HIPAA Breaches – How to Reduce Human Error

More than 175,000,000 individuals have been affected by HIPAA data breaches. During the last year, 78% of HIPAA breaches are caused by human error. That means almost all of those breaches may have been prevented. Does your organization have the required safeguards in place? Have you trained your workforce? Do you have HIPAA policies and procedures in place?

The goal is to help organizations try and avoid HIPAA data breaches. If the subject of an OCR enforcement investigation you will be required to show the government you have all the necessary documentation in place for safeguarding patient Protected Health Information and indicate how you addressed all required security safeguards.

The goal is to help organizations try and avoid HIPAA data breaches. If the subject of an OCR enforcement investigation you will be required to show the government you have all the necessary documentation in place for safeguarding patient Protected Health Information and indicate how you addressed all required security safeguards.

Areas Covered in the Session :

  • Why was HIPAA created?
  • Who Must Comply with HIPAA Requirements?
  • What are the HIPAA Rules?
  • Who Enforces HIPAA?
  • Best Security and Industry Practices
  • Enforcement Case Examples
  • Learning from Other’s Mistakes
  • What are the penalties and fines for non-compliance and how to avoid them?
  • Interactive Q&A Session
Who Will Benefit:

  • HIPAA Privacy Officer
  • HIPAA Security Officer
  • Practice Managers
  • Information Systems Manager
  • Chief Information Officer
  • General Counsel/lawyer
  • Office Manager
  • Medical Billing Companies
  • Any Business Associates that accesses protected health information

HC2225

Jay Hodes

Jay Hodes is a leading expert in HIPAA compliance and President of Colington Consulting. His company provides HIPAA consulting services for healthcare providers and business associates. Mr. Hodes has over 30 years of combined experience in risk assessments, site security evaluation, regulatory compliance, policy and procedures assessments, and Federal law enforcement management. He previously served as the Assistant Inspector General for Investigations at the U.S. Department of Health and Human Services. In that role, Mr. Hodes was responsible for more than 200 special agents and professional support staff charged with conducting complex healthcare fraud investigations and law enforcement efforts. He also managed the headquarters’ divisional operations, including the Special Investigations Branch.

Mr. Hodes has been the keynote speaker and provided presentations regarding HIPAA compliance and patient privacy to many professional healthcare organizations including the Health Care Compliance Association, the Maryland Medical Group Management Association, the Baltimore City (MD) Medical Society, the New Jersey Aging Life Care Association, and the Virginia Academy of Elder Law Attorneys. He has published over 45 educational articles regarding HIPAA compliance, been featured in Part B News articles, the Report on Patient Privacy, provided a guest post in the Electronic Health Reporter, interviewed and provided comments to Hospital Access Management regarding HIPAA privacy issues resulting from the Orlando mass shooting incident, and interviewed three times by Renal & Urology News, provided comments to the Virtru.com blog regarding HIPAA requirements and safeguards, and interviewed by PracticeSuite EMR as part of their Expert Interview Series.

Mr. Hodes is a member of the American Institute of Healthcare Compliance, Health Care Compliance Association, Healthcare Information and Management Systems Society, American Society for Industrial Security, Health Technology Forum- Washington, DC, and the Health and Medical Technology Innovation Round table at George Mason University. In his free time, Mr. Hodes is a volunteer for Lab Rescue of the Labrador Retriever Club of the Potomac and the non-profit organization, Outer Banks (NC) Sporting Events.

JUST RELEASED
SEMINARS
&
WORKSHOPS
 



Untitled1


  • Login Information with Password to join the session, 24 hours prior to the webinar
  • Presentation Handout in .pdf format
  • Presentation from the Speaker
  • Feedback form
  • Certificate of Attendance
  • Recording access Information with Password to view the webinar, will be sent 24 hours after the completion of the Live webinar.
  • Presentation Handout in .pdf format
  • Certificate of Attendance
.