Healthcare today runs more and more on information that is accessed electronically, and many healthcare professionals are using smart phones and tablets more and more to access that information. The problem is that often these devices are not provided by the organization and are not under the control of the organization information security management process. How can you remain in compliance with HIPAA privacy and security rules if you do not have any control over the devices accessing the information? It is essential to take the steps necessary to configure the devices and your systems, and train your users before security problems occur.
The adoption of new, portable information technologies is revolutionizing the provision and documentation of health care in America, and healthcare IT departments are struggling to keep up with the security needs of these devices. One of the unfortunate results of such widespread adoption of portable technologies is that without the adoption of good security practices, they can become the source of HIPAA privacy and security breaches. In fact, the largest percentage of breach issues today includes the loss or theft of portable devices containing unencrypted PHI. Entities must adopt a breach notification policy and procedures to ensure accurate reporting and documentation of breaches, and must follow the standards and specifications of the HIPAA Security Rule to protect information from breaches, including the adoption of policies and procedures for the use of personally owned devices. These devices and the systems they access can be configured to work securely, but only with the proper planning and implementation.
Join for this enlightening session and see what you'll learn:
Who should attend? Compliance Manager, HIPAA Officer, Chief Information Officer, Health Information Manager, Medical Office Manager, Medical Practice Lawyer, CFO, CEO, COO. Privacy Officer, Information Security Officer.
Jim Sheldon-Dean is a healthcare compliance and HIPAA expert in the areas of privacy and security regulatory compliance and business process analysis. He is the founder and director of compliance services at Lewis Creek Systems, LLC, a Vermont-based consulting firm founded in 1982, providing information privacy and security regulatory compliance services to a wide variety of healthcare entities. Jim is a frequent speaker regarding HIPAA...
More Events By The Speaker