Skip to main content

Home/ Healthcare 2.0/ Group items tagged how to

Rss Feed Group items tagged

Roger Steven

New HIPAA Rules - Meeting Requirements for New Patient Rights and New Restrictions on D... - 0 views

  •  
    Overview: New changes modifying the HIPAA Privacy and Security Regulations are going into place to meet the privacy and security mandates within the HITECH Act in the American Recovery and Reinvestment Act of 2009. The changes include establishing new rights for individuals as well as changes to the limitations on uses and disclosures. New requirements for patient access to records and requirements to notify individuals in the event of a breach are only two of the many areas affected in the new law, including new requirements for restriction and accounting of disclosures and increased enforcement activity. Covered entities that use electronic health records (EHRs) will need to meet new access and disclosure rules and all kinds of business associates and their subcontractors will need to establish compliance programs. And if you are required to have a HIPAA Notice of Privacy Practices, you will need to update that to show all the new rights that patients will have, such as electronic copies, new rights to restrict disclosures, and much more. Business associates are now directly covered by the HIPAA privacy and security regulations and are liable for fines and penalties if they do not comply. If a business associate supplies services that interact with the new changes to the rules, the BA will need to be aware of the new requirements. We will explain what a Business Associate needs to do differently under the new regulations. Electronic records have new demands placed on them, in both providing access and in accounting for all disclosures of health information - the electronic age in health care brings new obligations to serve individuals as well as manage health information for healthcare professionals. We will discuss how disclosures must be tracked in an EHR and review the various ways patient records can be supplied electronically. The new regulations will be reviewed and their effects on usual practices will be discussed, as will what policies need to be chang
Roger Steven

How to Ensure a Successful Health Care Systems Implementation - 0 views

  •  
    Overview: The presentation takes the participant through the steps needed to ensure a successful health care computer system implementation. Once presented the participant will see the logic of the tools and processes and be able to apply them to their system implementation. The tools and processes presented in this material have been developed by implementing health care systems for over 40 years and seeing what has worked and WHY it has worked. These tools and processes have been equally and successfully applied to the implementation of large, complex systems and smaller, simpler systems for large, multidepartment organizations and for small health care organizations. The process focuses on establishing the project's implementation expectations, identifying meaningful metrics for success, establishing project plans, assigning individual accountabilities and responsibilities, establishing and executing project tasks, monitoring project progress and validating project success. To establish viable project expectations, the presentation addresses the need for bringing all of the stakeholders (organization owners, providers and management, operations staff, IT staff and the vendor) into establishing common and realizable expectations. These are reviewed in context of the organization's current environment and its short and long term goals and are considered as a critical part of the implementation completion process. In the case of turning around an already troubled or failed system implementation, the process emphasizes the tasks of reassessing the project stakeholder expectations - why they decided the system would help the organization and what they expected to get from the system. Next the process shows the participant how to convert these expectations to realistic and measurable project success metrics. The process focuses on learning how to separate "so what" metrics from meaningful and measurable metrics. In addition, the process provides direction regardin
Roger Steven

How to Handle HIPAA Security Incidents, Breaches, Complaints, and Investigations - 0 views

  •  
    Overview: This webinar will cover everything that you need to know about how to handle HIPAA security incidents, breaches, and complaints and the Department of Health and Human Resources Investigations thereof. Not all security incidents are breaches, but all breaches of confidentiality are within the broad ambit of security incidents. Privacy rule violations, such as failing to give a patient a copy of his or her medical records, may also constitute a breach as the $4.2 million fine assessed against Cignet Healthcare of Prince George's County, Maryland, dramatically proved. Handling an investigation properly is key to determining not only how to handle it to mitigate any harm and to take action to prevent it from happening again but also to determine whether it is reportable to affected individuals and to DHHS. HIPAA requires a complaint procedure (policy). The webinar will suggest what such a document should contain as it also will for the required report procedure (what is reportable, who reports, to whom, and required/suggested contents of the report) and the required response procedure (what do the responsible officials do after receiving the report or the complaint). Investigating a possible security incident is key. The webinar will cover how to conduct a thorough investigation of HIPAA security incidents, breaches, and patient complaints. Finally, the second largest HIPAA civil money penalty or settlement, $4.2 million, was in large part due to the offender's failure to cooperate with the DHHS investigation. The presenter has successfully defended his clients in seven such investigations and knows how to respond to them to avoid or minimize liability. Think of a gap analysis as an examination of: What you currently have in place for HIPAA compliance. Is that adequate? Can it be done better? Is it enough? And what am I missing? Asking these questions will help establish the direction and next steps to take. It lays the ground work for a good Risk Analys
Roger Steven

How to Handle HIPAA Security Incidents, Breaches, Complaints, and Investigations - 0 views

  •  
    Overview: This webinar will cover everything that you need to know about how to handle HIPAA security incidents, breaches, and complaints and the Department of Health and Human Resources Investigations thereof. Not all security incidents are breaches, but all breaches of confidentiality are within the broad ambit of security incidents. Privacy rule violations, such as failing to give a patient a copy of his or her medical records, may also constitute a breach as the $4.2 million fine assessed against Cignet Healthcare of Prince George's County, Maryland, dramatically proved. Handling an investigation properly is key to determining not only how to handle it to mitigate any harm and to take action to prevent it from happening again but also to determine whether it is reportable to affected individuals and to DHHS. HIPAA requires a complaint procedure (policy). The webinar will suggest what such a document should contain as it also will for the required report procedure (what is reportable, who reports, to whom, and required/suggested contents of the report) and the required response procedure (what do the responsible officials do after receiving the report or the complaint). Investigating a possible security incident is key. The webinar will cover how to conduct a thorough investigation of HIPAA security incidents, breaches, and patient complaints. Finally, the second largest HIPAA civil money penalty or settlement, $4.2 million, was in large part due to the offender's failure to cooperate with the DHHS investigation. The presenter has successfully defended his clients in seven such investigations and knows how to respond to them to avoid or minimize liability. Think of a gap analysis as an examination of: What you currently have in place for HIPAA compliance. Is that adequate? Can it be done better? Is it enough? And what am I missing? Asking these questions will help establish the direction and next steps to take. It lays the ground work for a good Risk Analy
Roger Steven

HIPAA Audits for 2016 - How to Prepare for the New Round of HIPAA Audits - 0 views

  •  
    Overview: In this session we will discuss the HIPAA audit and enforcement programs and how they work, and discuss the areas that caused the most issues in prior audits. We will explore what kind of issues and what kind of entities had the most problems, and show where entities need to improve their compliance the most. We will also explore the typical risk issues that lead to breaches of health information and see how those issues may be a target for auditors in the new 2016 audits. We will review the contents of the HIPAA Audit Protocol used in 2012 to show what documentation needs to be on hand should your organization be selected for an audit in the new round. We will present methods for using the contents of the HIPAA Audit Protocol to build your own compliance plan by extracting and updating the contents and relating your compliance activities directly to the questions that might be asked. In this session we will discuss the HIPAA audit and enforcement regulations and processes, and how they apply to HIPAA covered entities and business associates. We will explain the enforcement regulations and the new, increased fines and new penalty levels, including new penalties for willful neglect of compliance that begin at $10,000. We will discuss what information and documentation must be prepared in advance so that you can be ready for an audit at any time, including sample information request forms and questions asked at prior audits. The session will also cover how to know if you may become the subject of an audit or enforcement action, and what you can do to help limit your exposure. We will discuss how most enforcement actions come about and what can be done to prevent incidents that lead to enforcement activity. The HIPAA Privacy, Security, and Breach Notification regulations (and the recent changes to them) and how they will be audited will be explained. Documentation requirements for compliance will be explored and a framework of security policies necessary
Roger Steven

Seminar on Effective and Efficient Internal and Supplier Quality System Auditing for Me... - 0 views

  •  
    Course "Effective and Efficient Internal and Supplier Quality System Auditing for Medical Devices" has been pre-approved by RAPS as eligible for up to 12 credits towards a participant's RAC recertification upon full completion. Overview: Do you want to understand how to do efficient and effective internal and supplier audits that meet all the requirements of your external auditors, but also add value to your company? Are you confused by all the requirements and guidance documents for medical device quality management systems and are tired of wading through all the regulatory language they contain. This course is for those who will do internal or supplier audits, manage an audit process for these or other company audits. This course will provide you with an easy to understand presentation on the auditing process as well as the requirements you will need to audit under ISO 13485 and the FDA Quality System Regulation (cGMP) Both FDA Quality System Regulation (QSR) and ISO 13485 require that companies do internal audits. However, because the FDA does not look at the content of internal audits, some companies do not get feedback on the true effectiveness of their internal audit system from the FDA during FDA Inspections. ISO 13485 auditors do look at internal audits, but are most concerned that you define a process that meets the requirements of the standard and are following your process. Both require that you define Auditor training is required, but this sometimes just requires reading the company's procedure, although most external auditors will look for more than this. Do you need to train new auditors for yours medical device quality management system or to audit your suppliers? Or do you need to improve the training of your internal and supplier auditors so that they add value to these audits? If you need to do either of these, this seminar will provide this training. In addition to auditing skills and hands-on auditing exercises, this seminar will provide an ove
Roger Steven

How to Perform a HIPAA Risk Assessment - 0 views

  •  
    Overview: The primary goal of this session is to demonstrate why the health care organization needs to perform a risk assessment and how to perform the risk assessment. This includes a description of the types of breaches of protected health information that have already occurred and the reasons those breaches happened. The presentation then provides that reasons that a risk assessment is required in a health care organization and who needs to perform the assessment. There are a number of approaches available both for purchase on the web and performed by professionals on site. This discussion helps the participant determine which approach is best for their health care organization and what portions of the assessment are most important to the organization. The topic addresses the key components of a risk assessment and how to perform the risk assessment. This includes how to define the specific risks, how to know, how to assess the likelihood and impact of the risk and the final determination on the level of severity of the risk for the organization. Finally, the session explains how to interpret the results of the risk assessment, how to use the results of the risk assessment for preparing the health care organization's policies and procedures and how to conduct the HIPAA training for its staff. Why should you attend: In addition to the negative publicity and potential fines, a breach of a patient's health information often leads to litigation which is also time consuming and costly. The way to avoid these situations is to perform a Risk Assessment to understand where the health care organization is risk of an unauthorized breach and provide a basis for becoming HIPAA compliant. There are three reasons why a Risk Assessment is necessary: First, both the HIPAA Privacy and Security Regulations require a Risk Assessment for the organization to be HIPAA compliant Second, as a result of the Risk Assessment the organization knows where it needs to address its effo
Roger Steven

How to Ensure a Successful Health Care Systems Implementation - 0 views

  •  
    Overview: Today's educated professionals function in a maze of different educational and training requirements, which vary from state to state and from profession to profession. Nowhere than in health care is this more evident where multidisciplinary health care practitioners work together towards a common goal for the patient. What is a profession? What areas of work require the unique professional education, training, and experience that becomes mandated by the state? What work requires professional judgment and skill so as to be regulated by the government through mandatory laws applicable to an individual person practicing his or her chosen profession? State laws are enacted for the protection of the public by legislatures in all the fifty states. A list of individual professions and their applicable statues and administrative regulations takes up entire volumes of lawbooks. These state laws impose significant regulation on these professionals, and often in very different ways found in many aspects of state regulation, from the educational process, the examination requirements, the state licensure applications, and the legal standards and rules of each unique profession. Explore how state licensure boards are created and function at the state level. While most such state agencies have common, core functions and operations, there are many differences - and some requirements that are truly the opposite from profession to profession. Review the common requirements the state imposes on the health care provider. Know the basics of professional education and licensure. Understand the difference between legally binding laws and mere codes of ethics, which are aspirational and do not form the basis for legal action. Find out how to understand and navigate the challenges presented from differing and conflicting state laws governing the many health care professions. Know where key requirements exist that are common to many professions. This program offers an obje
Roger Steven

Get Ready For Your HIPAA Compliance Audit - 0 views

  •  
    Overview: The webinar will concentrate on topics that HHS has announced will be the focus of the first round of "desk audits". They reflect significant areas of non-compliance revealed in the 2012 pilot audits and HHS HIPAA violation investigations concluded by Resolution Agreements and Corrective Action Plans. They include: HIPAA Risk Analysis Risk Management based on Risk Analysis Breach Notification Notice of Privacy Practices (for Covered Entities) Minimum Necessary Standard Access of Individuals to their PHI Authorizations Workforce Training This webinar is vital because, in focusing on preparation for a HIPAA Compliance Audit, Covered Entities and Business Associates may review, prioritize and structure their HIPAA Compliance programs. If you have HIPAA Compliance documentation ready to submit on two weeks notice to HHS you are implementing an effective HIPAA Compliance program. In addition, every Covered Entity or Business Associate may face an HHS HIPAA Compliance investigation at any time due to a complaint or a Breach. If you are "audit ready" you will be ready for an investigation - and better able to avoid complaints and prevent breaches. Why should you attend: Every Covered Entity and Business Associate is liable - without prior notice - to be audited for HIPAA Compliance by HHS You will have only 2 weeks after receiving your HIPAA Compliance Audit notification and data request to upload all requested documents to an HHS HIPAA Compliance Audit Portal The HIPAA Compliance Audit data request you receive will specify content and file organization, file names and any other document submission requirements Auditors will not contact an audited entity for clarifications or ask for additional information - it is essential that submitted documents are current, accurately reflect the entity's HIPAA Compliance program and demonstrate HIPAA Compliance Only data submitted on time will be assessed Failure to respond on time may be referred to the HHS regional
Roger Steven

Seminar on Texting and E-mail with Patients: Patient Requests and Complying with HIPAA ... - 0 views

  •  
    Course "Texting and E-mail with Patients: Patient Requests and Complying with HIPAA " has been pre-approved by RAPS as eligible for up to 12 credits towards a participant's RAC recertification upon full completion. Overview: With the recent advances in portable technology, more and more organizations and their users are taking advantage of mobile devices to save time and get work done more efficiently. Texting, portable e-mail, and Apps are revolutionizing the ways health care providers interact with their patients and get their work done. But the use of these devices comes with hidden costs of compliance, especially if they lead to a reportable breach under HIPAA or state laws. HIPAA Privacy and Security Officers have been struggling to keep up with the use of the devices to protect patient privacy and avoid compliance issues. Even if these devices aren't in formal use in your organization, you need to act now to anticipate their use and make sure they are used properly. This session is designed to provide intensive, two-day training in HIPAA compliance as it relates to the use of mobile devices, including how to use them with Protected Health Information, the policies and procedures you need to have in place to use them securely, and how to manage issues of the "BYOD" phenomenon. The session provides the background and details for any manager of health information privacy and security to know what issues to look for with mobile devices, what needs to be done for HIPAA compliance, and what can happen when compliance is not adequate. Audits and enforcement will be explained, as well as privacy and security breaches and how to prevent them. Numerous references and sample documents will be provided. The session will be valuable for both newcomers to HIPAA compliance as well as seasoned veterans. HIPAA compliance will be explained and discussed in detail, from the basics through the latest changes and new technology issues, so that the attendee will have a coherent u
Roger Steven

Ethics and Laws for Mental Health Professionals- 2 day In person Seminar - 0 views

  •  
    Overview: Mental health care practitioners work in today's diverse, fast-changing, multidisciplinary health care environment. Nowhere but in mental health is there such diversity of clinicians who provide the same or similar services of counseling and therapy. A potential client has a wide choice of mental health providers from whom to choose. Yet each individual mental health profession has a unique education, training, and experience requirement for practice. While similarities exist, requirements differ from state to state and even from profession to profession with a single state. What are these requirements and how do they apply? The state's authority and power over mental health practitioners often presents challenges to these mental health professionals that are not easy to navigate. Differing sources of legal and ethical authority govern each respective health care practitioner in ways that are similar but not the same. Ethics and law are similar, but not the same. All mental health practitioners must adhere to standards of state law which govern their professional practices, including the very core of the doctor-patient relationship. Codes of ethics and state law may both apply to govern the conduct of this clinician. Even some state laws are referred to as ethical codes. Complaints as to alleged misconduct or ethical failings are received and investigated by a state agency and leave the mental health practitioner with an uncertain process to handle and to defend the state action against them. With this background, this seminar empowers the full understanding and application of ethics and laws for mental health practitioners. Learn to identify and understand an ethical framework for a sound mental health practice. An ethical framework is essential to having the right perspective to examine mental health dilemmas. Compare and contrast regulatory laws and codes of ethics to understand their differing applicability. Know the difference between laws and ethics,
Roger Steven

Texting and E-mail with Patients Patient Requests and Complying with HIPAA - 0 views

  •  
    Overview: With the recent advances in portable technology, more and more organizations and their users are taking advantage of mobile devices to save time and get work done more efficiently. Texting, portable e-mail, and Apps are revolutionizing the ways health care providers interact with their patients and get their work done. But the use of these devices comes with hidden costs of compliance, especially if they lead to a reportable breach under HIPAA or state laws. HIPAA Privacy and Security Officers have been struggling to keep up with the use of the devices to protect patient privacy and avoid compliance issues. Even if these devices aren't in formal use in your organization, you need to act now to anticipate their use and make sure they are used properly. This session is designed to provide intensive, two-day training in HIPAA compliance as it relates to the use of mobile devices, including how to use them with Protected Health Information, the policies and procedures you need to have in place to use them securely, and how to manage issues of the "BYOD" phenomenon. The session provides the background and details for any manager of health information privacy and security to know what issues to look for with mobile devices, what needs to be done for HIPAA compliance, and what can happen when compliance is not adequate. Audits and enforcement will be explained, as well as privacy and security breaches and how to prevent them. Numerous references and sample documents will be provided. The session will be valuable for both newcomers to HIPAA compliance as well as seasoned veterans. HIPAA compliance will be explained and discussed in detail, from the basics through the latest changes and new technology issues, so that the attendee will have a coherent understanding of not only the rules, but also how to think about compliance and make sound compliance decisions on a day-to-day basis in the context of mobile devices. Agenda Day One Day one sets the stage with an ov
Roger Steven

Key Factors to Write an Effective Standard Operating Procedure (SOP) and Work I... - 0 views

  •  
    Course "Key Factors to Write an Effective Standard Operating Procedure (SOP) and Work Instructions (WIs)" has been pre-approved by RAPS as eligible for up to 12 credits towards a participant's RAC recertification upon full completion. Overview: Writing SOPs or procedural documents can be challenging at times. However, writing SOPs is overall a straightforward process. However, enforcing what you already created and implemented in the pipeline is another story. The term SOP is very obvious. We have seen "clearly written description of how specific tasks are to be done." Another satisfactory definition would be "detailed written instructions that achieve the uniformity of the performance of a specific function." Is the firm doing what the regulations specify? Is the firm doing what their procedures specify? If you are medical device or a pharmaceutical manufacturer, these definitions come as no surprise because when it comes to FDA regulations and guidance documents "establish" means to define, to document (in writing or electronically) and to implement. The goal and emphasis with FDA is simple. Proof of "Establish" is the foundation. Is the firm doing what the regulations specify? Is the firm doing what their procedures specify? Are the procedures being followed and enforced by company personnel? SOPs are needed in regulated industries to give step-by-step instructions for performing a particular job or task. This session will provide a step-by-step overview and a snapshot of the procedure description, the process and format. The subject matter of a SOP may range from how to operate a piece of machinery to how to log into a particular software program. SOPs ensure consistency and reliability because they require training of all affected parties. This session will address recent enforcement actions for SOP related violations but no surprise. Most of our enforcement actions are documentation related, i.e., SOP or other procedural documents. We will review examples from
Roger Steven

Seminar on Supplier Management for Medical Device Manufacturers at Washington, DC - 0 views

  •  
    Course "Supplier Management for Medical Device Manufacturers" has been pre-approved by RAPS as eligible for up to 12 credits towards a participant's RAC recertification upon full completion. Overview: Supplier selection and management is one of the critical issues for medical device manufacturers. Suppliers provide materials and services to the device manufacturer, which means that they can be critical to performance and delivery of your device. Neither the FDA nor your notified body regulates your suppliers (with a few exceptions). They expect you to have an effective process to ensure your suppliers perform in the regulatory environment. How well do you understand the requirements for supplier management? Could you pass a regulatory audit or inspection without any issues? This course delivers the tools, templates, and methods to help participants implement an effective and efficient supplier management program. This two-day hands-on course provides a clear understanding of the underlying principles of supplier management. The course uses exercises to solidify understanding. In addition, the course uses FDA Warning Letters to illustrate the points and help you learn from others. As part of the practical implementation, the course includes receiving acceptance activities, outsourced processes, process validation at the suppliers' location, supplier auditing techniques, and supplier issues in management review. The course uses the Global Harmonization Task Force (GHTF) framework, but expands it to cover other issues and techniques important in effective implementation. Why should you attend: Since FDA regulations do not allow them to audit your suppliers unless they make finished medical devices, they require that you have sufficient control over them. But from time to time the FDA makes a reinterpretation of what this means. This happened within the last f 5 years, so if you supplier management program is older than that, you need to make major changes in you supp
Roger Steven

Seminar on HIPAA for the Compliance Officer at Chicago, IL - 0 views

  •  
    Course "HIPAA for the Compliance Officer" has been pre-approved by RAPS as eligible for up to 12 credits towards a participant's RAC recertification upon full completion. Overview: I will be going into great detail regarding you practice or business and how it relates to the HIPAA Security/Privacy Rule, Areas covered will be history of HIPAA, privacy vs security, business associates, changes for 2016, audit process, paper based PHI, HIPAA and suing, texting, email, encryption, medical messaging, voice data and much, much, more I will uncover myths versus reality as it relates to this very enigmatic law based on over 600 risk assessments performed as well as years of experience in dealing directly with the Office of Civil Rights HIPAA auditors. I will also speak to real life audits conducted by the Federal government (I've been on both sides of these audits) what your highest risks are for being fined (some of the risk factors may surprise you). In addition, this course will cover the highest risk factors for being sued for wrongful disclosures of PHI and the manner in which patients are now using state laws to sue for wrongful disclosures. Don't always believe what you read online about HIPAA, especially as it relates to encryption and IT, there are a lot of groups selling more than is necessarily required. Why you should attend: This lesson will be addressing how practice/business managers (or compliance offers) need to get their HIPAA house in order before the imminent audits occur. It will also address major changes under the Omnibus Rule and any other applicable updates for 2016. There are an enormous amount of issues and risks for covered entities and business associates these days. I will speak on specific experiences from over 17 years of experience in working as an outsourced compliance auditor, expert witness on HIPAA cases, and thoroughly explain how patients are now able to get cash remedies for wrongful disclosures of private health information. More im
Roger Steven

New HIPAA Audit and Enforcement Activities: Being Prepared t- 2 day In person Seminar - 0 views

  •  
    Course "New HIPAA Audit and Enforcement Activities: Being Prepared to Show your Compliance " has been pre-approved by RAPS as eligible for up to 12 credits towards a participant's RAC recertification upon full completion. Overview: We will be discussing the history and evolution of HIPAA Privacy/Security and the major points you need to understand to proactively protect your practice or business from the imminent federal auditing process: * History of HIPAA * HITECH * HIPAA Omnibus Rule * How to perform a HIPAA Security Risk Assessment * What is involved in a Federal audit and how is it conducted * Risk factors for a federal audit * How to avoid a Federal audit * Business Associates and HIPAA audits * EHR and HIPAA * Business Continuity/Disaster Recovery Planning * Assessing your contractors and sub-contractors * In depth discussions on IT down to the nuts and bolts * Risk factors that can cause an audit (low hanging fruit) * New rules which grant states ability to sue citing HIPAA on behalf of a patient * New funding measures Why should you attend : The evolutions of this enigmatic law and how what was once relative benign in terms of enforcement is now fully funded and aggressive. Learn what you can do to be prepared for an audit and how to lower risks of ever being audited. It is absolutely imperative that you are proactive and not reactive with your compliance program, this is a necessary evil and you need to protect your practice or your business and limit risks from the imminent Federal audits. Join me in keeping up with this very confusing law and take advantage of all the templates and information provided as part of the seminar. Areas Covered in the Session: * HIPAA -Brief History * HIPAA Privacy Rule vs HIPAA Security Rule * HITECH Act * Breach Notification Rule * Omnibus Rule and audits * Business Associates and audits * Current Court Cases (precedence) * Paper Based PHI Concerns and how to lower risk
Roger Steven

The Basics of Professional Regulatory Law: Licensure and Certification, with an Emphasi... - 0 views

  •  
    Overview: Today's educated professionals function in a maze of different educational and training requirements, which vary from state to state and from profession to profession. Nowhere than in health care is this more evident where multidisciplinary health care practitioners work together towards a common goal for the patient. What is a profession? What areas of work require the unique professional education, training, and experience that becomes mandated by the state? What work requires professional judgment and skill so as to be regulated by the government through mandatory laws applicable to an individual person practicing his or her chosen profession? State laws are enacted for the protection of the public by legislatures in all the fifty states. A list of individual professions and their applicable statues and administrative regulations takes up entire volumes of lawbooks. These state laws impose significant regulation on these professionals, and often in very different ways found in many aspects of state regulation, from the educational process, the examination requirements, the state licensure applications, and the legal standards and rules of each unique profession. Explore how state licensure boards are created and function at the state level. While most such state agencies have common, core functions and operations, there are many differences - and some requirements that are truly the opposite from profession to profession. Review the common requirements the state imposes on the health care provider. Know the basics of professional education and licensure. Understand the difference between legally binding laws and mere codes of ethics, which are aspirational and do not form the basis for legal action. Find out how to understand and navigate the challenges presented from differing and conflicting state laws governing the many health care professions. Know where key requirements exist that are common to many professions. This program
  •  
    Overview: Today's educated professionals function in a maze of different educational and training requirements, which vary from state to state and from profession to profession. Nowhere than in health care is this more evident where multidisciplinary health care practitioners work together towards a common goal for the patient. What is a profession? What areas of work require the unique professional education, training, and experience that becomes mandated by the state? What work requires professional judgment and skill so as to be regulated by the government through mandatory laws applicable to an individual person practicing his or her chosen profession? State laws are enacted for the protection of the public by legislatures in all the fifty states. A list of individual professions and their applicable statues and administrative regulations takes up entire volumes of lawbooks. These state laws impose significant regulation on these professionals, and often in very different ways found in many aspects of state regulation, from the educational process, the examination requirements, the state licensure applications, and the legal standards and rules of each unique profession. Explore how state licensure boards are created and function at the state level. While most such state agencies have common, core functions and operations, there are many differences - and some requirements that are truly the opposite from profession to profession. Review the common requirements the state imposes on the health care provider. Know the basics of professional education and licensure. Understand the difference between legally binding laws and mere codes of ethics, which are aspirational and do not form the basis for legal action. Find out how to understand and navigate the challenges presented from differing and conflicting state laws governing the many health care professions. Know where key requirements exist that are common to many professions. This program
Roger Steven

Key Factors to Develop HIPAA Policies and Procedures - 0 views

  •  
    Overview: One of the major requirements of the health care organization to be HIPAA compliant is to develop and implement a set of HIPAA privacy and security policies and procedures. This can be a daunting task for those not knowing where to start and what a set of HIPAA privacy and security policies and procedures should look like. For the cost conscious health care organization, the HIPAA policies and procedures can have multiple uses: first, they can become a basis for training the health care organization workforce; second, they can be used as a basis for conducting a HIPAA self-assessment; and third, they can be used to demonstrate due diligence should there be a breach or an externalHIPAA compliance audit. In today's world it is not necessary that the health care organization spend significant funds to develop a set of HIPAA privacy and security policies and procedures from scratch. The health care organization can likely find templates on the internet that can be used as a starting point to customize HIPAA policies and procedures to be unique for the health care organization. The preparation of a well-documented set of HIPAA policies and procedures needs to be addressed through the development of Privacy and Security policies and procedures that address each of the requirements shown in the HIPAA regulations as amended by the HITECH law and the final Omnibus Regulations. The process of developing the HIPAA privacy and security policies and procedures also provides a reference for the health care organization how to consider the security addressable and required regulation requirements. Why should you attend: There are three situations where having a set of HIPAA policies and procedures are needed: First, the policies and procedures become a good reference to ensure that all areas are addressed for becoming HIPAA compliant. Second, the HIPAA regulations REQUIRE covered entities and business associates to have a set of policies and procedures directing t
Roger Steven

HIPAA Compliance Fundraising: What You Need to Know, What You Need to Do - 0 views

  •  
    Overview: In 2013, The US Department of Health and Human Services made major changes to rules implementing The Health Insurance and Portability Act of 1996 (HIPAA) and Health Information Technology for Economic and Clinical Health Act of 2003 (HITECH). Among the many areas impacted by these rules (billing, marketing, research, IT security, etc.) is fund raising. The amendments significantly modify the methods and practice that hospitals, their institutionally related foundations, and other healthcare charities may or must employ when using ANY patient or client information for fund raising. The webinar will cover how to effectively implement the fund raising regulations in a manner that increases both opportunities for philanthropic support and compliant implementation of the new mandates. The rules include specific operational requirements, some of which prohibit protocols that were required under the original HIPAA regulations. The "magic words" mandated by HIPPA-related regulations changed in multiple areas. The webinar will cover all of these areas to ensure your organization is both legally compliant and operationally effective. The types of information that may be used for fund raising changed significantly. This presents numerous substantial fund raising opportunities, as well as challenges on the use and storage of such information. Among other areas to be presented are The required method for individuals to opt-out of receiving fund raising communication The methods of informing patients and clients of their right to opt-out from receiving fund raising communication The broadly expanded types of fund raising communication subject to opt-out rights How providers, hospital, and related fund raising foundation apply an opt-out election by an individual The type of patient and client information that health charities may use for fund raising The contents of provider's Notice of Privacy Practice How clinicians can assist both their patients/clients and the
Roger Steven

OIG CIAs: What Do They Mean To Your Compliance Program? - 0 views

  •  
    Overview: Learn how to improve your healthcare compliance program by using requirements found in corporate integrity agreements (CIAs) issued by the OIG. By proactively incorporating various features of CIAs, healthcare providers of all types can be better assured of meeting compliance standards. While there are many different types of healthcare compliance issues, probably the area of most concern is that of properly filing claims and receiving appropriate reimbursement. The OIG has issued various types of guidance including Federal Register entries, fraud alerts, and issues as listed in the OIG Work Plans. By providing such guidance, the OIG has given healthcare providers notice so that there can be no defense of not knowing about an issue. By organizing your compliance program to detect and then correcting various types of issues is a major objective of having a compliance program. Understanding systematic processes for improving your healthcare compliance program using CIA requirements can forestall possible criminal and civil monetary penalties. The hundreds of CIAs that have been developed when the OIG detects fraudulent activities can be used as a guide for developing and improving healthcare compliance programs for all types of healthcare providers. The process of statistical extrapolation is used by the OIG when conducting studies in order to determine recoupment amounts. Statistical extrapolation can also be used by healthcare providers when determining possible overpayments. However, the proper use of statistical extrapolation is a formal and complex mathematical process that must be properly applied. The OIG CIAs provide another resource for healthcare providers to study, understand, and then apply as appropriate. Why should you Attend: What are the OIG Corporate Integrity Agreements (CIAs)? Why does the OIG issue CIAs? Can I use general requirements from CIA to avoid monetary penalties or even avoid going to jail? Can any healthcare provider use
1 - 20 of 296 Next › Last »
Showing 20 items per page