How to Perform a HIPAA Risk Assessment

Instructor: James B Wener
Product ID: 704058
  • Duration: 60 Min

recorded version

1x Person - Unlimited viewing for 6 Months
(For multiple locations contact Customer Care)
Recorded Link and Ref. material will be available in My CO Section

Training CD

One CD is for usage in one location only.
(For multiple locations contact Customer Care)
CD and Ref. material will be shipped within 15 business days

Customer Care

Fax: +1-650-963-2556


Read Frequently Asked Questions

This risk assessment training will discuss why it is essential to perform a risk assessment and what kind of breaches can occur. It will also list what HIPAA regulations require and what it should tell you.

Why Should You Attend:

In addition to the negative publicity and potential fines, breach of a patient’s health information often leads to litigation which is also time consuming and costly. The way to avoid these situations is to perform a risk assessment to understand where the health care organization is at risk of an unauthorized breach and provide a basis for becoming HIPAA compliant.

This webinar will discuss two reasons why a risk assessment is necessary:

  • First, both the HIPAA Privacy and Security Regulations require a risk assessment for the organization to be HIPAA compliant.
  • Second, as a result of the risk assessment the organization knows where it needs to address its efforts to minimize its risk.

The course will also discuss how best to do a risk assessment, when to look for outside assistance, and how to link your assessment to your training responsibilities.

Learning Objectives:

  • Why the risk assessment is important to the health care organization and business associates
  • What is important to consider in doing a risk assessment
  • How to do a risk assessment
  • When to look for outside assistance
  • How to link your assessment to your training responsibilities
  • How to interpret the results of the risk assessment
  • What to do with the results of your assessment

Areas Covered in the Webinar:

  • Why perform a risk assessment and what kind of breaches occur
  • What do the HIPAA regulations require
  • What is a risk assessment and what should it tell you
  • Why risk assessments are more than just a system password
  • How to perform a risk assessment
  • What can you do yourself and what should professionals do
  • What to do after you have performed the risk assessment

Who Will Benefit:

  • Health Care Organization Ownership
  • Office Management
  • Dentists
  • Physicians
  • Clinics and Hospitals
  • Business Associates
  • Health Care IT Professionals

Instructor Profile:

Jim Wener has over 40 years of experience in assisting health care organizations – both providers and payers - identify their automation requirements and helping these organizations select and successfully implement the automation most applicable for their needs. Since 1996, he has been an active lecturer, trainer and HIPAA assessment consultant assisting a variety of health care providers (hospitals, payers, clinics and individual physician practitioners) become HIPAA compliant. He developed the IBM HIPAA assessment and training products for their consulting practice. Mr. Wener is a certified HIPAA consultant and has authored articles regarding various topics on the subject. His HIPAA consulting practice offers comprehensive HIPAA privacy and security consulting tools, practice walkthrough assessment tools, a full set of HIPAA privacy and security policy and procedures templates, training presentations and a breach mitigation tool – all geared and used by small and large health care organizations.

Follow us :
ComplianceOnline Banking Summit 2016 | Risk Management and Data Security - 80390SEM
21 CFR Part 11 Compliance for SaaS/Cloud Applications - 80202SEM

Product Reviews

This product hasn't received any reviews yet. Be the first to review this product! Write review

Best Sellers
You Recently Viewed