Are HIPAA/HITECH and meaningful use security requirements confusing?
Can you afford a data breach that can lead to loss of reputation and revenue?
Are your IT resources overstretched?
Are you prepared for the ongoing federal audit by HHS/KPMG auditors?
EHR 2.0 has answers! Learn and meet compliance(HIPAA/HITECH) and Meaningful Use(MU) security requirements for a medium-large practices and small-medium hospitals. As the adoption of electronic health record increases, it becomes critical for healthcare practices to develop strategies to protect electronic health information, and comply with HIPAA/HITECH regulations and EHR meaningful use measures. This virtual instructor-led online training will help you understand HIPAA/HITECH information security requirements and steps required to implement secure and compliant EHR systems. During this course, you will also have the opportunity to explore the security best practices and integrate regulatory requirements into your existing practice.
|Module Name||Target Audience|
|Fundamentals of Healthcare ITSecurity and Compliance (Module 1)
|Healthcare IT for Security Practitioners (Module 2)
|Implement HIPAA/HITECH Security Requirements (Module 3)
- Experts from healthcare, security and compliance, and audit professions
- Accurate interpretations of HIPAA/HITECH and MU security requirements and compliance requirements
- Ability to practice, monitor, and report HIPAA/MU security requirements based on your role
Training participants will get
- Course pack
- Resource and reference list to healthcare IT security topics
- Best practices learning platform access for 6-months
- Recorded Training
- HIPAA/HITECH templates and assessment framework
- Continuous education hours
- Monthly classes beginning March 14 to 16, 2012 from 1 PM – 5 PM each day
- We also offer on-site and weekend classes
EHR 2.0 reserves the right to alter or delete items from the program in the event of unforeseen circumstances. Material has been prepared for the professional development in healthcare audit, control, security, and governance community. Neither the presenters nor EHR 2.0 can warrant that the use of material presented will be adequate to discharge the legal or professional liability of the members in the conduct of their practices. All materials used in the preparation and delivery of presentations on behalf of EHR 2.0 are original materials created by the speakers, or otherwise are materials which the speakers have all rights and authority to use and/or reproduce in connection with such presentation and to grant the rights to EHR 2.0 as set forth in speaker agreement. Subject to the rights granted in the speaker agreement, all applicable copyrights, trade secrets, and other intellectual property rights in the materials are and remain with the speakers.
Please note: Unauthorized recording, in any form, of presentations and workshops is prohibited.