Assessing Your HIPAA Privacy and Security
Attend this LIVE, ONLINE TRAINING presented by our expert, who will be using all the interactive training tools used in the classroom and more. You’ll be able to ask questions, respond to polls, and collaborate with others. Don’t let anything interrupt your training needs. Join us online and experience a different way of learning! Please click here for Virtual Training FAQs.
Has your tribe kept up to date with the recent HIPAA changes? Most tribes are not currently compliant, and most do not realize they aren’t. With significant increases in penalties for violations, now it’s more important than ever that you understand and comply with HIPAA.
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is the most significant body of health care legislation enacted since Medicare. HIPAA’s far-reaching provisions govern all health care entities that maintain or transmit protected health information in both paper and electronic format. While it may seem like a daunting task to become and/or remain compliant with all HIPAA regulations, compliance not only helps maintain privacy but also streamlines your organization’s operations.
HIPAA is an ongoing evolution of compliance activities that everyone, from receptionists to executives, must understand. The best way to keep your entire organization on the same page while streamlining processes is to have solid policies and procedures in place. They will ensure privacy, security, effective use of information systems technology and customer satisfaction and will help your organization avoid penalties.
During this hands-on class, we’ll review the Indian Health Service (IHS) HIPAA Privacy Requirements Checklist, which correlates requirements to policies, procedures and action items. We’ll also review the 2013 Omnibus Rule, including statutory changes under the HITECH Act, enacted as part of the American Recovery and Reinvestment Act of 2009, and the Genetic Information Nondiscrimination Act of 2008. And we’ll look at the final security rule requirements, how to comply and how to document why your organization may be exempt from a specific requirement. Then, using case studies and discussions, you’ll work with our expert instructor to assess your current practices and start revising your existing policies and procedures.
|Click here to find out how you can bring a Falmouth Institute seminar to your location!|