Print Page   |   Contact Us   |   Sign In   |   Join
HIPAA Data Security Requirements and Handling Breaches - 5909
Tell a Friend About This EventTell a Friend
 

This webinar explores the HIPAA definition of sensitive data and the various methods we can utilize to protect it. We also outline the remediation steps and deployment models should a breach occur. Anyone responsible for HIPAA sensitive data will enjoy this topic. We are all responsible for some data, even if it’s just our own.

 Export to Your Calendar 9/30/2016
When: 12:00 PM - 1:00 PM
Where: Webinar/Webcast
United States
Contact: April Deneault

« Go to Upcoming Event List  

Acronym EHIPA1
CPE 1 hour
Category
Management
Level Intermediate
Vendor Executive Education, Inc.
Who should attend

All professionals involved in handling employee and patient data.

Prerequisite
Some familiarity with data security issues
Fees: Early Bird
Standard
Member N/A
$49
Non-Member: N/A
$49

Description 
HIPAA (Health Insurance Portability and Accountability Act) data security affects us all.  HIPAA impacts us whether we maintain employee records, work in an environment with medical records, or are simply a health care consumer.  What is our responsibility for protecting confidential information?  What happens if the unthinkable happens and we suffer a breach?

This webinar explores the HIPAA definition of  sensitive data and the various methods we can utilize to protect it.  We also outline the remediation steps and deployment models should a breach occur.  Anyone responsible for HIPAA sensitive data will enjoy this topic.  We are all responsible for some data, even if it’s just our own.



Specific topics include:

  • Understanding HIPAA specific data security requirements
  • Myth busting – not all medical data is HIPAA sensitive
  • What data is HIPAA sensitive and constitutes a breach if not protected
  • What options do we have to protect HIPAA sensitive data
  • The deed is done. You’ve had a breach.
  • Now what
  • Defining the extent of your breach and infraction level
  • Identifying remediation requirements
  • Deploying the remediation and calculating the costs

Objectives

  • Understand the data security requirements under HIPAA (The Health Insurance Portability and Accountability Act)

 REGISTER HERE

 

Membership Management Software Powered by YourMembership.com®  ::  Legal