HIPAA and BYOD -Understanding The Security Needs Of Your Electronic Device

Event Information
Product Format
Prerecorded Event
Conference Date
Thu, Jan 24, 2013
60 minutes
Product Description

Struggling To Keep Up With The Security Needs Of Electronic Devices?

Healthcare today runs more and more on information that is accessed electronically, and many healthcare professionals are using smart phones and tablets more and more to access that information. The problem is that often these devices are not provided by the organization and are not under the control of the organization information security management process. How can you remain in compliance with HIPAA privacy and security rules if you do not have any control over the devices accessing the information? It is essential to take the steps necessary to configure the devices and your systems, and train your users before security problems occur.

The adoption of new, portable information technologies is revolutionizing the provision and documentation of health care in America, and healthcare IT departments are struggling to keep up with the security needs of these devices. One of the unfortunate results of such widespread adoption of portable technologies is that without the adoption of good security practices, they can become the source of HIPAA privacy and security breaches.  In fact, the largest percentage of breach issues today includes the loss or theft of portable devices containing unencrypted PHI. Entities must adopt a breach notification policy and procedures to ensure accurate reporting and documentation of breaches, and must follow the standards and specifications of the HIPAA Security Rule to protect information from breaches, including the adoption of policies and procedures for the use of personally owned devices. These devices and the systems they access can be configured to work securely, but only with the proper planning and implementation.

Join for this enlightening session and see what you'll learn:

  • How personal portable devices are used in health care will be discussed, and their security risks will be presented.
  • The necessary policies and procedures to govern the use of personal portable devices will be discussed.
  • The top privacy and security issues found by HHS investigators during HIPAA compliance audits and as a result of breaches will be presented and discussed.
  • Most frequent kinds of HIPAA breaches will be discussed -- involving portable devices -- and how they can be prevented by using encryption according to Federal standards.  You’ll learn about what information needs to be encrypted the most and how entities are doing it.
  • Understand what isn’t a breach and under what circumstances you don’t have to consider breach notification, show the importance of preparation and drills when it comes to breaches, and discuss issues in responding to a breach involving more than 500 individuals, including posting on the HHS breach notification “wall of shame” on the Web.
  • Strategies to mitigate the risks of personal portable technology, including measures that can be taken with both the devices and your systems.
  • Issues will be explored surrounding your biggest risk issue: your staff.
  • The use of training and documentation to mitigate risks will be discussed, and training strategies will be explored.
  • Discuss how incident management must be planned and executed to minimize the damage of breaches and satisfy Federal regulations.
  • The penalties for non-compliance will be discussed and recent enforcement action results will be presented.

Who should attend? Compliance Manager, HIPAA Officer, Chief Information Officer, Health Information Manager, Medical Office Manager, Medical Practice Lawyer, CFO, CEO, COO. Privacy Officer, Information Security Officer.

Order Below or Call 1-866-458-2965 Today

You can also order through:




About Our Speaker

Jim Sheldon Dean - HIPAA Compliance & Regulations Expert

Jim Sheldon-Dean is a healthcare compliance and HIPAA expert in the areas of privacy and security regulatory compliance and business process analysis. He is the founder and director of compliance services at Lewis Creek Systems, LLC, a Vermont-based consulting firm founded in 1982, providing information privacy and security regulatory compliance services to a wide variety of healthcare entities. Jim is a frequent speaker regarding HIPAA...   More Info
More Events By The Speaker

Why AudioEducator?
  • Save money on travel.
  • Meet your specific training needs.
  • Keep learning after the event.
  • Save time training your whole staff.
Join Our Mailing List
Our Accreditation Partners
Facebook Twitter Linkedin Youtube RSS Feeds Google Plus