LIVE (One Attendee)



While all HIPAA Covered Entities and Business Associate are subject to the HIPAA Privacy, Security, and Breach Notification Rules, not all entities have done all that’s necessary, and many have not reviewed their compliance recently. If you haven’t taken care to be in compliance with the HIPAA rules, and there is a privacy or security incident affecting Protected Health Information, or you are selected for a random audit, or someone make a complaint alleging HIPAA violations, you can face serious penalties.

It is essential today to regularly review your HIPAA compliance to make sure you are staying up with rule changes and are prepared to answer questions from inspectors or investigators.  This 90-minute session will step through the basics of HIPAA compliance and identify current compliance issues that should be addressed to ensure a clean report in any reviews.

The topic of HIPAA compliance will be covered in a format wherein focusing the work to be done according to 10 topic areas helps ensure the essential issues are considered.  While compliance may take considerably more than 10 days of effort depending on the organization, the 10 topic areas provide focus for the work of the HIPAA Privacy or Security Officer so that progress in compliance can be made and documented.

Being in compliance with HIPAA involves not only ensuring you provide the appropriate patient rights and controls on your uses and disclosures, but also that you ensure you have the right policies, procedures, and documentation, and have performed the appropriate analysis of the risks to the confidentiality, integrity, and availability of electronic Protected Health Information.  Doing so is essential to protect your PHI from exposure through accidental acts, such as a loss of a device holding data, or intentional acts, including the recent increases in attacks of health information by hackers.

The session will include a discussion of the various HIPAA-defined safeguards that must be considered, and the kinds of policies and procedures that must be implemented, in order to properly comply with the rules and protect the privacy and security of PHI from accidental or intentional exposure, misuse, or improper disclosure.

Learning Objectives:

After attending this session, participant will be able to understand how you and your organization can employ cell phones for increased efficiency without leaving your team exposed to legal risk. In this webinar, we will

  1. Find out how to relate your office’s activities to the regulations
  2. Learn what are the ways you can share information under HIPAA, and the ways you may not
  3. Find out about HIPAA requirements for access and patient preferences, as well as the requirements to protect PHI.
  4. Learn how to use an information security management process to evaluate risks and make decisions about how best to protect PHI and meet patient needs and desires.
  5. Find out what policies and procedures you should have in place for dealing with e-mail and texting, as well as any new technology.
  6. Learn about the training and education that must take place to ensure your staff uses e-mail and texting properly and does not risk exposure of PHI.
  7. Find out the steps that must be followed in the event of a breach of PHI.
  8. Learn about how the HIPAA audit and enforcement activities are now being increased and what you need to do to survive a HIPAA audit.

Areas Covered in the Session:

  1. Step One: Research of Your Operations
    – How do you use PHI and what policies and procedures do you have for Privacy, Security, and Breach Notification? 
    – Understand your operations and information flows, and the ways you use or disclose PHI.
  2. Step Two: Limitations on Uses and Disclosures
    –  Limitations according to the Privacy Rule, including requirements for Business Associates, handling authorizations, and required processes for uses and disclosures of PHI under HIPAA.
  3. Step Three: Patient Rights under HIPAA
    – Make sure the processes are defined and in place for providing opportunities to access, amend, and restrict uses of PHI, to ask for an accounting of disclosures of PHI, to request alternative means or methods of communication, and to receive a Notice of Privacy Practices.
  4. Step Four: HIPAA Risk Analysis
    – How to handle information, identify the risk issues, and decide their priority for mitigation.
  5. Step Five: HIPAA Security Safeguards
    – What physical, technical, and administrative safeguards you will use to address the various Security issues and start implementing them.
  6. Step Six: HIPAA Security and Breach Notification Policies and Procedures
    – Process for discovering, managing, evaluating, and acting on any incidents involving PHI and breaches of PHI.
  7. Step Seven: Documentation of Policies and Procedures
    – All the things you’ve been doing need to be properly documented so you can show compliance.  Just creating documentation alone is easily a day’s work.
  8. Step Eight: Training in Policies and Procedures Related to HIPAA
    –  Training staff on your own HIPAA policies and procedures relating to privacy, security, and breach notification.
  9. Step Nine: Verification and Audits of Compliance
    – Implementation of HIPAA Privacy, Security, and Breach Notification compliance should be regularly evaluated to ensure that policies are being followed and systems are secured.
  10. Step Ten: Long Term Compliance Planning and Risk Management
    – To establish and maintain compliance, it is essential to implement one-time actions, to schedule compliance activities that should take place regularly, and to identify that which can trigger the need for security maintenance and risk management activities.

Who Should Attend:

  1. Compliance director
  2. CEO
  3. CFO
  4. Privacy Officer
  5. Security Officer
  6. Information Systems Manager
  7. HIPAA Officer
  8. Chief Information Officer
  9. Health Information Manager
  10. Healthcare Counsel/lawyer
  11. Office Manager

About the Presenter:

Jim Sheldon-Dean is the founder and director of compliance services at Lewis Creek Systems, LLC, a Vermont-based consulting firm founded in 1982, providing information privacy and security regulatory compliance services to a wide variety of healthcare entities.  He is a frequent speaker regarding HIPAA, including speaking engagements at numerous regional and national healthcare association conferences and conventions and the annual NIST/OCR HIPAA Security Conference.  Sheldon-Dean has more than 36 years of experience in policy analysis and implementation, business process analysis, information systems and software development, and eight years of experience doing hands-on medical work as a Vermont certified volunteer emergency medical technician.  Sheldon-Dean received his B.S. degree, summa cum laude, from the University of Vermont and his master’s degree from the Massachusetts Institute of Technology.

After Registration

You will receive an email with login information and handouts (presentation slides) that you can print and share to all participants at your location.

System Requirement

Operating System: Windows any version preferably above Windows Vista & Mac any version above OS X 10.6
Internet Speed: Preferably above 1 MBPS
Headset: Any decent headset and microphone which can be used to talk and hear clearly

Can’t Listen Live?
No problem. You can get access to On-Demand webinar. Use it as a training tool at your convenience.

For more information you can reach out to below contact:
Toll-Free No: 1-302-444-0162