ComplianceOnline

How To Conduct a HIPAA Meaningful Use Risk Analysis

Instructor: Robert L Chaput
Product ID: 702003
  • Duration: 52 Min
Purchase option for this webinar is currently unavailable. Please contact our Customer Care for more info.

Customer Care

Fax: +1-650-963-2556

Email: customercare@complianceonline.com

Read Frequently Asked Questions

This HIPAA webinar will help you understand how to complete the Risk Analysis necessary to meet Meaningful Use Stage I objectives around the privacy and security of protected health information (PHI).

Why Should You Attend:

Whether for overall HIPAA-HITECH compliance or for meeting Meaningful Use requirements, completing a formal HIPAA Security Risk Analysis is both a foundational compliance step and a requirement of the law (CFR 164.308(a)(1)(ii)(A))

In this webinar, the speaker will help you understand how to complete the Risk Analysis necessary to meet Meaningful Use Stage I objectives around the privacy and security of protected health information (PHI).

We will discuss specific HIPAA-HITECH regulatory requirements for security risk analysis and risk management. Step-by-Step Instructions for completing a HIPAA Risk Analysis will be outlined along with strategies for developing a risk remediation action plan

Areas Covered in the Webinar:

  • Specific HIPAA-HITECH regulatory requirements for security risk analysis and risk management.
  • A practical methodology and step-by-step instructions for completing a Risk Analysis according to the latest Health and Human Services (HHS) and Office of Civil Rights (OCR) Risk Analysis guidelines.
  • The concepts of risk, threats, vulnerabilities, impact, likelihood and many others are explained in this webinar.
  • A classic categorization of risks into a matrix is explored. This webinar helps you determine your risks, categorize them as Low, Medium, High or Critical and then develop a risk remediation action plan.

Learning Objectives:

  • Risk Analysis essentials
  • Specific requirements outlined in HHS/OCR Final Guidance
  • A Practical Risk Analysis Methodology
  • Step-by-Step Instructions for completing a HIPAA Risk Analysis
  • Tools, templates and forms available to help you

Free Handout:

A White Paper for Healthcare Professionals - "HIPAA Security Risk Analysis and Risk Management Methodology."

Who Will Benefit:

If you receive, store, process or transmit ePHI, you should attend this webinar. Those that would benefit most would be:

  • Business leaders and managers with responsibility for Risk Management
  • Corporate Compliance, and HIPAA-HITECH Privacy and Security compliance personnel CEOs, COOs and CFOs
  • Chief Compliance Officers and Chief Risk Officers
  • Chief Privacy Officers, Chief Security Officers and Chief Information Officers

Instructor Profile:

Mr. Chaput is president of Clearwater Compliance LLC. Clearwater Compliance helps Covered Entities and Business Associates meet stringent HIPAA-HITECH Security Rule requirements and address one of five health outcomes policy priorities in the Meaningful Use Stage 1 guidelines dealing with privacy and security. Over the past 30 years, Bob has worked as an educator, an executive and an entrepreneur. He has assisted businesses and individuals in developing highly secure information technology (IT) strategies that are tightly linked with their business strategies and goals. His workshops, seminars, writings and consultations reflect his knowledge, humor, enthusiasm and vision.

Bob's experience as a CIO and general manager leading global organizations at GE, Johnson & Johnson and Healthways for 30 years equips him to help others make critical decisions about information technology and implement more sound and secure data protection solutions. His 30-year career includes 25 years of responsibility for online data backup and recovery, disaster recovery and business continuity planning, with 20 of those years spanning the highly data-regulated healthcare industry.

He holds undergraduate and graduate degrees in mathematics, numerous technical certifications and is a Certified HIPAA Professional (CHP) and a Certified HIPAA Security Specialist (CHSS).

Topic Background:

The deadline for HIPAA Security Rule compliance for Covered Entities (CEs) was April 2005! For Business Associates (BAs), the date was February 2010… when they become statutorily obligated to comply with the law as a result of Health Information Technology for Economic and Clinical Health (HITECH) Act, which was enacted as part of the American Recovery and Reinvestment Act (ARRA) of 2009.

Additionally, the federal government unveiled its criteria for the Meaningful Use of electronic health records (EHRs) on July 13, 2010. The criteria must be met in order for a hospital or eligible provider (EP) to qualify for reimbursement of the cost of EHR software under the American Recovery and Reinvestment Act of 2009 (ARRA). The meaningful use criteria have been divided into two groups -- the core set, which is mandatory, and the menu set, from which hospitals and EPs may choose five of the 10 criteria. The mandatory core set includes a specific privacy / security requirement to “Protect electronic health information created or maintained by the certified EHR technology through the implementation of appropriate technical capabilities.” For both hospitals and EPs, the certification criteria is to “Conduct or review a security risk analysis and implement security updates as necessary.”

Follow us :
ComplianceOnline Banking Summit 2016 | Risk Management and Data Security - 80390SEM
ComplianceOnline Medical Device Summit 2017

Product Reviews

This product hasn't received any reviews yet. Be the first to review this product! Write review

Best Sellers
You Recently Viewed
    Loading