Skip to main content

Home/ Healthcare 2.0/ Group items tagged Office

Rss Feed Group items tagged

Roger Steven

Office of Civil Rights "OCR" is sending Audit Screening Questionnaires to Covered Entit... - 0 views

  •  
    Overview: Participants will understand the importance of responding to the OCR pre-audit requests and how to respond. Our discussion will cover how to prepare for an anticipated OCR HIPAA privacy audit, by discussing how to conduct an internal self-assessment of your privacy program. We will discuss how to conduct the self-assessment, whether it be the need for policies, procedures or obtaining all of your business associates information. Why should you Attend: If you have received a request from the OCR to provide the name of your entities privacy official and additional criteria, you are already aware that you are on the OCR's radar and may be the focus of an audit. If you haven't received a request yet, anticipate receiving one soon. In addition to ensuring that your HIPAA program is audit ready, you also need to ensure that you know all of your business associates and have their information readily available to provide to the OCR. Your entity needs to be ready now, as the OCR will either conduct focused desk audits, on-site audits or both in effort to review documentation of evidence of your compliance with the HIPAA regulation. Areas Covered in the Session: Office of Civil Rights "OCR" requests for privacy official and additional information and timeline for response Internal assessment criteria of privacy program in anticipation of an OCR audit Conducting the assessment using the template based upon HIPAA regulations Discuss methods to address any found deficiencies Workforce training Who Will Benefit: Healthcare providers Compliance and Internal Audit professionals or office staff responsible for ensuring patient privacy Healthcare Administrators Business Associates and all HIPAA Covered Entities Speaker Profile Gail Madison Brown is a registered nurse and an attorney with over 25 years of experience in health care. For the last 15 years she has focused on health care compliance and revenue cycle management operations. Gail's experience ranges
Roger Steven

HIPAA Breaches and help from Cybersecurity Insurance - 0 views

  •  
    Overview: Remember spaghetti code? The HIPAA breach area is now almost as convoluted and overlapping and confusing as spaghetti code. Sometimes you think you are both coming and going at the same time when you think through an event to determine if your organization has had a breach. For example: Is a security incident always a beach? Is an ePHI breach a security incident as well? Is a cybersecurity event always a breach? What if it does not steal any clinical information, diagnoses or procedures information, or any payment information? A security incident? Or both? Are all the necessary kinds of notice in the Breach rule? What is Cybersecurity Insurance? Is it really the finger in the dike or itself full of Swiss cheese? Can the loss of patient or member data be a HIPAA breach and identity theft plus a fraud issue? Why should you Attend: HIPAA breaches now number in the multiple thousands, if not multiple millions. Your organization needs to be prepared for the initial sense of panic, a complete investigation, and the federal, state and reputational costs of a mega breach. A breach now costs in money approximately $225/record. And this does not include any fine of any type. The loss and theft of 1000 records may cost you organization from a quarter to $1 M, or more, and 6 months to a year to resolve. You need to know the basics of what PHI and ePHI really are; what puts the event into the breach safe harbor, what breach exceptions keeps the event out of OCR's hands, what the 4 factors are and how they are used. You need to know that your organization's breach plan and your policies and procedures include the need to notify when necessary the police, the FBI and other state and federal organizations beyond the Office for Civil Rights. Your organization needs to know how to protect itself after the fact by considering Cybersecurity Insurance. Areas Covered in the Session: Definition and reporting of a Security Incident Definition of a breach Breach Guidance Br
Roger Steven

How to Ensure a Successful Health Care Systems Implementation - 0 views

  •  
    Overview: The presentation takes the participant through the steps needed to ensure a successful health care computer system implementation. Once presented the participant will see the logic of the tools and processes and be able to apply them to their system implementation. The tools and processes presented in this material have been developed by implementing health care systems for over 40 years and seeing what has worked and WHY it has worked. These tools and processes have been equally and successfully applied to the implementation of large, complex systems and smaller, simpler systems for large, multidepartment organizations and for small health care organizations. The process focuses on establishing the project's implementation expectations, identifying meaningful metrics for success, establishing project plans, assigning individual accountabilities and responsibilities, establishing and executing project tasks, monitoring project progress and validating project success. To establish viable project expectations, the presentation addresses the need for bringing all of the stakeholders (organization owners, providers and management, operations staff, IT staff and the vendor) into establishing common and realizable expectations. These are reviewed in context of the organization's current environment and its short and long term goals and are considered as a critical part of the implementation completion process. In the case of turning around an already troubled or failed system implementation, the process emphasizes the tasks of reassessing the project stakeholder expectations - why they decided the system would help the organization and what they expected to get from the system. Next the process shows the participant how to convert these expectations to realistic and measurable project success metrics. The process focuses on learning how to separate "so what" metrics from meaningful and measurable metrics. In addition, the process provides direction regardin
Roger Steven

HIPAA and Health IT - What You Need to Know as a Business Associate - 0 views

  •  
    Overview: As defined by the Health Information Portability and Accountability Act (HIPAA), a Business Associate can be any organization or person working in association with or providing services to a Covered Entity who handles or discloses Protected Health Information (PHI) or Personal Health Records (PHR). With certain exceptions, a person or entity that creates, receives, maintains, or transmits PHI for a function or activity regulated by the HIPAA Privacy Rule for a Covered Entity is a Business Associate. The HITECH Act, a recent update made to overall HIPAA regulations require Business Associates to comply with HIPAA mandates regarding the handling and use of health information. As a Business Associate you must comply with a wide-range of regulatory obligations, including certain privacy obligations, security standards, and breach notification requirements. If your business needs to understand what it means to be a Business Associate and know what required safeguards, policies and procedures must be in place or make sure your current compliance program is adequate and can withstand government scrutiny, please join us for this informative and interactive session. Why should you Attend: There is a lot of confusion about the role and requirements of being a Business Associate. Organizations must be prepared prior to entering into these contracts for services as a vendor and subcontractor. Attendees will leave the course clearly understanding of all the requirements that must be in place for the Business Associate - Covered Entity arrangement. After completing this course, a Business Associate will have a clear understanding as to what needs to be place when it comes to all of the HIPAA regulations. Areas Covered in the Session: Why was HIPAA created? Who Must Comply with HIPAA Requirements? What are the HIPAA Security and Privacy Rules? What are the Consequences of being a Business Associate What is a HIPAA Compliance Program? What is a HIPAA Risk Mana
sachin_cmi

High Prevalence of Chronic Disorders to Augment Growth of Global Patient Monitoring Dev... - 0 views

  •  
    Patient monitoring refers to the collection and analysis of medical data from one or more health settings (such as in hospitals or doctor's offices) for use by health care providers and other professionals in order to detect changes in an individual's medical status and to provide treatment options as needed. In health care, patient monitoring is generally the measurement of one or more medical parameters over extended periods of time, usually at different health care settings (such as in doctor's offices or hospitals). Patient monitoring may be implemented in many different health care settings including primary care offices, emergency rooms, doctors' offices, nursing homes, private practices, and government agencies. Most patient monitoring systems contain software that collect and store medical data in a database that is accessible to multiple health care providers and to health care facilities. High prevalence of chronic disorders is expected to propel growth of the global remote patient monitoring devices market over the forecast period. For instance, according to the study, "Global and regional diabetes prevalence estimates for 2019 and projections for 2030 and 2045: Results from the International Diabetes Federation Diabetes Atlas, 9th edition", published in the journal Diabetes Research and Clinical Practice, in September 2019, 463 million people are expected to suffer from diabetes in 2019 worldwide and the number is expected to reach 578 million by 2030 and 700 million by 2045. Read More @ https://coherentmarketinsights-blog.blogspot.com/2020/11/high-prevalence-of-chronic-disorders-to.html
darshan_jobs

MBBS Jobs In Noida - 0 views

MBBS Jobs In Noida Visit URL and apply for jobs - https://jobs.docthub.com/health-claims-manager-J49257 https://jobs.docthub.com/medical-officer-mbbs-J39043 https://jobs.docthub.com/consultant-J3...

mbbsjobs

started by darshan_jobs on 12 Sep 23 no follow-up yet
Roger Steven

Seminar on HIPAA for the Compliance Officer at Chicago, IL - 0 views

  •  
    Course "HIPAA for the Compliance Officer" has been pre-approved by RAPS as eligible for up to 12 credits towards a participant's RAC recertification upon full completion. Overview: I will be going into great detail regarding you practice or business and how it relates to the HIPAA Security/Privacy Rule, Areas covered will be history of HIPAA, privacy vs security, business associates, changes for 2016, audit process, paper based PHI, HIPAA and suing, texting, email, encryption, medical messaging, voice data and much, much, more I will uncover myths versus reality as it relates to this very enigmatic law based on over 600 risk assessments performed as well as years of experience in dealing directly with the Office of Civil Rights HIPAA auditors. I will also speak to real life audits conducted by the Federal government (I've been on both sides of these audits) what your highest risks are for being fined (some of the risk factors may surprise you). In addition, this course will cover the highest risk factors for being sued for wrongful disclosures of PHI and the manner in which patients are now using state laws to sue for wrongful disclosures. Don't always believe what you read online about HIPAA, especially as it relates to encryption and IT, there are a lot of groups selling more than is necessarily required. Why you should attend: This lesson will be addressing how practice/business managers (or compliance offers) need to get their HIPAA house in order before the imminent audits occur. It will also address major changes under the Omnibus Rule and any other applicable updates for 2016. There are an enormous amount of issues and risks for covered entities and business associates these days. I will speak on specific experiences from over 17 years of experience in working as an outsourced compliance auditor, expert witness on HIPAA cases, and thoroughly explain how patients are now able to get cash remedies for wrongful disclosures of private health information. More im
Roger Steven

How to Ensure a Successful Health Care Systems Implementation - 0 views

  •  
    Overview: Today's educated professionals function in a maze of different educational and training requirements, which vary from state to state and from profession to profession. Nowhere than in health care is this more evident where multidisciplinary health care practitioners work together towards a common goal for the patient. What is a profession? What areas of work require the unique professional education, training, and experience that becomes mandated by the state? What work requires professional judgment and skill so as to be regulated by the government through mandatory laws applicable to an individual person practicing his or her chosen profession? State laws are enacted for the protection of the public by legislatures in all the fifty states. A list of individual professions and their applicable statues and administrative regulations takes up entire volumes of lawbooks. These state laws impose significant regulation on these professionals, and often in very different ways found in many aspects of state regulation, from the educational process, the examination requirements, the state licensure applications, and the legal standards and rules of each unique profession. Explore how state licensure boards are created and function at the state level. While most such state agencies have common, core functions and operations, there are many differences - and some requirements that are truly the opposite from profession to profession. Review the common requirements the state imposes on the health care provider. Know the basics of professional education and licensure. Understand the difference between legally binding laws and mere codes of ethics, which are aspirational and do not form the basis for legal action. Find out how to understand and navigate the challenges presented from differing and conflicting state laws governing the many health care professions. Know where key requirements exist that are common to many professions. This program offers an obje
Roger Steven

Understanding Medical Identity Theft and ways of preventing it - 0 views

  •  
    Understanding Medical Identity Theft and ways of preventing it Medical Identity Theft is a common phenomenon in today's situation, where most health records are digitized. Although a lot of precaution goes into the security and protection of these records, Medical Identity Theft is a cause for worry. medicalIdentityTheft The most common types of data that are stolen are Social Security Number (SSN), name and the Medicare number, the most potent tools with which to impersonate and manipulate data. Why do crooks steal medical data? Medical Identity Theft happens mainly because hackers and mischief-makers access protected data to lay hands on confidential information about patients, using which they obtain medical care on behalf of the person/s whose records they steal or purchase expensive medicines. In many cases, a Medical Identity Theft is detected only after one gets a bill for a purchase or service that was never made. medicalIdentityTheft Medical Identity Theft is also committed to buy drugs and obtain fake bills that are then submitted to Medicare in the name of the original holder of the medical record. These acts can significantly dent a person's credit rating. More importantly, when wrong information or fictitious diagnosis is made into the medical record, it can lead to dangerous consequences. Ways of protection of medical data The Office of the Inspector General (OIG), which comes under Health and Human Services (HHS), realizing the gravity of the problem of Medical Identity Theft, has formulated the "3D" approach to protect medical data and prevent Medical Identity Theft. These are: Deter: One of the ways of protecting medical data is to prevent Medical Identity Theft. Users should be cautious about parting with information to anyone who claims, over phone, to have a new scheme whose enrolment requires the Social Security Number. Detect:Many fraudsters accost people at accessible public places to announce supposedly "new" medical schemes. Governm
Roger Steven

OIG CIAs: What Do They Mean To Your Compliance Program? - 0 views

  •  
    Overview: Learn how to improve your healthcare compliance program by using requirements found in corporate integrity agreements (CIAs) issued by the OIG. By proactively incorporating various features of CIAs, healthcare providers of all types can be better assured of meeting compliance standards. While there are many different types of healthcare compliance issues, probably the area of most concern is that of properly filing claims and receiving appropriate reimbursement. The OIG has issued various types of guidance including Federal Register entries, fraud alerts, and issues as listed in the OIG Work Plans. By providing such guidance, the OIG has given healthcare providers notice so that there can be no defense of not knowing about an issue. By organizing your compliance program to detect and then correcting various types of issues is a major objective of having a compliance program. Understanding systematic processes for improving your healthcare compliance program using CIA requirements can forestall possible criminal and civil monetary penalties. The hundreds of CIAs that have been developed when the OIG detects fraudulent activities can be used as a guide for developing and improving healthcare compliance programs for all types of healthcare providers. The process of statistical extrapolation is used by the OIG when conducting studies in order to determine recoupment amounts. Statistical extrapolation can also be used by healthcare providers when determining possible overpayments. However, the proper use of statistical extrapolation is a formal and complex mathematical process that must be properly applied. The OIG CIAs provide another resource for healthcare providers to study, understand, and then apply as appropriate. Why should you Attend: What are the OIG Corporate Integrity Agreements (CIAs)? Why does the OIG issue CIAs? Can I use general requirements from CIA to avoid monetary penalties or even avoid going to jail? Can any healthcare provider use
Roger Steven

The Roles And Responsibilities of a HIPAA Privacy & Security Officer - 0 views

  •  
    Overview: Discussions, presentation, and webinars regarding HIPAA regulations are usually addressed from the perspective of what the regulations entail, the necessity of compliance with the regulations, and the consequences of willful neglect or non-compliance. This presentation addresses HIPAA regulations from a different perspective - from a personal perspective - from the perspective of the person in charge of moving an organization or facility toward full compliance with HIPAA. The by-product of this presentation will be both an understanding of, and a detailed job description for, a position mandated in the regulations - the HIPAA Security/Privacy Officer. Why should you attend: The HIPAA regulations are numerous, complicated, often vague, and affect every person working in a healthcare facility. Compliance with HIPAA will require a unique individual to lead the charge - an individual whose education, background, experience, and demonstrated skill sets offer the opportunity for that person to succeed in achieving the goals of that position. This is a new position to most healthcare facilities. So understanding who this person should be, what is required of the person with this job title, and with whom this person will interface is vital to every healthcare organization with the goal of achieving full compliance with HIPAA. Areas Covered in the Session: Position goals Position requirements (education, experience, skill sets, etc.) Position responsibilities Stay abreast of regulations Initiate compliance with HIPAA (according to regulations) Ensure continuous progress toward full compliance Develop appropriate security/privacy policies & procedures Oversee and deliver appropriate training programs to all employees Track compliance with HIPAA regulations at the facility & individual levels Track access to PHI Investigate and resolve HIPAA violations Apply sanctions to HIPAA violators Manage any information security personnel Prepare a department
Roger Steven

Exploring 2D and 3D Digital Dental Radiography - 0 views

  •  
    Overview: This presentation will introduce the participants to changing role of the panoramic x-ray machine in dental offices today. Its expanding role in extra oral exposures and enhanced diagnostic capabilities is forever changing the path of dental x-ray imaging. Digital radiography is rapidly improving in diagnostic quality and loweringthe radiation exposure with ultra-low dose technology. We can have extra oral 2D bite wings and periapical x-rays with less radiation and greater diagnostic capability than traditional intraoral x-rays. The time has come that all dentists should have access to 3D-Cone Beam Computer Tomography. It is rapidly becoming the standard of care. Why should you Attend: Digital radiography is rapidly changing in today's dental offices. The new technology is revolutionizing patient flow and improving diagnosis. Dr. Jesek is at the forefront of this technology, using both 2D and 3D radiography. Seminar attendees will get easy to understand approach, which enables deep learning and provides tools they can use when they get back to the office Monday morning. Areas Covered in the Session: CBCT can be used to in areas of general dentistry to improve patient acceptance and quality of treatment outcomes. General and Restorative Dentistry Oral Surgery Implant Dentistry Endodontics Periodontics Orthodontics Sleep Apnea/Air way Who Will Benefit: Dentists Hygienists Assistants Speaker Profile : Dr. Warren Jesek graduated from Millikin University with a B.A. in biology and chemistry. After, he completed graduate work studies in anatomy at the University of Nebraska before attending Loyola University Dental School where he received his dental degree in 1979. He has maintained a private general practice in Decatur, Illinois since 1979. Unique to the area, his practice houses a crown and bridge laboratory with three technicians focusing on CAD/CAM milling technology to produce metal-free inlays, crowns and bridges. Dr. Jesek continued his training
Roger Steven

Disposition of Records and Records Retention for Medical Records, Including Electronic ... - 0 views

  •  
    Overview: Today's health care delivery occurs in a diverse, fast-changing, multidisciplinary health care environment. This often presents challenges to the health care professional that are not easy to navigate. Medical records and their confidentiality have long been the exclusive province of state law, but has now been recognized for some time in the federal HIPAA statutes and federal regulations. Differing and even conflicting sources of requirements at the state level still exist for the retention and disposition of medical records. These sources may vary based upon the specific health care practitioner - whether physicians, dentists, psychologists, or other health care providers, including mental health practitioners. As to the specific, individual health care practitioner, state laws mandate their confidentiality, retention, and even their specific content with regards to patient, clinical records. In addition to these clinical requirements, additional state laws set forth the content and retention of other types of records kept by the professional, such as supervisory agreements with other professionals subordinate to them as well as their own unique record content requirements. With the majority of medical records moving to an electronic format, special rules now exist with regard to the confidentiality, security, retention, and disposition of electronic medical records. This is particularly important as state laws continue to allow for and regulate the provision of telemedicine by various health care practitioners. For example, while psychotherapy and mental health services are ideal treatments to offer over the internet, that is, by simultaneous audio-visual transmission between the doctor and the patient, the risks of breaches of confidentiality also vastly increase. And when the successful doctor-patient relationship is over, how does the health care practitioner providing a mental health service dispose of these electronic records? In addition to
Roger Steven

HIPAA and the Emergency Room - 0 views

  •  
    Overview: I will be talking to specifics of HIPAA and the emergency room setting, do's and don'ts as well as dispelling myth vs reality. This lesson will be addressing how compliance officers need to get their HIPAA house in order as HIPAA is now fully enforced and the government is not using kid gloves any more. It will also address major changes under the Omnibus Rule and any other applicable updates for 2016 and beyond. There are an enormous amount of issues and risks for hospitals these days especially with the new legislation involving patient cash remedies for wrongful disclosure. I will speak on specific experiences from over 17 years of experience in working as an outsourced compliance auditor, expert witness on HIPAA cases within the ER, and thoroughly explain how patients are now able to get cash remedies for wrongful disclosures of private health information. More importantly I will show you how to limit those risks by simply taking proactive steps and utilizing best practices. Why should you Attend: What can and can't we do in the hectic emergency room with patient information? What are the new liabilities involved? How can we ensure security but also ensure patient care? This once rarely enforced law has changed and you need to know what's going on! What factors might spurn a HIPAA audit? …are you doing these things? Why are the Feds enforcing after all these years? State laws are now also more strict increasing liability for patient remedies! We will be discussing some of the changes taking place in Washington with the Health and Human Services in regards to the enforcement of the HIPAA laws already on the books. I will go over some of the new changes specifically affecting the emergency room setting I will also be discussing factors might cause an unwanted visit or letter from the Office of Civil Rights and how to prepare for a potential audit Areas Covered in the Session: Updates for Omnibus Emergency Room Do's and Don'ts in the ER Ambulato
Roger Steven

HIPAA for Dummies: Boot Camp - 0 views

  •  
    Overview: This lesson is going to get back to the basics using multiple real life scenarios and "what if's". My goal is to make this very confusing and not well explained law easy to understand for the typical staff member. I will uncover myths versus reality as it relates to this enigmatic law based on over 1000 risk assessments performed as well as years of experience in dealing directly with the Office of Civil Rights HIPAA auditors. I will also point out multiple court cases I have been affiliated with where a staff member of a hospital or clinic has been sued or even imprisoned! I will also speak to real life audits conducted by the Federal government (I've been on both sides of these audits) what your highest risks are for being fined (some of the risk factors may surprise you). In addition this course will cover the highest risk factors for being sued for wrongful disclosures of PHI and the manner in which patients are now using state laws to sue for wrongful disclosures. Don't always believe what you read online about HIPAA, especially as it relates to encryption and IT, there are a lot of groups selling more than is necessarily required. Why should you Attend: Are you confused about HIPAA? Do you just want the basics and in plain English? Do you know there are civil and criminal penalties even for the rank and file staff member! Do you know what you can and can't do with protected health information? It is important to understand the new changes going on at Health and Human Services as it relates to enforcement of HIPAA for both covered entities and business associates as it relates to portable devices, texting, and emailing of PHI. You need to know how to avoid being low hanging fruit in terms of audit risk as well as being sued by individuals who have had their PHI wrongfully discloses due to bad IT practices. I have also been expert witness on multiple court cases where a business or medical practice is being sued for not doing their due diligence
Roger Steven

HIPAA Breach Notification Rules and its new version - 0 views

  •  
    HIPAA Breach Notification Rules and its new version : Let us begin at the beginning: What is breach notification? The term is pretty simple to understand. It means notifying the authorities whenever there is a breach of Protected Health Information (PHI). Covered Entities (CE's) and Business Associates (BA's), who are closely associated with PHI, and individuals whose PHI data are breached, are required to bring such data breaches to the notice of the authorities, whenever there is one. A breach notification is a mechanism that is aimed at ensuring that BA's and CE's meet requirements in the HITECH Act in the American Recovery and Reinvestment Act of 2009 (ARRA). To whom should the affected individuals and CE's and BA's complain? Whenever there is a breach of PHI by a CE or a BA, or if there is violation of the Privacy, Security, or Breach Notification Rules, the affected individual can complain to the Office for Civil Rights (OCR), which will initiate investigation into these complaints. Whenever a CE or a BA detects a breach, it can complain to the Secretary of Health and Human Services (HHS). In addition, the HIPAA breach notification rules have clear guidelines on how to report breaches in the following classifications: HIPAA's definition of a breach A breach of PHI is said to have taken place when any unpermitted use or disclosure that compromises the security of the data in the PHI takes place. Any such action, resulting in the breach of any kind of data contained in a PHI, big or small, is considered a breach, unless the CE or BA can explain that the data that got breached into was not serious enough, from its risk assessment point of view, to warrant immediate intervention. The new HIPAA breach notification rules The HHS embarked on a new HIPAA breach notification program, the HIPAA Privacy, Security, and Breach Notification Audit Program, with which it seeks to bring a few changes into the existing HIPAA breach notification rules. This new Audit Pr
Roger Steven

Conducting a Privacy Investigation Without Doubt! - 0 views

  •  
    Overview: Participants will learn how to conduct an investigation of allegations of patient privacy violations using a privacy "risk analysis" tool and steps that should be taken when a breach has been determined. Why should you Attend: You must conduct a prompt and thorough investigation of all allegations of privacy violations. A violation of a patient's privacy may result in monetary penalties, harm to your reputation and especially harm to a patient. You need to make certain your organization has the expertise to conduct a thorough privacy investigation, analyze the results and take all necessary action to mitigate and report violations when required. Areas Covered in the Session: Best practices for conducting a privacy investigation Use of the risk analysis tool Interpretation of your results Reporting requirements if necessary Recommendations of continued privacy monitoring Workforce training Who Will Benefit: Healthcare providers Compliance and Internal Audit professionals or office staff responsible for ensuring patient privacy Healthcare Administrators Business Associates and all HIPAA Covered Entities Speaker Profile : Gail Madison Brown is a registered nurse and an attorney with over 25 years of experience in health care. For the last 15 years she has focused on health care compliance and revenue cycle management operations. Gail's experience ranges from starting new compliance programs and making improvements to existing programs for physician practices to large health care organizations. Gail also has provided numerous lectures to healthcare providers, executives and professional colleagues. Gail Madison Brown will develop, implement, and oversee processes, systems, educational programs, and other activities necessary to support and grow clinical trials activities at the UT Health Science Center. The Chief Clinical Trails Officer (CCTO) provides overall strategic leadership in this area including planning, goal setting, and monitoring organ
Roger Steven

HIPAA and the Hospital Setting - 0 views

  •  
    Overview: I will be talking to specifics of HIPAA in the hospital setting, , do's and don'ts as well as dispelling myth vs reality. This lesson will be addressing how compliance officers need to get their HIPAA house in order as HIPAA is now fully enforced and the government is not using kid gloves any more. It will also address major changes under the Omnibus Rule and any other applicable updates for 2016 and beyond. There are an enormous amount of issues and risks for hospitals these days especially with the new legislation involving patient cash remedies for wrongful disclosure. I will speak on specific experiences from over 17 years of experience in working as an outsourced compliance auditor, expert witness on HIPAA cases within the hospital setting, ER setting, and thoroughly explain how patients are now able to get cash remedies for wrongful disclosures of private health information. More importantly I will show you how to limit those risks by simply taking proactive steps and utilizing best practices. Why should you Attend: What can and can't we do in the hospital setting with patient information? What are the new liabilities involved? How can we ensure security but also ensure patient care? This once rarely enforced law has changed and you need to know what's going on! - there are new liabilities! What factors might spurn a HIPAA audit? …are you doing these things? Why are the Feds strictly enforcing after all these years? State laws are now much tougher increasing liability for patient remedies! We will be discussing some of the changes taking place in Washington with the Health and Human Services in regards to the enforcement of the HIPAA laws already on the books. I will go over some of the new changes specifically affecting the hospital as well as the emergency room setting I will also be discussing factors might cause an unwanted visit or letter from the Office of Civil Rights and how to prepare for a potential audit Areas Covered in the Sessi
Roger Steven

Setting up a compliance program in healthcare - 0 views

  •  
    Setting up a compliance program in healthcare: Organizations that set up a compliance program in healthcare should go by many voluntary regulations from the OIG, apart from those mandated by HIPAA. Setting up a compliance program in healthcare is about being compliant with standards. This entails having to be compliant with several standards, which cover a wide variety of areas. There are several voluntary and mandatory guidelines from the Office of the Inspector General (OIG), apart from standards from HIPAA. Setting up a compliance program in healthcare meeting HIPAA requirements is set out and mandated by the Patient Protection and Affordable Care Act (PPACA). Guidelines from the Office of the Inspector General (OIG) The series of compliance program guidance documents from the OIG are largely voluntary, and are meant for the different sections of the health care industry. These include Hospitals Nursing homes Third-party billers, and Durable medical equipment suppliers. These guidelines are issued with the intention of motivating healthcare units to develop and use their own internal controls aimed at helping them adhere to regulations, program requirements and statutes. The OIG issues documents, which act as guidelines for setting up a compliance program in healthcare by providing principles. These need to be adapted when healthcare organizations have to develop their own compliance program that is in tune with their best interests and needs. Another major aim is served in the implementation of these guidelines for setting up a compliance program in healthcare: They help healthcare units to understand the nature of fraud and other risks associated with abuse, when they are setting up a compliance program for their healthcare unit. HIPAA requirements Setting up a compliance program in healthcare while being compliant with HIPAA regulationsrequires a healthcare organization to put in place measures that ensure that health records must: Be confident
Roger Steven

Ethics and Laws for Mental Health Professionals- 2 day In person Seminar - 0 views

  •  
    Overview: Mental health care practitioners work in today's diverse, fast-changing, multidisciplinary health care environment. Nowhere but in mental health is there such diversity of clinicians who provide the same or similar services of counseling and therapy. A potential client has a wide choice of mental health providers from whom to choose. Yet each individual mental health profession has a unique education, training, and experience requirement for practice. While similarities exist, requirements differ from state to state and even from profession to profession with a single state. What are these requirements and how do they apply? The state's authority and power over mental health practitioners often presents challenges to these mental health professionals that are not easy to navigate. Differing sources of legal and ethical authority govern each respective health care practitioner in ways that are similar but not the same. Ethics and law are similar, but not the same. All mental health practitioners must adhere to standards of state law which govern their professional practices, including the very core of the doctor-patient relationship. Codes of ethics and state law may both apply to govern the conduct of this clinician. Even some state laws are referred to as ethical codes. Complaints as to alleged misconduct or ethical failings are received and investigated by a state agency and leave the mental health practitioner with an uncertain process to handle and to defend the state action against them. With this background, this seminar empowers the full understanding and application of ethics and laws for mental health practitioners. Learn to identify and understand an ethical framework for a sound mental health practice. An ethical framework is essential to having the right perspective to examine mental health dilemmas. Compare and contrast regulatory laws and codes of ethics to understand their differing applicability. Know the difference between laws and ethics,
‹ Previous 21 - 40 of 106 Next › Last »
Showing 20 items per page