5 Step Compliance - HIPAA Breach Notification Rule - Covered Entities and Business Associates


Paul Hales is a Keynote Speaker at Compliance Key, Inc. He received his Juris Doctor degree from Columbia University Law School and is licensed to practice law before the Supreme Court of the United States. He is an expert on HIPAA Privacy, Security, Breach Noti?cation and Enforcement Rules with a national HIPAA consulting practice based in St. Louis. Paul is the author of all content in The HIPAA E-Tool, an Internet-based, Software as a Service product for health care providers and business associates.

Overview

More than 170 million Americans have been affected by Breaches of Unsecured Protected Health Information (PHI) since 2009. A Ransomware attack that encrypts PHI is now presumed to be a HIPAA Breach by Federal regulators. HIPAA Breach Notification Content and Timeliness are 2 of the top Enforcement priorities of the Office for Civil Rights (OCR), the HIPAA enforcement arm of the U. S. Department of Health and Human Services. The question is not whether a Covered Entity or Business Associate will suffer a Breach. Unfortunately, it is when will you suffer your next (or first) Breach. 

Why should you attend this webinar?

You should attend this session to learn exactly what to do if your organization suspects it has suffered a Potential Breach or has been attacked by Ransomware. You will learn how to investigate, assess, determine and document whether you have suffered a Breach of Unsecured PHI that requires Breach Notifications, when and how to provide Breach Notification and the other things you must do when you have a Breach.
There is a secret to HIPAA Compliance. The secret is the HIPAA Rules are easy to follow, step-by-step, when you know the steps.
In this session you will learn and see the 5 steps of HIPAA Breach Notification Tule compliance explained clearly in plain language. 

Areas Covered in the Session:

This webinar for HIPAA Covered Entities and Business Associates explains the 5 Steps of HIPAA Breach Notification Rule Compliance. They are:

  • Potential Breach Investigation
    • How to recognize a Potential Breach
    • The information you need to gather
    • 5 Key Questions that can confirm no Breach occurred
    • the Data-based Decision - Breach, No Breach or possible "Low Probability of Compromise" indicating a Breach Risk Assessment should be done
  • Breach Risk Assessment 
    • How to apply the factors that can demonstrate a "Low Probability of Compromise" to PHI meaning Breach Notifications are not required
    • How to conduct Breach Risk Assessment of a Ransomware Attack that can overcome the presumption that the Ransomware Attack was a Breach of Unsecured PHI requiring Breach Notification 
  • Determination and Documentation - what to do next based on the results of your Potential Breach Investigation or Breach Risk Assessment
  • Notifications
    • The timing and content of Notifications that must be made in the case of a Breach of Unsecured PHI
    • Notification Procedures when 500 or more Individuals are affected by a single Breach
    • Notification Procedures when 1 to 499 Individuals are affected by a single Breach
  • Other Breach Notification Rule compliance requirements
    • Mitigation
    • Protection against further Breaches
    • Law Enforcement Delay
    • Dtate Breach Notification Rule Requirements

Who can Benefit:



Webinar Id: HIPSPH006

Training Options:

Duration: 60 mins

 Recorded: [Six month unlimited access]

 $237(Single Attendee)  $599(Unlimited Attendee)

Refund Policy
Upcoming Webinar of Paul Hales
Past Webinar of Paul Hales
Upcoming Webinar :Life Sciences and Healthcare
Mobile Medical Apps (Is It a FDA Regulated Device) and Cybersecurity
By: Edwin Waldbusser
When: 10/24/2017 | 10:00 AM PT |01:00 PM ET
Price: $179
Course Description - How to Write and Manage a Change Control System
By: Danielle DeLucy
When: 10/24/2017 | 10:00 AM PT |01:00 PM ET
Price: $179

More Webinar

Past Webinar : Life Sciences and Healthcare
    
Copyright © 2017 Compliance Key . All Rights Reserved. Back to Top