HIPAA Risk Assessment Checklist | HIPAA Compliance Training

Overview:

This two day seminar takes the participants through HIPAA compliance from start to compliance.
The first presentation explains the history of HIPAA, why it came to being and its evolution. This covers what HIPAA is, what steps have to be performed to be HIPAA compliant and what HIPAA compliance is. It also provides definitions to key HIPAA terms, how to define a Business Associate and how to contract with Business Associates. The second part of the first presentation is an overview of how to manage the HIPAA compliance project. At the end of these presentations there will be a workshop to demonstrate how to use these tools.
The second session describes what a Risk Assessment is and how to perform the risk assessment. The materials take the participant through the factors of HIPAA compliance and how to perform a HIPAA Risk Assessment. This encompasses taking the participants through how to do a HIPAA Privacy Risk Assessment, how to do a HIPAA Security Assessment and how to interpret the results, set priorities and develop a plan for addressing the Risk Assessment findings. The end of this session will encompass a short workshop demonstrating how to use the Risk Assessment tools discussed in the presentation
The third session takes the participants through how to prepare a set of HIPAA Policies and Procedures. This includes how to reference the HIPAA regulations in preparing the policies and procedures, how to reference the prior HIPAA Risk Assessments and how to prepare the HIPAA training materials. At the end of the session, there will be participant workshop on how to prepare a HIPAA policy and procedure.
The day's last session shows the participants how to develop and give a HIPAA training session. The materials present the basics of what needs to be included in the training program, who has to be trained and how to conduct the training.
The first session of the second day provides the participants with an orientation of the role the IT services in the healthcare organization in addressing the organization's HIPAA compliance. This encompasses understanding what role IT hardware and software plays in the HIPAA compliance process, what responsibilities IT vendors should have and how to work with vendors. The materials will discuss IT security in the context of an overall organization security program including the value and approach of an IT security vulnerability test. At the end of this session will be a discussion of issues facing the participants and how they can use the information in this session in their own organizations.
The second session of the second focuses on an area often missed in performing HIPAA assessments: the business continuation and disaster recovery planning. This session takes the participants through the process of considering what can/may happen that could put the healthcare organization out of business and how to develop methods for mitigating those risks. At the end of this session will be a sample assessment discussion and workshop.
In the third session, participants will review what a HIPAA breach is and what to do when a HIPAA breach occurs. This includes determining if a notification occurred, notification requirements and mitigation options. At the end of this session will be a round table discussion of the issues related to breaches as they affect the participants.
The last session will be a wrap up and discussion session providing an opportunity for the participants to discuss specific issues they may have or get direction regarding particular approaches for HIPAA compliance.

Why should you attend:


Although healthcare news and the internet is replete with articles and descriptions of the HIPAA privacy and security regulations, there remain many misconceptions of what these regulations mean to healthcare organizations and what they, and their business associates, need to do to become compliant. Healthcare organizations know they have to secure patient health care information. However, a number of questions need to be answered to meet that goal.
What does this mean? Do the HIPAA regulations apply to the organization? What are the organization's risks and how does the organization mitigate these risks? What does the organization have to do and how does the organization do it? What role does the organization's computer resources have in the risks? How safe is my computer and paper patient information? How does the organization know if its computer resources provide the needed features and functions for the organization to become compliant? What resources are needed and what do these resources need to do? What is a Risk Assessment and why does the organization need one? Does the organization need an attorney or a consultant? How does the organization know if it is compliant? What is a breach and how does the health care organization know if a breach occurred? What happens if there is a breach? What effect do the use of social media (Facebook, Twi

Need more targetted audience? 90% OFF.

PROMOTE NOW
Quick Links
Resources
The Conference Alerts

If you have any suggestion / complain to improve this community, please write us - [email protected]