HIPAA Gap Analysis, Risk Assessment and Risk Analysis - Finding and Managing Risks to Protected Health Information

Speaker

Instructor: Jim Sheldon-Dean
Product ID: 703180

Location
  • Duration: 90 Min
This training on HIPAA compliance will teach the attendees how to examine their security policies, practices, and risk issues to find and fill any gaps in the documentation that is required by the HIPAA rules to show compliance, survive audits, and avoid enforcement action.
RECORDED TRAINING
Last Recorded Date: Dec-2018

 

$199.00
1 Person Unlimited viewing for 6 month info Recorded Link and Ref. material will be available in My CO Section
(For multiple locations contact Customer Care)

$399.00
Downloadable file is for usage in one location only. info Downloadable link along with the materials will be emailed within 2 business days
(For multiple locations contact Customer Care)

 

 

Customer Care

Fax: +1-650-362-2367

Email: [email protected]

Read Frequently Asked Questions

 

Why Should You Attend:

The Health Insurance Portability and Accountability Act (HIPAA) Privacy, Security and Breach Notification Rules require covered entities and their business associates to safeguard electronic protected health information (ePHI) through reasonable and appropriate security measures. One of these measures required by the Security Rule, is a risk analysis, which directs covered entities and business associates to conduct a thorough and accurate assessment the risks and vulnerabilities to ePHI (See 45 CFR § 164.308(a)(1)(ii)(A)). Conducting a risk analysis is the first step in identifying and implementing safeguards that ensure the confidentiality, integrity, and availability of ePHI. A Gap Analysis, to review conformance with the requirements of the HIPAA Rules, is a useful tool to identify whether certain standards and implementation specifications of the Security Rule have been met, and a Risk Assessment of each information handling process is essential to identifying and planning the mitigation of risks to the confidentiality, integrity, and availability of ePHI.

Organizations that have not performed the complete process of Risk Analysis, including Gap Analysis and Risk Assessments, are more likely to suffer incidents and breaches of ePHI, including those caused by inappropriate un-reviewed or uncontrolled internal access, and those caused by external factors, such as Ransomware incidents that can bring an organization to its knees. Even relatively simple processes, like ensuring that all portable devices holding ePHI are properly secured, if undiscovered, can lead to significant breaches and resulting penalties. These kinds of incidents have resulted in the need for notifications to patients and penalties in the millions of dollars for the affected organizations, and could likely have been prevented by performing and following through on a thorough Gap Analysis, Risk Assessment, and Risk Analysis process.

The costs of compliance through Gap Analysis, Risk Assessment, and Risk Analysis are far lower than the costs of not doing what’s required, and suffering the significant expense and consequences of incidents, breaches, and enforcement actions.

Areas Covered in the Webinar:

  • Requirements for risk management in the HIPAA Security Rule will be explained.
  • The results of not managing risks, such as incidents, breaches, and enforcement actions, will be examined.
  • How to use risk management methods, such as Gap Analysis, Risk Assessment, and Risk Analysis, to find issues and mitigate them before they cause an incident.
  • Learn what is a HIPAA Gap Analysis, how it is performed, and what it tells you.
  • Using a process of exploration and discovery to find potential risk issues in information systems and how they are used.
  • Understanding the organization-wide risk picture and balancing risk mitigation needs with resource availability.
  • Planning the management of risks over time and maintaining the information security management process.

Who Will Benefit:

This webinar will provide valuable assistance to all personnel in: Medical offices, practice groups, hospitals, academic medical centers, insurers, business associates (shredding, data storage, systems vendors, billing services, etc). the titles are

  • Compliance director
  • CEO
  • CFO
  • Privacy Officer
  • Security Officer
  • Information Systems Manager
  • HIPAA Officer
  • Chief Information Officer
  • Health Information Manager
  • Healthcare Counsel/lawyer
  • Office Manager
  • Contracts Manager
Instructor Profile:
Jim Sheldon-Dean

Jim Sheldon-Dean
Principal and Director of Compliance Services, Lewis Creek Systems, LLC

Jim Sheldon-Dean is the founder and director of compliance services at Lewis Creek Systems, LLC, a Vermont-based consulting firm founded in 1982, providing information privacy and security regulatory compliance services to a wide variety of health care entities. He is a frequent speaker regarding HIPAA, including speaking engagements at numerous regional and national healthcare association conferences and conventions and the annual NIST/OCR HIPAA Security Conference. Sheldon-Dean has more than 19 years of experience specializing in HIPAA compliance, more than 37 years of experience in policy analysis and implementation, business process analysis, information systems and software development, and eight years of experience doing hands-on medical work as a Vermont certified volunteer emergency medical technician. Sheldon-Dean received his B.S. degree, summa cum laude, from the University of Vermont and his master’s degree from the Massachusetts Institute of Technology.

Topic Background:

The prevention of health information privacy and security incidents and breaches depends on taking the proper steps to find issues and deal with them before they cause trouble. There is a need to make sure your policies and procedures are in place (using a HIPAA Gap Analysis), examine the systems and information flows that may be at risk (using HIPAA Risk Assessment), and plan out your overall organization-wide risk management activity (using HIPAA Risk Analysis).

The three terms, HIPAA Gap Analysis, HIPAA Risk Assessment, and HIPAA Risk Analysis often are used interchangeably, but the terms are anything but interchangeable, and all three must be part of an overall HIPAA privacy and security compliance and breach prevention program. This session will explain the differences between the terms and show how to use the analyses and assessments to find potential privacy, security, and breach issues and plan their remediation and mitigation.

A HIPAA Gap Analysis is typically an examination of an organization’s enterprise to assess whether certain controls or safeguards required by the Security Rule are implemented. It entails reviewing all of the requirements in the regulations and determining if the related safeguards are in place and properly implemented in policy and procedure.

A HIPAA Risk Assessment is an examination of each of the information systems involved with Protected Health Information, and their various information flows and connections, to discover potential risk issues and to determine the specific issues that should be addressed in safeguards in order to reduce risks to the confidentiality, integrity, or availability of PHI.

A HIPAA Risk Analysis is the overall evaluation of the risks on an organizational level, considering all the issues identified in the Gap Analysis and system Risk Assessments, and planning for the mitigation of risks over time to reduce the risks to a reasonable and appropriate level, based on the severity of the risks and the organization’s ability to mitigate them.

Using all three of these processes, Gap Analysis, Risk Assessment, and Risk Analysis, together is the key to putting the right information security program in place and protecting the organization from potentially catastrophic events.

Follow us :

 

 

Refund Policy

Our refund policy is governed by individual products and services refund policy mentioned against each of offerings. However in absence of specific refund policy of an offering below refund policy will be effective.
Registrants may cancel up to two working days prior to the course start date and will receive a letter of credit to be used towards a future course up to one year from date of issuance. ComplianceOnline would process/provide refund if the Live Webinar has been cancelled. The attendee could choose between the recorded version of the webinar or refund for any cancelled webinar. Refunds will not be given to participants who do not show up for the webinar. On-Demand Recordings can be requested in exchange. Webinar may be cancelled due to lack of enrolment or unavoidable factors. Registrants will be notified 24hours in advance if a cancellation occurs. Substitutions can happen any time. On-Demand Recording purchases will not be refunded as it is available for immediate streaming. However if you are not able to view the webinar or you have any concern about the content of the webinar please contact us at below email or by call mentioning your feedback for resolution of the matter. We respect feedback/opinions of our customers which enables us to improve our products and services. To contact us please email [email protected] call +1-888-717-2436 (Toll Free).

 

 

+1-888-717-2436

6201 America Center Drive Suite 240, San Jose, CA 95002, USA

Follow Us

facebook twitter linkedin youtube

 

Copyright © 2023 ComplianceOnline.com MetricStream
Our Policies: Terms of use | Privacy

PAYMENT METHOD: 100% Secure Transaction

payment method