Data breaches in healthcare settings are a very real and very prevalent problem. But did you know that more than half involve insiders? And that the most affected assets are not medical devices but databases and paper documents? Protect your patients’ PHI by training your employees to thwart specific, actual threats—the very ones that caught so many healthcare organizations off guard in 2018.
Join healthcare security consultant Pam Joslin to learn to audit and monitor your security protocols with a keen eye turned to the vulnerabilities facilities like yours face. Joslin will walk you through your Department of Health and Human Services (HHS) regulatory compliance obligations regarding protected health information—including HIPAA’s privacy rules and the law’s definition of a “breach.” She will give you a tour of the HHS Office for Civil Rights (OCR) website and breach portal—and discuss the components of the agency’s corrective action plan for breach violations.
Don’t get caught in the feds’ crosshairs—or risk your patients’ trust. In this webinar, you’ll learn how to: protect PHI on laptops and social media platforms, use the HIPAA checklist to identify your high-risk areas, and create a “culture of compliance” in your office.
- The top 10 healthcare data breaches of 2018—and what they mean for your facility
- HIPAA’s basic privacy rules for protecting PHI
- What constitutes a HIPAA “breach” and how to report one
- What constitutes a HIPAA “covered entity” and a “business associate relationship”
- Basic security measures your facility may be missing
- Recommendations to improve common threat actions
- Valuable employee training tools to create a culture of data security compliance
- 7 Steps to Real-World Data Security Compliance for 2019
- Medical Practice Managers
- Medical Practice Administrators
- Clinical and Practice Staff
- Compliance Officers
- Billers and Coders