As a part of its continued efforts to assess compliance with the HIPAA Privacy, Security and Breach Notification Rules, the HHS Office for Civil Rights (OCR) has begun its phase 2 audits of Covered Entities and their Business Associates. A vast variety of healthcare organizations are being audited and the penalties for non-compliance is high. This 50-minute webinar by EHR 2.0 will focus on the latest audit updates from HHS/OCR, lessons learned from the previous audit findings and how to…Find out more »
For over a decade, technology-driven industries have been the beneficiaries of low-cost, high-quality labor available from the offshore market. With the introduction of HITECH rules, it's the turn of the healthcare industry now as most of the providers are moving from paper-based records to Electronic Health Records(EHR). With this digitization, comes the advantage of lowering operational cost using HIPAA Compliant offshore service providers. Join our 50-minute webinar, to learn compliance, security and operational best practices while choosing an HIPAA compliant offshore service…Find out more »
As with physicians, hospitals, and clinics, healthcare product vendors who build web applications, mobile applications, medical devices, or wearable devices dealing with the collection, storage, or processing of Protected Health Information (PHI) need their products to comply with HIPAA/HITECH requirements published by HHS. Attend our 50-minute webinar to learn more about the requirements on how to build an HIPAA compliant product to handle patient data securely.Find out more »
Did you change your EHR system or have plans to change in the near future? Are you acquiring new facilities into your group? What should be done with the historical medical and financial records in the legacy EHR? Have you moved or archived older data into the new EHR to meet the state mandated minimum 5 years of data retention policy? Join our 50-minute webinar and listen to industry experts share key lessons and best practices on data management strategies…Find out more »
Public Health Departments provide a broad array of services to their communities, which may include but are not limited to: disease surveillance and investigation, immunizations, emergency preparedness, infant and maternal health programs, health promotion and prevention programs, home health services, child care facility inspection. While the size and scope of health departments across the country varies between different jurisdictions, all share common goals, challenges, and regulations. The HIPAA Privacy, Security, and Breach requirement is a mandate under the Health Information Technology for…Find out more »
In addition to providing incentives, CMS EHR Meaningful Use program imposed penalties for reimbursement if providers are not part of their EHR incentive program. This year’s reporting period for Meaningful use program states: For all returning participants, the EHR reporting period will be a full calendar year from January 1, 2016 through December 31, 2016. For EPs, eligible hospitals, and CAHs that have not successfully demonstrated meaningful use in a prior year, the EHR reporting period is any continuous 90-day…Find out more »
The primary purpose of security risk analysis for Meaningful Use is to identify key technical vulnerabilities in the electronic Protected Health Information (ePHI) and EHR systems environments. In order to implement appropriate technical controls, eligible professionals and hospitals need to conduct a security risk analysis in accordance with the requirements under HIPAA security rule 45 CFR 164.308(a)(1), apply security updates as necessary, and correct identified security deficiencies as part of their risk management process before MU attestation deadline. The…Find out more »
Healthcare medical devices are subjected to HIPAA privacy and security rules pertaining to protected health information. Information is considered protected health information if it meets two requirements: If it is individually identifiable, meaning that it contains identifiers such as a name or date of birth that may identify the individual to which it pertains and if it consists of data regarding that individual’s health.
Attend our free, live 50-minute webinar to learn about HIPAA Compliance for IoT devices and measures to stay compliant.Find out more »
The landscape of Electronic Health Record (EHR) Incentive Programs is changing. This webinar will provide you with an overview of important changes related to how Medicare will pay health care providers who care for Medicare beneficiaries under MACRA and outline the transition to the Merit-Based Incentive Payment System (MIPS) program.
Join our 50-minute webinar to learn more about how CMS streamlined the incentive programs into a single framework to help clinicians transition from payments based on volume to payments based on value.Find out more »
The HIPAA data breach violations are on the rise. The HIPAA Breach Notification Rule, 45 CFR §§ 164.400-414, requires HIPAA-covered entities and their business associates to provide notification following a breach of unsecured protected health information. Similar breach notification provisions implemented and enforced by the Federal Trade Commission (FTC), apply to vendors of personal health records and their third party service providers, pursuant to section 13407 of the HITECH Act – Do you have a complete understanding of the new…Find out more »