Skip to main content

Home/ Healthcare 2.0/ Group items tagged prepared

Rss Feed Group items tagged

Roger Steven

HIPAA Audits for 2016 - How to Prepare for the New Round of HIPAA Audits - 0 views

  •  
    Overview: In this session we will discuss the HIPAA audit and enforcement programs and how they work, and discuss the areas that caused the most issues in prior audits. We will explore what kind of issues and what kind of entities had the most problems, and show where entities need to improve their compliance the most. We will also explore the typical risk issues that lead to breaches of health information and see how those issues may be a target for auditors in the new 2016 audits. We will review the contents of the HIPAA Audit Protocol used in 2012 to show what documentation needs to be on hand should your organization be selected for an audit in the new round. We will present methods for using the contents of the HIPAA Audit Protocol to build your own compliance plan by extracting and updating the contents and relating your compliance activities directly to the questions that might be asked. In this session we will discuss the HIPAA audit and enforcement regulations and processes, and how they apply to HIPAA covered entities and business associates. We will explain the enforcement regulations and the new, increased fines and new penalty levels, including new penalties for willful neglect of compliance that begin at $10,000. We will discuss what information and documentation must be prepared in advance so that you can be ready for an audit at any time, including sample information request forms and questions asked at prior audits. The session will also cover how to know if you may become the subject of an audit or enforcement action, and what you can do to help limit your exposure. We will discuss how most enforcement actions come about and what can be done to prevent incidents that lead to enforcement activity. The HIPAA Privacy, Security, and Breach Notification regulations (and the recent changes to them) and how they will be audited will be explained. Documentation requirements for compliance will be explored and a framework of security policies necessary
Roger Steven

It is important to ensure food safety in hospitals - 0 views

  •  
    It is important to ensure food safety in hospitals Hospitals being what they are - where patients of almost all kinds visit or stay - are very potent sources of infection. Infection can arise from any part of the hospital. They can spread from patients to patients, from caregivers to patients, from patients to caregivers, from patients to support or administrative staff and vice versa, and so on. An often overlooked source of infection and contamination is the food that comes into hospitals. Food safety in hospitals is a very important element of hygiene First, an understanding of food safety in the context of hospitals is necessary. Food safety in hospitals is described as the scientific way by which food is prepared, handled and stored in hospital settings. Any food that is prepared in hospital kitchens are, like food prepared in other places such as canteens, hotels and restaurants and even homes, sourced from outside. This food comes from suppliers whose hygiene has to be ensured. Food hazards can come in many forms, including, but not limited to: Biological Chemical Physical Allergenic Hazards an Several other contributing factors It is in the process of procuring materials for food and preparing it in hospital kitchens that a major part of food safety in hospitals is compromised. There has to be a thorough mechanism to ensure that all these producers and suppliers follow regulatory requirements in ensuring that the food they produce and supply to hospitals is clean and safe. Literally thousands of patients get infected from over 250 kinds of bacteria, parasites and viruses when they consume food prepared in hospitals. Findings of a recent study It is pertinent to recall the findings of study done in May 2014 in Geneva, Switzerland. It carried out an examination of chicken supplied to and prepared in a hospital in this city. An astounding four fifths of these chickens were known to have been infected with E.coli, leading to its possible transmission to pati
Roger Steven

New HIPAA Rules - Meeting Requirements for New Patient Rights and New Restrictions on D... - 0 views

  •  
    Overview: New changes modifying the HIPAA Privacy and Security Regulations are going into place to meet the privacy and security mandates within the HITECH Act in the American Recovery and Reinvestment Act of 2009. The changes include establishing new rights for individuals as well as changes to the limitations on uses and disclosures. New requirements for patient access to records and requirements to notify individuals in the event of a breach are only two of the many areas affected in the new law, including new requirements for restriction and accounting of disclosures and increased enforcement activity. Covered entities that use electronic health records (EHRs) will need to meet new access and disclosure rules and all kinds of business associates and their subcontractors will need to establish compliance programs. And if you are required to have a HIPAA Notice of Privacy Practices, you will need to update that to show all the new rights that patients will have, such as electronic copies, new rights to restrict disclosures, and much more. Business associates are now directly covered by the HIPAA privacy and security regulations and are liable for fines and penalties if they do not comply. If a business associate supplies services that interact with the new changes to the rules, the BA will need to be aware of the new requirements. We will explain what a Business Associate needs to do differently under the new regulations. Electronic records have new demands placed on them, in both providing access and in accounting for all disclosures of health information - the electronic age in health care brings new obligations to serve individuals as well as manage health information for healthcare professionals. We will discuss how disclosures must be tracked in an EHR and review the various ways patient records can be supplied electronically. The new regulations will be reviewed and their effects on usual practices will be discussed, as will what policies need to be chang
Roger Steven

Analytical Instrument Qualification and Validation: Understanding to Prepare for FD... - 0 views

  •  
    Seminar on Analytical Instrument Qualification and Validation: Understanding to Prepare for FDA Audits to become Part 11 Compliant at Boston, MA Course "Analytical Instrument Qualification and Validation: Understanding to Prepare for FDA Audits to become Part 11 Compliant" has been pre-approved by RAPS as eligible for up to 12 credits towards a participant's RAC recertification upon full completion. Overview: In this two day workshop conference you will learn the different global agencies expectations of analytical equipment qualification along with the development of a sound process validation program in order to develop and implement bulletproof solutions that are accepted, effective, and efficient. Through case study analysis we will examine best practices to provide thoughts and ideas to develop or improve the performance of your current system. Additionally, case studies will explore how your management practices of your analytical equipment qualification/ validation and process validation programs can help or hurt your legal liability and the legal issues that arise from nonconformance with regulators and Auditors. This seminar will help attendees understand the instrument qualification and system validation processes and will provide instruction on how to prepare for FDA audits and how to become part 11 compliant. Why should you attend? The cost of non-compliance is therefore more than that of compliance. Are you in compliance with the FDA regulations for analytical equipment qualification and validation in your facility? Areas Covered in the Session: * Learn about the regulatory background and requirements for laboratory instrument qualification and system validation * Understand the logic and principles of instrument qualification and system validation from validation planning reporting * Understand and be able to explain your company's qualification and validation strategies * Be able to independently prepare execute test protocols, this includes s
Roger Steven

How to Prepare for Increased HIPAA Enforcement - 0 views

  •  
    Overview: Being in compliance with HIPAA involves not only ensuring you provide the appropriate patient rights and controls on your uses and disclosures of protected health information, but you also have the proper policies and procedures in place. If audited or the subject of a compliance review you will be required to show the government you have all the necessary documentation in place for safeguarding patient Protected Health Information and indicate how you addressed all required security safeguards. This starts with the understanding the fundamentals of a HIPAA and how you will be required to demonstrate your organization's compliance program. If your healthcare practice, business, or organization needs to understand how to be prepared for an increase in HIPAA enforcement and make sure your current safeguards are adequate and can withstand government scrutiny, please join us for this informative and interactive course. Why should you Attend: BAll most 120,000,000 individuals were affected by HIPAA data breaches in 2015. This is a significant reason why Congress has inquired about the recent and very sizeable increases in cyber-attacks that inflect the risk of medical identity theft. The HHS Office for Civil Rights not only are conducting audits but is looking to increase HIPAA enforcement. Attendees will leave the course clearly understanding of all the requirements that must be in place for HIPAA and how to demonstrate compliance if audited. After completing this course, a Covered Entity or Business Associate will be able to know what needs to be place when it comes to all of the HIPAA regulations. Areas Covered in the Session: Why was HIPAA created? What are the HIPAA Security and Privacy Rules? What is a HIPAA Risk Management Plan? What is meant by "Required" and "Addressable" Implementation Specifications? What are Administrative, Technical, and Physical Safeguards Requirements? What is a HIPAA Risk Assessment? What are HIPAA training requirement
Roger Steven

How to Manage OCR, HHS HIPAA and HITECH Audit - 0 views

  •  
    Overview: Section 13411 of the Health Information Technology for Economic and Clinical Health (HITECH) Act, requires Health and Human Services (HHS) to conduct periodic audits of providers and business associates to ensure their compliance with the HIPAA Security and Privacy Rule, and breach notification standards. To implement this mandate, the Office of Civil Rights (OCR) has conducted HIPAA/HITECH audit program with KPMG of 115 health care organizations to assess privacy and security compliance. This webinar will focus on the implementation and tracking of HIPAA audit best practices in a healthcare setup in order to prepare for the federal audit using published OCR audit protocols. Every audit begins with interviews, a questionnaire, and a thorough policy and procedures review. Presenter, with his decades of knowledge in the compliance, legal, auditing and security areas, will walk the attendees through the audit process, documentation requirements, and implementation specifications of the HIPAA privacy, security and breach rules. This presentation not only provides opportunity for the participants to prepare for the federal HIPAA audit but also to improve the security posture of their organizations by adopting to changing technology (mobile, social media, Health Information Exchange(HIE), cloud services, etc.) and threat landscape perspective as well. This presentation will uncover reasons why many health information breaches are occurring and help organizations better secure and comply with electronic protected health information by meeting the required and addressable HIPAA/HITECH security rules. The presenter will also share the best practices used for HIPAA security implementation and continuous risk assessment which is considered as "due diligence" by auditors for the HIPAA security compliance program. Areas Covered in the Session: Healthcare Technology Adoption/Trends Healthcare Regulatory (HIPAA/HITECH) and OCR/HHS Audit Overview Differences between
Roger Steven

New HIPAA Audit and Enforcement Activities: Being Prepared t- 2 day In person Seminar - 0 views

  •  
    Course "New HIPAA Audit and Enforcement Activities: Being Prepared to Show your Compliance " has been pre-approved by RAPS as eligible for up to 12 credits towards a participant's RAC recertification upon full completion. Overview: We will be discussing the history and evolution of HIPAA Privacy/Security and the major points you need to understand to proactively protect your practice or business from the imminent federal auditing process: * History of HIPAA * HITECH * HIPAA Omnibus Rule * How to perform a HIPAA Security Risk Assessment * What is involved in a Federal audit and how is it conducted * Risk factors for a federal audit * How to avoid a Federal audit * Business Associates and HIPAA audits * EHR and HIPAA * Business Continuity/Disaster Recovery Planning * Assessing your contractors and sub-contractors * In depth discussions on IT down to the nuts and bolts * Risk factors that can cause an audit (low hanging fruit) * New rules which grant states ability to sue citing HIPAA on behalf of a patient * New funding measures Why should you attend : The evolutions of this enigmatic law and how what was once relative benign in terms of enforcement is now fully funded and aggressive. Learn what you can do to be prepared for an audit and how to lower risks of ever being audited. It is absolutely imperative that you are proactive and not reactive with your compliance program, this is a necessary evil and you need to protect your practice or your business and limit risks from the imminent Federal audits. Join me in keeping up with this very confusing law and take advantage of all the templates and information provided as part of the seminar. Areas Covered in the Session: * HIPAA -Brief History * HIPAA Privacy Rule vs HIPAA Security Rule * HITECH Act * Breach Notification Rule * Omnibus Rule and audits * Business Associates and audits * Current Court Cases (precedence) * Paper Based PHI Concerns and how to lower risk
Roger Steven

HIPAA Breach Notification Rule - What You Must Do To Comply - 0 views

  •  
    Overview: Final regulations for the new HIPAA Breach Notification Rule require much more than notifying individuals affected by a Breach of their Protected Health Information (PHI). Covered Entities and Business Associates first must follow and document a very specific process to determine if a Breach occurred. If no Breach occurred documentary proof must be kept for six years. If a Breach did occur timely notifications and other actions must be undertaken and documented. This webinar will explain: What Covered Entities and Business Associates must do to comply with the Breach Notification Rule What is and is not a Breach Three exceptions - when an acquisition, access, use, or disclosure of PHI not permitted by the Privacy Rule is not a Breach How to perform a Breach Risk Assessment to determine if you can demonstrate a a low probability that the PHI was compromised Who must be notified in case of a Breach When notifications must be provided What information must be contained in each notification Other requirements in case of a Breach Investigate Mitigate harm to affected individuals Protect against further Breaches Document everything Planning and preparation for the worst - public relations and mitigation strategies to limit damage to the organization's reputation and financial well-being Why should you attend: Breaches and incidents that might be Breaches happen all the time! More than 173,000 separate breaches of Protected Health Information (PHI) affecting less than 500 individuals were reported to the U. S. Department of Health and Human Services (HHS) between September, 2009 and May 31, 2015 and in the same period HHS received approximately 1240 reports of PHI breaches that affected 500 or more individuals An acquisition, access, use, or disclosure of PHI not permitted by the Privacy Rule is presumed to be a Breach unless it falls within an exception or the Covered Entity or Business Associate can demonstrate a low probability that the PHI was compromi
Roger Steven

Seminar on Supplier Management for Medical Device Manufacturers at Washington, DC - 0 views

  •  
    Course "Supplier Management for Medical Device Manufacturers" has been pre-approved by RAPS as eligible for up to 12 credits towards a participant's RAC recertification upon full completion. Overview: Supplier selection and management is one of the critical issues for medical device manufacturers. Suppliers provide materials and services to the device manufacturer, which means that they can be critical to performance and delivery of your device. Neither the FDA nor your notified body regulates your suppliers (with a few exceptions). They expect you to have an effective process to ensure your suppliers perform in the regulatory environment. How well do you understand the requirements for supplier management? Could you pass a regulatory audit or inspection without any issues? This course delivers the tools, templates, and methods to help participants implement an effective and efficient supplier management program. This two-day hands-on course provides a clear understanding of the underlying principles of supplier management. The course uses exercises to solidify understanding. In addition, the course uses FDA Warning Letters to illustrate the points and help you learn from others. As part of the practical implementation, the course includes receiving acceptance activities, outsourced processes, process validation at the suppliers' location, supplier auditing techniques, and supplier issues in management review. The course uses the Global Harmonization Task Force (GHTF) framework, but expands it to cover other issues and techniques important in effective implementation. Why should you attend: Since FDA regulations do not allow them to audit your suppliers unless they make finished medical devices, they require that you have sufficient control over them. But from time to time the FDA makes a reinterpretation of what this means. This happened within the last f 5 years, so if you supplier management program is older than that, you need to make major changes in you supp
Roger Steven

Key Factors to Write an Effective Standard Operating Procedure (SOP) and Work I... - 0 views

  •  
    Course "Key Factors to Write an Effective Standard Operating Procedure (SOP) and Work Instructions (WIs)" has been pre-approved by RAPS as eligible for up to 12 credits towards a participant's RAC recertification upon full completion. Overview: Writing SOPs or procedural documents can be challenging at times. However, writing SOPs is overall a straightforward process. However, enforcing what you already created and implemented in the pipeline is another story. The term SOP is very obvious. We have seen "clearly written description of how specific tasks are to be done." Another satisfactory definition would be "detailed written instructions that achieve the uniformity of the performance of a specific function." Is the firm doing what the regulations specify? Is the firm doing what their procedures specify? If you are medical device or a pharmaceutical manufacturer, these definitions come as no surprise because when it comes to FDA regulations and guidance documents "establish" means to define, to document (in writing or electronically) and to implement. The goal and emphasis with FDA is simple. Proof of "Establish" is the foundation. Is the firm doing what the regulations specify? Is the firm doing what their procedures specify? Are the procedures being followed and enforced by company personnel? SOPs are needed in regulated industries to give step-by-step instructions for performing a particular job or task. This session will provide a step-by-step overview and a snapshot of the procedure description, the process and format. The subject matter of a SOP may range from how to operate a piece of machinery to how to log into a particular software program. SOPs ensure consistency and reliability because they require training of all affected parties. This session will address recent enforcement actions for SOP related violations but no surprise. Most of our enforcement actions are documentation related, i.e., SOP or other procedural documents. We will review examples from
Roger Steven

Get Ready For Your HIPAA Compliance Audit - 0 views

  •  
    Overview: The webinar will concentrate on topics that HHS has announced will be the focus of the first round of "desk audits". They reflect significant areas of non-compliance revealed in the 2012 pilot audits and HHS HIPAA violation investigations concluded by Resolution Agreements and Corrective Action Plans. They include: HIPAA Risk Analysis Risk Management based on Risk Analysis Breach Notification Notice of Privacy Practices (for Covered Entities) Minimum Necessary Standard Access of Individuals to their PHI Authorizations Workforce Training This webinar is vital because, in focusing on preparation for a HIPAA Compliance Audit, Covered Entities and Business Associates may review, prioritize and structure their HIPAA Compliance programs. If you have HIPAA Compliance documentation ready to submit on two weeks notice to HHS you are implementing an effective HIPAA Compliance program. In addition, every Covered Entity or Business Associate may face an HHS HIPAA Compliance investigation at any time due to a complaint or a Breach. If you are "audit ready" you will be ready for an investigation - and better able to avoid complaints and prevent breaches. Why should you attend: Every Covered Entity and Business Associate is liable - without prior notice - to be audited for HIPAA Compliance by HHS You will have only 2 weeks after receiving your HIPAA Compliance Audit notification and data request to upload all requested documents to an HHS HIPAA Compliance Audit Portal The HIPAA Compliance Audit data request you receive will specify content and file organization, file names and any other document submission requirements Auditors will not contact an audited entity for clarifications or ask for additional information - it is essential that submitted documents are current, accurately reflect the entity's HIPAA Compliance program and demonstrate HIPAA Compliance Only data submitted on time will be assessed Failure to respond on time may be referred to the HHS regional
kaysonmedical

Neet Preparation 2021 - Kaysons Medical - 0 views

  •  
    Kaysons medical are doing continuous Innovations to help you succeed in NEET. Please have a look at some of our unique features. The Living World Analysis and Important Questions for Neet Preparation 2021.
Roger Steven

Seminar on Validation and 21 CFR 11 Compliance of Computer Systems Intermediate to Adva... - 0 views

  •  
    Course "Validation and 21 CFR 11 Compliance of Computer Systems: Intermediate to Advanced" has been pre-approved by RAPS as eligible for up to 12 credits towards a participant's RAC recertification upon full completion. Overview: Computer Systems Validation (CSV) also known as Software Validation is all-pervasive in the Life Sciences Industry. It is a requirement of all the predicate rules, as well as 21 CFR 11 and Annex 11. However, unless one knows how to implement CSV, it is often very hard to detect the requirement for CSV, and very hard to determine what needs to be done, to meet domestic and / or international regulations or business continuity requirements. In addition, the FDA has stepped up 21 CFR 11 inspections that include CSV. This course will build on the Validation and 21 CFR 11 Compliance Basic Course, to give hands on experience on executing on the computer systems validation of a system, and to discuss related activities such as Validation Master Plan, Infrastructure Qualification, Project Management for Validation and Validation of Test Tools The attendees must have attended the Basic Validation & 21 CFR 11 Compliance. This is a very hands-on class and the attendees will be expected to use templates provided in the class to create the complete package for the validation of a system The Seminar: This Hands-On course will provide the attendees with more detailed experience on validation / 21 CFR 11 compliance of a computer system, as well as details for activities associated with computer systems validation as follows: 1. Validation Master Plan 2. Complete Validation for a System 3. Excel Spreadsheet Validation 4. Change Control 5. SOPs 6. Test Tools Validation 7. Project Management for Validation Who Should Attend : * VP of IT * Director of IT * Quality Managers * Project Managers (for CSV / IT) * Validation Specialists * Database Administrators * System Administrators * Directors / Senior Directors of Discovery * Directors /
Roger Steven

OSHA's Standards on Fire Protection in the Workplace - 0 views

  •  
    OSHA's Standards on Fire Protection in the Workplace : When it comes to Fire Protection in the Workplace; there are several guidelines to be followed. One could go by common sense, but it is not usually sufficient, which is why OSHA has standards relating to Fire Protection in the Workplace. Like it does for all its safety requirements; OSHA requires the employer to take obligatory steps for the protection of employees from fire. These are covered in Title 29 of the Code of Federal Regulations Part 1910 Subparts E and L; and Part 1926 Subparts C and F. Employer obligations are the core of Fire Protection in the Workplace Requiring employers to carry out roles during a fire emergency and training employees towards the same are the foundation of OSHA standards on Fire Protection in the Workplace. Training employees on OSHA's standards on Fire Protection in the Workplace entails training them on all the core areas of handling a fire: The ways of using fire exits The ways of using fire extinguishing equipment The ways by which to organize an emergency exit plan The ways of using fire exits: Fire Protection in the Workplace on fire exits involves having to put in place a well-designed exit route for employees, so that they escape during a fire easily. These should be done keeping in mind the structure of the building. Keeping the exit route free of obstacles is another important requirement of OSHA's standards on Fire Protection in the Workplace. The ways of using fire extinguishing equipment: Having portable fire extinguishing equipment is not mandatory for OSHA, but employees must be properly trained on their use, should an employer have one. These equipment have to be placed at a convenient location for everyone to access easily. The ways by which to organize an emergency exit plan: An emergency exit plan is required as part of Fire Protection in the Workplace for some kinds of employers. It is for those whose activity involves the heavy use of hazardous chemica
Roger Steven

The Clinical Laboratory Improvement Amendments of 1988 - 0 views

  •  
    The Clinical Laboratory Improvement Amendments of 1988 All clinical laboratory testing done on humans in the US, save those done for basic research and clinical trials, have to comply with the provisions of the Clinical Laboratory Improvement Amendments (CLIA). Clinical Laboratory Improvement Amendments, a set of federal amendments carried out in 1988 set out federal standards for carrying out clinical laboratory testing. A clinical laboratory is, according to the CLIA, a facility in which laboratory testing is done on samples procured from humans. This testing is done with the aim of obtaining information with the intention of evaluating health, using which clinicians diagnose, prevent, or treat disease. Having defined a clinical laboratory thus, the Clinical Laboratory Improvement Amendments set out the regulatory guidelines on which clinical trials are to be administered. The fundamental aim of the Clinical Laboratory Improvement Amendments is to ensure accuracy, efficacy, safety, reliability and efficiency of clinical trials. The Clinical Laboratory Improvement Amendments seek to do this by setting aside grades for a range of criteria that relate to these aspects of the clinical trial. These grades are given from a score of 1, meaning the lowest, to 3, the highest, to assess as many as seven criteria of a particular clinical trial. These seven criteria are: Knowledge Materials used in proficiency, quality control, and calibration of materials Features of operational steps Experience and training Troubleshooting of test system troubleshooting and maintenance of equipment Preparation of reagents and other materials Interpreting and judging the results of the tests Points to be borne in mind for enforcing provisions of the Clinical Laboratory Improvement Amendments Provisions set out in the Clinical Laboratory Improvement Amendments are to be enforced through a set of parameters. These include: Procedure manual A basic part of the Clinical Lab
Roger Steven

HIPAA and the Emergency Room - 0 views

  •  
    Overview: I will be talking to specifics of HIPAA and the emergency room setting, do's and don'ts as well as dispelling myth vs reality. This lesson will be addressing how compliance officers need to get their HIPAA house in order as HIPAA is now fully enforced and the government is not using kid gloves any more. It will also address major changes under the Omnibus Rule and any other applicable updates for 2016 and beyond. There are an enormous amount of issues and risks for hospitals these days especially with the new legislation involving patient cash remedies for wrongful disclosure. I will speak on specific experiences from over 17 years of experience in working as an outsourced compliance auditor, expert witness on HIPAA cases within the ER, and thoroughly explain how patients are now able to get cash remedies for wrongful disclosures of private health information. More importantly I will show you how to limit those risks by simply taking proactive steps and utilizing best practices. Why should you Attend: What can and can't we do in the hectic emergency room with patient information? What are the new liabilities involved? How can we ensure security but also ensure patient care? This once rarely enforced law has changed and you need to know what's going on! What factors might spurn a HIPAA audit? …are you doing these things? Why are the Feds enforcing after all these years? State laws are now also more strict increasing liability for patient remedies! We will be discussing some of the changes taking place in Washington with the Health and Human Services in regards to the enforcement of the HIPAA laws already on the books. I will go over some of the new changes specifically affecting the emergency room setting I will also be discussing factors might cause an unwanted visit or letter from the Office of Civil Rights and how to prepare for a potential audit Areas Covered in the Session: Updates for Omnibus Emergency Room Do's and Don'ts in the ER Ambulato
Roger Steven

The Roles And Responsibilities of a HIPAA Privacy & Security Officer - 0 views

  •  
    Overview: Discussions, presentation, and webinars regarding HIPAA regulations are usually addressed from the perspective of what the regulations entail, the necessity of compliance with the regulations, and the consequences of willful neglect or non-compliance. This presentation addresses HIPAA regulations from a different perspective - from a personal perspective - from the perspective of the person in charge of moving an organization or facility toward full compliance with HIPAA. The by-product of this presentation will be both an understanding of, and a detailed job description for, a position mandated in the regulations - the HIPAA Security/Privacy Officer. Why should you attend: The HIPAA regulations are numerous, complicated, often vague, and affect every person working in a healthcare facility. Compliance with HIPAA will require a unique individual to lead the charge - an individual whose education, background, experience, and demonstrated skill sets offer the opportunity for that person to succeed in achieving the goals of that position. This is a new position to most healthcare facilities. So understanding who this person should be, what is required of the person with this job title, and with whom this person will interface is vital to every healthcare organization with the goal of achieving full compliance with HIPAA. Areas Covered in the Session: Position goals Position requirements (education, experience, skill sets, etc.) Position responsibilities Stay abreast of regulations Initiate compliance with HIPAA (according to regulations) Ensure continuous progress toward full compliance Develop appropriate security/privacy policies & procedures Oversee and deliver appropriate training programs to all employees Track compliance with HIPAA regulations at the facility & individual levels Track access to PHI Investigate and resolve HIPAA violations Apply sanctions to HIPAA violators Manage any information security personnel Prepare a department
Roger Steven

Food Safety and Security are two faces of the coin - 0 views

  •  
    Food Safety and Security are two faces of the coin : Food safety and security are two different, but closely related concepts. Although part of the same aspect, they vary in their application and meaning. Both are equally important in ensuring that populations of the world get food that is sufficient and nutritious. Food safety and security are complete without each other. Food safety complements food security, and vice versa. Food safety : Food safety is essentially about the safety of the ingredients that go into food. If food is being sourced from a farm, the food makers have to ensure that the farm has ensured safety standards in producing this food. Food safety is concerned about the amount of chemicals and fertilizers used in production of food. It is also concerned with how much residual pesticide, which could cause harm to humans when the food that is grown using it, is left in the final product, and so on. Food safety is related to and is dependent on factors such as demographics, inputs that go into the cultivation and production of food, availability of water for production of safe food, the use of energy sources in the safe production of food, climate change, etc. Now, food security : Food security, on the other hand, is about more about the food supply chain. When food arrives from the producer to the consumer, it goes through a complex chain that can many times span entire continents. Food may also be sourced and consumed locally. In either case, there is a need to ensure that the points that food travels in and reaches are secure. Ensuring quality throughout : The aim of food security is to ensure that food which travels through many chains and stages should be clean at all these stages. This means that security has to be ensured from rodents and other forms of disturbances at the agricultural fields in which food is produced, then at the granaries in which it is stored, at the routes that it travels, then at the location at which food is pr
Roger Steven

Office of Civil Rights "OCR" is sending Audit Screening Questionnaires to Covered Entit... - 0 views

  •  
    Overview: Participants will understand the importance of responding to the OCR pre-audit requests and how to respond. Our discussion will cover how to prepare for an anticipated OCR HIPAA privacy audit, by discussing how to conduct an internal self-assessment of your privacy program. We will discuss how to conduct the self-assessment, whether it be the need for policies, procedures or obtaining all of your business associates information. Why should you Attend: If you have received a request from the OCR to provide the name of your entities privacy official and additional criteria, you are already aware that you are on the OCR's radar and may be the focus of an audit. If you haven't received a request yet, anticipate receiving one soon. In addition to ensuring that your HIPAA program is audit ready, you also need to ensure that you know all of your business associates and have their information readily available to provide to the OCR. Your entity needs to be ready now, as the OCR will either conduct focused desk audits, on-site audits or both in effort to review documentation of evidence of your compliance with the HIPAA regulation. Areas Covered in the Session: Office of Civil Rights "OCR" requests for privacy official and additional information and timeline for response Internal assessment criteria of privacy program in anticipation of an OCR audit Conducting the assessment using the template based upon HIPAA regulations Discuss methods to address any found deficiencies Workforce training Who Will Benefit: Healthcare providers Compliance and Internal Audit professionals or office staff responsible for ensuring patient privacy Healthcare Administrators Business Associates and all HIPAA Covered Entities Speaker Profile Gail Madison Brown is a registered nurse and an attorney with over 25 years of experience in health care. For the last 15 years she has focused on health care compliance and revenue cycle management operations. Gail's experience ranges
Roger Steven

HIPAA 2016 -Texting and Emailing - 0 views

  •  
    Overview: This lesson will be going into great detail regarding your practice or business information technology and how it relates to the HIPAA Security Rule, in particular portable devices. Areas covered will be texting, email, encryption, medical messaging, voice data and risk factors as they relate to IT. I will uncover myths versus reality as it relates to this very enigmatic law based on over 600 risk assessments performed as well as years of experience in dealing directly with the Office of Civil Rights HIPAA auditors. I will also speak to real life audits conducted by the Federal government (I've been on both sides of these audits) what your highest risks are for being fined (some of the risk factors may surprise you). In addition this course will cover the highest risk factors for being sued for wrongful disclosures of PHI and the manner in which patients are now using state laws to sue for wrongful disclosures. Don't always believe what you read online about HIPAA, especially as it relates to encryption and IT, there are a lot of groups selling more than is necessarily required. Why should you Attend: HIPAA NOW HAS TEETH! Be prepared for what's new in 2016! Protect your practice or business! What factors might spurn a HIPAA audit? …are you doing these things? Why are the Feds enforcing after all these years? It is important to understand the new changes going on at Health and Human Services as it relates to enforcement of HIPAA for both covered entities and business associates as it relates to portable devices, texting, and emailing of PHI. You need to know how to avoid being low hanging in terms of audit risk as well as being sued by individuals who have had their PHI wrongfully discloses due to bad IT practices. I have also been expert witness on multiple court cases where a business or medical practice is being sued for not doing their due diligence to minimize risk. Areas Covered in the Session: Updates for 2016 BYOD Portable devices B
1 - 20 of 55 Next › Last »
Showing 20 items per page