Loading Events
Find Events

Event Views Navigation

Past Events

Events List Navigation

February 2017

HIPAA Compliance and IoT Medical Devices

February 9, 2017 @ 12:00 pm - 1:00 pm

Healthcare medical devices are subjected to HIPAA privacy and security rules pertaining to protected health information. Information is considered protected health information if it meets two requirements: If it is individually identifiable, meaning that it contains identifiers such as a name or date of birth that may identify the individual to which it pertains and if it consists of data regarding that individual’s health.

Attend our free, live 50-minute webinar to learn about HIPAA Compliance for IoT devices and measures to stay compliant.

Find out more »

MACRA and MIPS Update

February 23, 2017 @ 12:00 pm - 1:00 pm

The landscape of Electronic Health Record (EHR) Incentive Programs is changing. This webinar will provide you with an overview of important changes related to how Medicare will pay health care providers who care for Medicare beneficiaries under MACRA and outline the transition to the Merit-Based Incentive Payment System (MIPS) program.

Join our 50-minute webinar to learn more about how CMS streamlined the incentive programs into a single framework to help clinicians transition from payments based on volume to payments based on value.

Find out more »
April 2017

Managing the Risks of a Healthcare Data Breach

April 6, 2017 @ 12:00 pm - 1:30 pm

The HIPAA data breach violations are on the rise. The HIPAA Breach Notification Rule, 45 CFR §§ 164.400-414, requires HIPAA-covered entities and their business associates to provide notification following a breach of unsecured protected health information. Similar breach notification provisions implemented and enforced by the Federal Trade Commission (FTC), apply to vendors of personal health records and their third party service providers, pursuant to section 13407 of the HITECH Act – Do you have a complete understanding of the new…

Find out more »
May 2017

How to Protect Against Ransomware Attacks?

May 24, 2017 @ 12:00 pm - 1:00 pm

The recent ransomeware attack "WannaCry", has made a statement, impacting more than 300,000 victims across more than 150 countries. Join us to learn how threats like ransomware can become so widespread so quickly, the impact that not being prepared and protected can have on your healthcare practice, and how to ensure you are well positioned to avoid the IT chaos future threats may pose and to avoid Healthcare data breaches.    

Find out more »
June 2017

Small Practice Social Media Lead Generation – From Claiming Your Space To Patient Engagement

June 13, 2017 @ 12:00 pm - 1:00 pm

- Are you with a small medical practice? - Don't have social media presence for your practice yet? - Want to gain business through social media promotions? Join our hosts Janet Kennedy and Carol (Francis) Bush of the Healthcare Marketing Network as they walk you through a successful online presence for a healthcare practice. Starting with "claiming your space" to ensure the accuracy of your practice information, we'll also cover launching a blog and how to select the right social media sites for your practice.…

Find out more »
August 2017

Cloud Computing and HIPAA – Are you covered?

August 9, 2017 @ 12:00 pm - 1:00 pm

Cloud Service Providers (CSPs) generally offer online access to shared computing resources with varying levels of functionality depending on the healthcare organizations requirements. CSPs services range from mere data storage to complete software solutions (e.g., an electronic medical record system) and much more. Under the HIPAA rules when a Covered Entity (CE) engages the services of a CSP to create, receive, maintain, or transmit ePHI (such as to process and/or store ePHI), on its behalf, the CSP is a business associate under…

Find out more »

HIPAA: How to Comply With Limited Time & Resources

August 17, 2017 @ 1:00 pm - 2:00 pm

In this one-hour live webinar, Jonathan Pantenburg will provide an overview of the Health Insurance Portability and Accountability Act, with an emphasis on the critical balance between protecting patient health information and sustaining operations as a healthcare entity. Jonathan will review, at a high level, risk assessments, OCR audits, safeguarding PHI, breach protocol/penalties, the most common HIPAA violations, and covered entity/business associate agreements - while relaying how small and medium-sized healthcare practices can comply with HIPAA in the most effective and cost-efficient manner. Audience: Healthcare…

Find out more »
September 2017

HIPAA Compliance Requirements for Law Firms

September 20, 2017 @ 1:00 pm - 2:00 pm

If you provide legal services to a client and receive patient data from your clients in the process of providing legal services, you are a Business Associate of your client and you are subject to HIPAA rules. The final HIPAA rule of 2013 (Section 13401 and 13404 of the HITECH Act) requires Health and Human Services(HHS) to consider healthcare Business Associates like the healthcare covered entities. Business associates are required to comply with the HIPAA Privacy, Security Rules and Breach Notification standards just like the…

Find out more »
October 2017

HIPAA Hardening for Microsoft Azure Cloud Hosting

October 25, 2017 @ 1:00 pm - 2:00 pm

HIPAA and the HITECH Act applies to most doctors’ offices, hospitals, health insurance companies, and other companies that may have access to patient information (called Protected Health Information, or PHI). If you use a cloud-based service such as Microsoft Azure, Microsoft must agree in a written agreement to adhere to certain security and privacy compliance provisions set out in HIPAA and the HITECH Act. While Microsoft Azure includes features to help enable customers’ privacy and security compliance, customers are responsible…

Find out more »
December 2017

2017 Meaningful Use/MIPS Security Risk Analysis

December 13, 2017 @ 1:00 pm - 2:00 pm

The primary purpose of security risk analysis for Meaningful Use/MIPS is to identify key technical vulnerabilities in the electronic Protected Health Information (ePHI) and EHR systems environments.  In order to implement appropriate technical controls, eligible professionals and hospitals need to conduct a security risk analysis in accordance with the requirements under HIPAA security rule 45 CFR 164.308(a)(1), apply security updates as necessary, and correct identified security deficiencies as part of their risk management process before MU/MIPS attestation deadline.   The…

Find out more »
+ Export Events



Upcoming Events

  1. HIPAA Hardening for AWS Cloud Hosting

    January 31 @ 1:00 pm - 2:00 pm
  2. MACRA: MIPS and APM Opportunities for Small Practices in 2017

    February 21 @ 1:00 pm - 2:00 pm