Top Data Breaches for 2018: Lessons for Protecting PHI

Event Information
Product Format
Live Webinar
Presenter(s)
Pamela Joslin, MM, CMC, CMIS, CMOM, CMCO, CEMA, CMCA-E/M
Conference Date
Add to my calendar   Thu, Feb 28, 2019
Aired Time
1 pm ET | 12 pm CT | 11 am MT | 10 am PT
Length
90 minutes
Product Description

7 Steps to Real-World Data Security Compliance for 2019


Data breaches in healthcare settings are a very real and very prevalent problem. But did you know that more than half involve insiders? And that the most affected assets are not medical devices but databases and paper documents? Protect your patients’ PHI by training your employees to thwart specific, actual threats—the very ones that caught so many healthcare organizations off guard in 2018.

Join healthcare security consultant Pam Joslin to learn to audit and monitor your security protocols with a keen eye turned to the vulnerabilities facilities like yours face. Joslin will walk you through your Department of Health and Human Services (HHS) regulatory compliance obligations regarding protected health information—including HIPAA’s privacy rules and the law’s definition of a “breach.” She will give you a tour of the HHS Office for Civil Rights (OCR) website and breach portal—and discuss the components of the agency’s corrective action plan for breach violations.

Don’t get caught in the feds’ crosshairs—or risk your patients’ trust. In this webinar, you’ll learn how to: protect PHI on laptops and social media platforms, use the HIPAA checklist to identify your high-risk areas, and create a “culture of compliance” in your office.

Session Highlights

This training session will cover:

  • The top 10 healthcare data breaches of 2018—and what they mean for your facility
  • HIPAA’s basic privacy rules for protecting PHI
  • What constitutes a HIPAA “breach” and how to report one
  • What constitutes a HIPAA “covered entity” and a “business associate relationship”
  • Basic security measures your facility may be missing
  • Recommendations to improve common threat actions
  • Valuable employee training tools to create a culture of data security compliance

Who Should Attend

This training session will benefit healthcare professionals including medical practice managers and administrators, auditors, physicians, clinical and practice staff, compliance officers, and billers and coders.

Ask a question at the Q&A session following the live event and get advice unique to your situation, directly from our expert speaker.

Order Below or Call 1-866-458-2965 Today

You can also order through:
Phone

1-866-458-2965

Fax

1-919-287-2643

About Our Speaker

Pamela Joslin

Pam Joslin, MM, CMC, CMIS, CMOM, CMCO, CEMA, CMCA-E/M has more than 20 years of medical practice management, billing and coding, reimbursement, auditing and compliance experience.


She is an engaging presenter via webinar, classroom and conference on various topics that may impact each step in the life of the revenue cycle of every practice.

 

She has managed in medical practices ranging from...   More Info
More Events By The Speaker

Why AudioEducator?
  • Save money on travel.
  • Meet your specific training needs.
  • Keep learning after the event.
  • Save time training your whole staff.
Join Our Mailing List
Our Accreditation Partners
Facebook Twitter Linkedin Youtube RSS Feeds Google Plus