eliminate potential issues before they turn into a costly data breach. Did you know? Currently, a total of 46 states and four territories, including the District of Columbia, Puerto Rico, Guam, and the U.S. Virgin Islands, have breach notification laws in place. New U.S. Department of Health and Human Services (HHS) guidelines require patient notification of data breaches. Enforcement of the Federal Trade Commission's Red Flags Rule began December 31, 2010. Presented by: Information Technology Architect, IVY TECH Community College and the University of Southern Indiana and the Chamber of Commerce SWIN IS YOUR HEALTHCARE ORGANIZATION AT RISK? As more and more patient data is being collected, stored on mobile devices and transmitted electronically, the risk that your organization could experience a catastrophic data breach is becoming more and more likely. Whether the data breach is caused by employee negligence, a 3rd Party service provider or by a lost or stolen mobile device, the impact to your organization can be devastating. In fact, many Healthcare Professionals regard data security as the industry's number one priority and are advising every healthcare provider the best way to prevent a data breach is by implementing effective training and ongoing awareness programs. Keynote speakers during morning and afternoon sessions are: T.J. Houske – HIPAA- Executive Consultant & President of House Key, LLC. Topic - HITECH Compliance Will Showalter, Vice President, Chief Information Officer of Mercy Health in Joplin, Missouri Topic - How Advanced Planning and Resolve Are Helping Us Rebuild Other speakers will be announced soon! RESERVE YOUR SEAT TODAY BEFORE IT IS TOO LATE! Where: IVY Tech – 3501 N. First Avenue, Evansville, IN 47710 When: October 11, 2012 Registration Begins at 7:30am CST Costs: $75.00 Early registration before Sept 27th $100.00 After Sept. 27th $50.00 for ½ day attendance –open to all industries and professions $40.00 for students