How to Write and Adopt HIPAA Policies and Procedures


Jonathan P. Tomes , J.D., is Keynote Speaker at Compliance key Inc. He is a health care attorney practicing in the greater Kansas City. He is a nationally recognized authority and expert witness on the legal requirements for health information. Jon has written more than 60 books, including the following: How to Handle HIPAA and HITECH Act Breaches, Complaints, and Investigations: Everything You Need to Know; The Compliance Guide to HIPAA and the DHHS Regulations, now in its sixth edition, along with its accompanying HIPAA Documents Resource Center CD, ; Electronic Health Records: A Practical C........

Overview

Often healthcare and related businesses do not understand that HIPAA is far more about policies and procedures than it is about technical security measures. The HIPAA Security Rule, for example, does not specify whether an entity must have a password system and, if it does, how many characters it must have and whether it has to be alphanumerical with one or more special characters or whether it must have some type of biometric identification such as a thumbprint reader or retinal scan. Rather, it requires a covered entity to consider what it deems to be reasonable and appropriate and memorialize it in a policy. Similarly, it does not specify what kind of shredder it must have for paper records and what kind of method of destroying electronic PHI (ePHI) (degausser, software wipe, or a sledge hammer used with vigor). Rather it requires a written destruction plan. Failure to have these policies have resulted in the Department of Health and Human Services imposing civil money penalties (CMPs) in the millions of dollars. And, they have imposed penalties for policies that HIPAA does not even mention but that a covered entity or business associate is apparently supposed to figure out if they do that activity, say telemedicine or working from home.

Why should you attend this webinar?

Of the many dozen CMPs imposed to date, well over-half involved, at least in part, from not having either required policies and procedures. And not only having is all necessary policies vital to avoiding CMPs, but to avoiding other penalties such as in the new federal HIPAA lawsuits authorized by the HITECH Act. These lawsuits have resulted in seven-figure settlements. And don't forget the mitigation costs-costs of lessening the harm to victims of a breach.
But you can't just download sample templates-you have to customize them for your situation. This seminar will help you do so.

Areas Covered in the Session:

Who can Benefit:

Healthcare HIPAA Security and Privacy Officers, Compliance Officers, CEOs, CFOs, Chief Information Officers, human resource officers, business managers facility administrators, medical records personnel, health information managers, health care attorneys, clinicians, nurses and business associates.



Webinar Id: LSHCJPT002

Training Options:

Duration: 60 mins

 View anytime

 Recorded: [Six month unlimited access]

 $237 (Single Attendee)  $599 (Unlimited Attendee)

Refund Policy
Upcoming Webinar of Jonathan P. Tomes
What Is a HIPAA Security Incid....
By: Jonathan P. Tomes
When: 03/06/2018 | 12:30 PM PT |3:30 PM ET
Price: $179
What Does the Term "Reasonable....
By: Jonathan P. Tomes
When: 03/20/2018 | 12:30 PM PT |3:30 PM ET
Price: $179

More Webinar

Past Webinar of Jonathan P. Tomes
Upcoming Webinar: Life Sciences and Healthcare
Is Your Material Compliance Pr....
By: James Kandler
When: 02/23/2018 | 10:00 AM PT |01:00 PM ET
Price: $179
HIPAA and Patient Engagement -....
By: Paul Hales
When: 02/23/2018 | 12:30 PM PT |03:30 PM ET
Price: $179

More Webinar

Past Webinar: Life Sciences and Healthcare
    
Copyright © 2018 Compliance Key . All Rights Reserved. Back to Top