Read Frequently Asked Questions
HIPAA Risk Analysis: The HIPAA Standard, HIPAA Security rule
This HIPAA risk analysis webinar will help you to understand the components needed to conduct a comprehensive security, risk analysis for your organization, in order to comply with the HIPAA standards and the far reaching affects of the HITECH Act. You will learn how to identify sources of PHI and ePHI in your organization, external sources and the threats to information system that contain PHI and ePHI.
Why Should You Attend:
This webinar will help you analyze and understand the two very specific HIPAA-security compliance assessments. You will be able to develop organizational compliance plans that address both privacy and security within your organization, specifically addressing your ability to secure patient information within your company, in both physical and electronic forums.
When assessing the risks and vulnerabilities associated with PHI and ePHI, there are three key questions health care organizations should ask, before performing a risk analysis.
- Can you identify the sources of PHI and ePHI within your organization, including all PHI that you create, receive, maintain or transmit?
- What are the external sources of PHI/ePHI?
- What are the human, natural, and environmental threats to information systems that contain PHI and ePHI?
This webinar will not only address answering the above referenced questions, but moreover, this discussion will allow you to put these questions/answers in perspective to address your internal and external security needs and devise the most comprehensive plan for your organization's demands.
Areas Covered in the Webinar:
This discussion will provide valuable insight and application to a practical and systematic process to initiate and evaluate your organization’s security practices. Within the hour, we will define how to apply a specific methodology, during a risk assessment and to establish a comprehensive analysis:
- System Characterization;
- Threat Identification;
- Vulnerability Identification;
- Control Analysis;
- Likelihood Determination;
- Impact Analysis;
- Risk Determination;
- Control Recommendations; and
- Results Documentation.
Understanding these categories will help you look at the depth of your criticalities and define each vulnerability in terms that will afford your company with an action plan to cure the problem and put in place procedures to lessen and/or alleviate the risk.
Who will Benefit:
This webinar will be most beneficial to those person’s directly, impactfully involved with the security and protection of patient health records: Any personnel that has the responsibility of protecting and securing patient information, whether electronically and/or physically, will benefit from attending this webinar.
- HIPAA Privacy Professionals
- Risk Management Professions
- Compliance Officers/Professionals
- Clinical Trial Professionals
- Physicians and Nurses
- Hospital Admin and Documentation
Coy Murchison, is a Compliance professional with over 10 years of progressive compliance experience. She has experience in health care compliance, as well as, title/escrow and non-profit industries. Coy Murchison is well versed in technology security as it relates to HIPAA. She serves as a consultant for Agilishare, a SharePoint Architectural Company. She was selected to receive a grant from the U.S. Department of Health and Human Services to study Health Information/Informatics Technology. She has helped organization build compliance frameworks for the HITECH Act and she lectures on the expectations of the HIE and how it relates to the future of information security and compliance. Coy is a graduate of Paul Quinn College in Secondary Education and Seton-Hall University Law School’s Compliance Certification Program.
Attempts to ensure technological safeguards can become daunting and overwhelming. The Security Management Process of the Security Rule indicates risk analysis is a necessary tool in reaching substantial compliance with many standards and implementation specifications. The Security Rule further enhances HIPAA’s arm length and force of strength, requiring organizations implement security safeguards electronic and physical to alleviate, lessen and decrease breaches, gaps and deficiencies in organizational and IT failures. The Office of Civil Rights (OCR- sponsored by the US Department of Human Health Services) has indicated it will continue HIPAA audits through 2013-2014. It is presumed that the OCR will lists its best practices, and any future audits will be to initiate the civil/monetary penalties allowable by the HITECH Act. In an effort to prepare a comprehensive security action plan, a risk assessment is critical to your organization’s success.
ComplianceOnline would process/provide refund only if the Live Webinar has been cancelled. The attendee could choose between the recorded version of the webinar or refund for any cancelled webinar. Refunds will not be given to participants who do not show up for the webinar. On-Demand Recordings can be requested in exchange. Webinar may be cancelled due to lack of enrolment or unavoidable factors. Registrants will be notified 24hours in advance if a cancellation occurs."
For substitution, please email email@example.com or call +1-650-620-3937.
This training hasn't been reviewed yet.
HIPAA Privacy In 2013 and Beyond: An Outlook On Data Encryption, Securing Patient Information and the Health Information Network Your HIPAA Compliance Plan and Cloud Storage Security: Is Your BAA Enough? Social Media and HIPAA Compliance: How to Leverage the Benefits of Social Media and Maintain HIPAA Compliance