We use cookies to personalise content and ads, to provide social media features and to analyse our traffic. Read more about our Privacy Policy.

I got it!

Online Webinar
28 Oct 2015
Health

Webinar on HIPAA Breach Notification Rule - What You Must Do To Comply

Final regulations for the new HIPAA Breach Notification Rule require much more than notifying individuals affected by a Breach of their Protected Health Information (PHI)

Overview: Final regulations for the new HIPAA Breach Notification Rule require much more than notifying individuals affected by a Breach of their Protected Health Information (PHI). Covered Entities and Business Associates first must follow and document a very specific process to determine if a Breach occurred. If no Breach occurred documentary proof must be kept for six years. If a Breach did occur timely notifications and other actions must be undertaken and documented.This webinar will explain:What Covered Entities and Business Associates must do to comply with the Breach Notification RuleWhat is and is not a BreachThree exceptions - when an acquisition, access, use, or disclosure of PHI not permitted by the Privacy Rule is not a BreachHow to perform a Breach Risk Assessment to determine if you can demonstrate a a low probability that the PHI was compromisedWho must be notified in case of a BreachWhen notifications must be providedWhat information must be contained in each notificationOther requirements in case of a BreachInvestigateMitigate harm to affected individualsProtect against further BreachesDocument everythingPlanning and preparation for the worst - public relations and mitigation strategies to limit damage to the organization's reputation and financial well-beingWhy should you attend:Breaches and incidents that might be Breaches happen all the time!More than 173,000 separate breaches of Protected Health Information (PHI) affecting less than 500 individuals were reported to the U. S. Department of Health and Human Services (HHS) between September, 2009 and May 31, 2015 and in the same period HHS received approximately 1240 reports of PHI breaches that affected 500 or more individualsAn acquisition, access, use, or disclosure of PHI not permitted by the Privacy Rule is presumed to be a Breach unless it falls within an exception or the Covered Entity or Business Associate can demonstrate a low probability that the PHI was compromisedNot all suspected Breaches are Breaches - but you must know the rules to assess each incident and - when appropriate - prove it was not a BreachA Covered Entity or Business Associate has the burden to prove an acquisition, access, use, or disclosure of PHI was not a Breach or, if a Breach occurred, that it made all required notificationsProminent media outlets in the region must be notified of Breaches affecting 500 or more individualsTo preserve your organization's reputation and limit its financial loss you must be prepared to assess a suspected Breach and to respond properly and perhaps publicly when a Breach does occurPhishers, Hackers and Burglars are actively trying to get PHI - the FBI reported in 2014 that medical identity sells for $50 on the black market compared to $1 for a credit card or Social Security Number

When

28 Oct 2015 @ 10:00 am

28 Oct 2015 @ 11:00 am

Duration: 1 hours

Timezone: GMT -8:00


Where

Online Webinar


Language

English en


Organised by

NetZealous (deactivated)

Featured Events