BEGIN:VCALENDAR
VERSION:2.0
PRODID:icalendar-ruby
CALSCALE:GREGORIAN
BEGIN:VEVENT
DTSTAMP:20240328T192157Z
UID:5105206b-e649-4b7a-9990-49ccd133f212
DTSTART:20210420T090000
DTEND:20210421T090000
CLASS:PRIVATE
DESCRIPTION:
Organizations of all types and sizes continue to struggle ne
edlessly with HIPAA Compliance. For example\, HIPAA Risk Analysis - Risk M
anagement is the basis of the HIPAA Compliance Program of every Covered En
tity and Business Associate. But mandatory HIPAA Compliance Audits conduct
ed by the Office for Civil Rights (OCR)\, the HIPAA enforcement arm of the
U. S. Department of Health and Human Services (HHS)\, found 94% of Covere
d Entities failed the Risk Management Audit and 87% failed the Risk Analys
is Audit. And every audited Covered Entity knew well in advance that it wa
s on the short list to be audited\, had completed pre-audit questionnaires
and knew the exact questions it would be asked and documentation to be pr
ovided (audit protocols).
\n\nThis seminar will demonstrate how Cove
red Entities and Business Associates can comply calmly\, confidently and c
ompletely with the HIPAA Rules.
\n\nThe secret is - HIPAA Rules are
easy and routine to follow - when you know the steps.
\n\nPaul Hales
will capture your attention with visual presentations and interactive lea
rning exercises that take mystery and fear out of HIPAA Compliance.
\n\
n
\nTakeaways:
\nThorough Understanding of HIPAA Rules\n\n\n - What they are
\n - How they work together
\n - Why and
How they were made
\n - How they are changing and what to expect ne
xt
\n
\nHIPAA Risk Analysis - Risk Management for Your Organizatio
n\n\n\n - A Practical Guided Exercise done in class on your computer
to take home
\n
\nPrivacy and Security Rules - Permitted and Requ
ired Uses and Disclosures\n\n\n - What information must be protected
\n - Administrative\, Technical and Physical Safeguards
\n -
Social Media\, Texting and Emailing Patients
\n
\nThe inter-connec
ted\, inter-dependent relationship of Covered Entities and Business Associ
ates\n\n\n - Business Associate HIPAA compliance responsibilities\n
- The importance of Due Diligence and how to do it
\n - How t
o avoid making a Business Associate your Agent by mistake
\n - The c
hain of responsibility from Covered Entity to Business Associate to Subcon
tractor Business Associate\, etc.
\n - Business Associate responsibi
lities for Subcontractor Business Associates
\n - Breach Notificatio
n discovery and reporting by Business Associates and Subcontractor Busines
s Associates
\n
\nWhat is - and what is not a Reportable Breach of
Unsecured PHI\n\n\n - Potential Breach Investigation - Breach Excep
tions
\n - Ransomware
\n - Breach Risk Assessment
\n - B
reach Prevention
\n
\n\n
\nWho will benefit:
\n\n
\n - Health Care Provider - Business Associate
\n - Health Care Pr
ovider Practice Manager
\n - Risk Manager - Compliance Manager
\
n - Information Systems Manager
\n - Compliance Director
\n Practice Manager\n - Privacy Officer
\n - Security Officer<
/li>\n
- CEO
\n - CFO
\n - COO
\n - Chief Information
Officer
\n - Health Information Manager
\n - Healthcare Legal
Counsel
\n - Office Manager
\n - Contracts Manager
\n -
Chief Clinical Officer
\n
\n\nDay 1 Schedule
\n\n
Lec
ture 1:\nWelcome
\n\nDiscussion - Goals and Obje
ctives of Seminar Participants
\n\nHIPAA Compliance Overview and dis
cussion tailored to specific interests of Seminar Participants
\n\n
Lecture 2:\nFocus on HIPAA Compliance
\n\nDesc
ription of HIPAA Rules and Fundamental in Plain Language continuing and bu
ilding on discussion in Lecture 1
\nHIPAA Risk Analysis - Risk
Management\n\nThe basis of your HIPAA Compliance Program expla
ined step-by-step
\n\n\n - Learn by Doing \;Begin guid
ed Step-by-Step HIPAA Risk Analysis - Risk Management of your organization
on your tablet/laptop - for you to take with you
\n
\n\n
Lec
ture 3:\nHIPAA Risk Analysis - Risk Management
\nCo
ntinued\n\n\n - Consider lessons learned
\n - Inter-relationsh
ip of Privacy\, Security and Breach Notification Rules
\n
\n\n
Lecture 4:\nPrivacy Rule in Depth
\n\n\n -
Protected Health Information (PHI)
\n - Permitted Uses and Disclosur
es of PHI
\n - Individual Rights
\n - Administrative Requireme
nts
\n
\n
\nDay 2 Schedule
\n\n
Lecture 1:\n<
strong>Welcome - Recap Day 1 - Questions - Discussion Security Rule in Dep
th
\n\n\n - Electronic Protected Health Information (EPH
I)
\n - Purpose and Function of Security Rule
\n - Security Of
ficial
\n
\n\n
Lecture 2:\nFocus on Business Assoc
iates
\n\n\n - Inter-connected HIPAA Compliance for Cove
red Entities and Business Associates
\n - Is your Business Associate
your "\;Agent"\;?
\n - Due Diligence
\n - Subcontract
or Business Associates
\n - Business Associate Agreements
\n - Non-BA Confidentiality Agreement
\n
\nBusiness Associate
HIPAA Compliance\n\n\n - Privacy Rule - Who is in charge?
li>\n
\n\n
Lecture 3:\nBreach Notification Rule in Dep
th
\n\n\n - Learn by Doing \;Investigate a Po
tential Breach
\n - Do a Breach Risk Assessment
\n - When you
must notify - and when you do not need to notify
\n - Notifications
and Documentation
\n
\n\n
Lecture 4:\nWrap Up
\nMiscellaneous and Participant Selected Topics\n\n\n - Soci
al Media - Patient Engagement
\n - Prepare for HHS Audits or Investi
gations
\n - Final Questions - Answers
\n
\n\nPaul R.
Hales\, J.D.
\nPaul R. Hales\, Attorney at Law\, LLC \;
\n \;\nPaul R. Hales \;received his Juris Doctor degree
from Columbia University Law School and is licensed to practice before the
Supreme Court of the United States. He focuses on HIPAA Privacy\, Securit
y\, Breach Noti?cation and Enforcement law. Paul is widely known for his a
bility to teach HIPAA Compliance clearly\, simply and in plain language. H
e manages a national HIPAA consulting and education practice based in St.
Louis and is the author of all content in The HIPAA E-Tool®\;\, an Inte
rnet-based Software as a Service product for Covered Entities and Business
Associates.
\n
\n \;
\n
SUMMARY:HIPAA Compliance - Clear\, Complete\, Step-by-Step
BEGIN:VALARM
ACTION:DISPLAY
TRIGGER:-PT1H
SUMMARY:HIPAA Compliance - Clear\, Complete\, Step-by-Step
END:VALARM
END:VEVENT
END:VCALENDAR