Under HIPAA Omnibus final rule a breach is presumed following every impermissible use or disclosure of Protected Health Information (PHI). Covered entities and business associates must demonstrate, through a properly conducted and documented risk assessment, that there is a low probability of compromise of the affected data/PHI.
As more physicians, hospitals, and other healthcare professionals adopt Electronic Health Records (EHR), share digital medical records, implement cloud computing, and engage in social media, the risks, size, and frequency of data breaches containing Protected Health Information (PHI) are increasing exponentially.
Attend our 90-minute, vendor-neutral webinar to learn about crucial topics, ranging from recognizing symptoms of a breach and breach diagnosis to analysis of a security incident and new breach notification requirements. Participants will have dedicated time for questions and answers after the presentation.
1) Breach overview
2) Causes of breach
3) Symptoms of a breach
4) What do you do if you suspect a breach?
5) How to minimize breach impact?
6) Key takeaways
- Access to recorded webinar and presentation material
- Continuous education credit
- Process chart
- HITECH breach rule
- Reported data breaches
- Data breach infographic
Speaker: Alan Roth, CISA
Mr. Roth is an expert in digital forensics. His past work experience includes serving as postal inspection service representative to National Institute of Science and Technology Joint Steering Committee for Computer Forensics. He is a Certified Information Systems Auditor (CISA), current Director and certification coordinator of ISACA, the Information Systems Audit and Control Association of Research Triangle Chapter, North Carolina. He’s also a past 2nd Vice President of the Carolina chapter of HTCIA, the High Technology Crime Investigation Association. Mr. Roth is also a member of the High Tech Crime Consortium (HTCC) that assists law enforcement and corporate investigators to obtain the knowledge and skills needed to combat 21st Century crime involving digital technology. He currently consults with EHR 2.0 on healthcare data breach related issues.
The content of the slides puts the information into a logical flow …The commentary that accompanied the slides was also good explanations of what is out there and what can be expected – Margaret C., CHC, Corporate Compliance Officer
To learn more about our upcoming webinars, visit www.ehr20.com/webinars/