Continuing Education Programs (CEU)

If you can't find what you want, Ask Us.

Refine Your Results

reset

Filter by Category

Location

Dates

FEATURED VENDORS

Showing 1-20 of 874 results Sort by:

Courses

  • 1 Request Info

    Webinar On Functional Assessment and Behavior Support Plans in an Inpatient Psychiatric Facility

    Overview: What is the cause of a behavior? Why do we do the things we do? We can ponder on questions like this for our own personal interest, but for those responsible for the care of patients with serious mental disorders and behavioral challenges, the question becomes much more pertinent. When dealing with challenging behaviors in a psychiatric facility (or other settings), we as clinicians are tasked with finding a way to: 1) identify the problem behavior; 2) have a hypothesis of the function of the behavior; 3) implement a plan that will reinforce a replacement behavior that will serve as incompatible or as an alternative to the identified problem. Each of these three steps can be a challenge and an opportunity to make progress in a patient's care. To add to the complexity of this situation, the inpatient hospital setting adds its own set of circumstances that may impede progress in behavioral management of a patient.
  • 2 Request Info

    Webinar on Third Party Vendor Risk Assessment for Financial Firms - Rules, Regulations and Best Practices

    This training program will examine who are third party vendors and analyze why it is critical to prepare a vendor management risk assessment. Price:$200.00. Contact info : OnlineCompliancePanel Phn. no. +1-510-857-5896 Fax-+1-510-509-9659 info@onlinecompliancepanel.com Event link https://www.onlinecompliancepanel.com/webinar/Third-Party-Vendor-Risk-Assessment-for-Financial-Firms-Rules-Regulations-and-Best-Practices-506387/JULY-2018-ES-TRAININGREGISTRY
  • 3 Request Info

    Neuroscience Applications to Mental Health Treatment

    Overview: Over the past couple of decades there has been an exciting merging of psychotherapy and neuroscience research that is revolutionizing clinical practice. Cognitive, affective, social, and positive neuroscience research provides profound insight into the brain changes we are capable of producing. We are beginning to learn, through this research, how to enact these changes through the practice of psychotherapeutic techniques that target and improve the functioning of specific brain structures. This webinar, led by clinical expert Dr. Jennifer Sweeton, shares the most up-to-date research discoveries and teaches highly effective psychotherapy techniques clinicians can begin using tomorrow. Why should you Attend: Neuroscience research is providing insight into why, when, and with whom specific psychotherapeutic approaches may be beneficial to therapy clients.
  • 4 Request Info

    Webinar on Payments Fraud: Detect & Prevent Check, ACH and P-Card Schemes

    Training program on identifying critical red flags of all forms of check, ACH and P-card fraud. Price:$200.00. Contact info : OnlineCompliancePanel Phn. no. +1-510-857-5896 Fax-+1-510-509-9659 info@onlinecompliancepanel.com Event link https://www.onlinecompliancepanel.com/webinar/Payments-Fraud-Detect-Prevent-Check-ACH-and-P-Card-Schemes-504444/JULY-2018-ES-TRAININGREGISTRY
  • 5 Request Info

    HIPAA Breach Evaluation and Reporting - What Qualifies as a Reportable Breach and how to Report It

    Overview: The HIPAA Breach Notification Rule has been in effect since 2010 and has been significantly modified in 2013. We will discuss the origins of the rule and how it works, including interactions with other HIPAA rules and penalties for violations. Whenever there may be a privacy issue involving Protected Health Information, there may be a reportable breach under the HIPAA regulations. Not all privacy violations are reportable breaches, though, so it is essential to have a good process for evaluating incidents to see if they have resulted in a reportable breach. Any privacy rule violation that results in an acquisition, access, use, or disclosure of PHI in violation of the HIPAA Privacy Rule may be a breach, unless the incident is one of the defined exceptions from the definition.
  • 6 Request Info

    How to Conduct Newcomer Support Groups for Latino Immigrant Youth

    Overview: This workshop will introduce to participants the "why and how" to conduct support groups with Latino immigrant youth who enter the United States by crossing the border. Many, if not most of these immigrants have similar experiences that impact their emotional and behavioral health such as the stressors and/or traumas of their native country to include killings, sexual violence, domestic abuse, the takeover of gang life, extortion, etc. and their arduous journey through Central America, Mexico and crossing the Rio Grande. The impact of being caught by ICE and being sent to a detention center also may leave emotional scars. Once they are reunited with their families, they must adjust to these changes and to a new culture, language and school system. All of these changes can leave a youth with limited coping skills, heightened depression and anxiety.
  • 7 Request Info

    3-Hour Virtual Seminar on HIPAA Training for Compliance Officer

    Overview: This 3 hour webinar will be addressing how practice/business managers (or compliance offers) need to get their HIPAA house in order before the imminent audits occur. It will also address major changes under the Omnibus Rule and any other applicable updates for 2018. Areas also covered will be texting, email, encryption, medical messaging, voice data and risk factors as they relate to IT. The primary goal is to ensure everyone is well educated on what is myth and what is reality with this law, there is so much misleading information regarding the do’s and don’ts with HIPAA -I want to add clarity for compliance officers and what you guys need to do and how to best implement your HIPAA program based on over 18 years of personal experience working with Federal auditors, state auditors, and corporate auditors. We will go through multiple scenarios that are commonly faced by compliance officers and how to manage these situations.
  • 8 Request Info

    3-Hour Virtual Seminar on HIPAA 2018 and Beyond

    Overview: This three hour webinar will be addressing how practice/business managers (or compliance offers) need to get their HIPAA house in order as HIPAA is now fully enforced and the government is not using kid gloves any more. It will also address major changes under the Omnibus Rule, Trump administration, and any other applicable updates for 2018 and beyond. There are an enormous amount of issues and risks for covered entities and business associates these days - we will speak to the most common violations and fines - and how to best avoid fines and headaches altogher. I will speak on specific experiences from over 18 years of experience in working as an outsourced compliance auditor, expert witness on multiple HIPAA cases, and thoroughly explain how patients are now able to get cash remedies for wrongful disclosures of private health information. More importantly I will show you how to limit those risks by simply taking proactive steps and utilizing best practices.
  • 9 Request Info

    Webinar on Preparing the Fraud Examination Reports

    This webinar tells about the individuals who are responsible for drafting, editing or approving the content and format of written reports related to fraud examinations. Price:$200.00. Contact info : OnlineCompliancePanel Phn. no. +1-510-857-5896 Fax-+1-510-509-9659 info@onlinecompliancepanel.com Event link https://www.onlinecompliancepanel.com/webinar/Preparing-the-Fraud-Examination-Reports-504424/JUNE-2018-ES-TRAININGREGISTRY
  • 10 Request Info

    Token Economies to use in a Hospital or Community Setting

    Overview: In hospitals, schools, group homes and in private residential settings, behavior problems are one of the most challenging areas to address. Issues such as physical aggression, self-injury and poor communication and compliance are the very barriers that can keep one from attaining personal independence. Improvements in behavior that free an individual from restrictive methods and punishing contingencies, as well as enable one to live life as he or she chooses, are always a step forward. The problem with many methods of improving behavior is that it is difficult to reinforce appropriate behavior in a timely manner. Conversely, destructive and counter-productive behavior is often reinforced (in surprising ways) much sooner than the opposite. One of main problem with behavior improvement programs is the reinforcement (for appropriate behavior) comes too far after the time of the replacement behavior.
  • 11 Request Info

    Eight Basic Steps to HIPAA Compliance Just what the Title Says

    Overview: Absolute security is not possible. However, dentists can take some simple steps that will make their data much harder to steal and will start them on the road to HIPAA compliance. You will learn what to look for in a technology assessment,what types of backup work best and why; how and why to use passwords or better yet password alternatives; and finally, the one simple technique that HIPAA does not even address that will help protect you from the majority of data breaches. Why should you Attend: Full HIPAA compliance is a daunting and expensive task. Compliance includes,a technology security review, updated business associates agreements, updated privacy forms, documented training, a disaster recovery plan in the event of a data breach and more.
  • 12 Request Info

    HIPAA Plain & Simple, Stage 4, Cyber-Security Kick Off For your Organization

    Overview: In a hyperconnected healthcare world, what cyber protections have you put in place that allow your human resource assets to sleep at night? Irrespective of size, cyber security is as much about protecting small practice information network assets as it is about protecting complex information networks in large military hospitals and health systems. While failures are unavoidable, you can keep your network from collapsing in the event of an attack, and we will show you how. In this session, you will learn from small to large health care organizations who have built a controlled "attack plan" to put protections in place. Plans not only identified the outliers within their organization, but also helped leadership respond promptly, efficiently, and how to remediate the attack.
  • 13 Request Info

    How People with Bipolar Think - How to Help

    Overview: Humans all think, all the time and most people have similarities in thought processes. Most people have reasonable, measured, moderate thoughts. And while there are many variations on these theme, these thoughts occur on a bell curve with most people being in the meaty part of the curve. Those with bipolar disorder, however, often have very extreme thoughts and their thought processes tend to exist on the very far ends of the bell curve. This can make understanding how a person with bipolar acts very challenging as these actions are driven by thought processes the average person doesn't experience. While these thoughts may seem "crazy" at first, it's important to realize that they are simply an extreme part of the human experience that do fall along a continuum that is experienced by everyone.
  • 14 Request Info

    Therapeutic Implications When Working with Latino Immigrant Youth and Their Families

    Overview: This workshop will cover the "Pre-migration, Migration and Post-migration" experiences of the Latino youth crossing the border and its psychological impact on their ability to adjust and adapt in the United States. It begins with an overview of the pre-migration experiences in their native countries and factors that have lead to the great exodus to the United States. Issues of increase violence, murders, sexual assaults, abuse and extortion by local gangs will be addressed. The presentation then transitions into the topic of migration and the traumatic odyssey that many undocumented Latino youth experience traveling with a "coyote" through Central America and Mexico, crossing the border and for many who were captured by ICE, the experience of detention centers. True stories that were told to the presenter by Latino youth will be shared.
  • 15 Request Info

    Implementation and Management of GMP Data Integrity

    In recent years, FDA has increasingly observed CGMP violations involving data integrity during CGMP inspections. This is troubling because ensuring data integrity is an important component of industry's responsibility to ensure the safety, efficacy, and quality of drugs, biologics and medical devices. These data integrity-related CGMP violations have led to numerous regulatory actions, including warning letters, import alerts, and consent decrees. Data integrity is the assurance that data records are accurate, complete, intact and maintained within their original context, including their relationship to other data records. This definition applies to data recorded in electronic and paper formats or a hybrid of both.
  • 16 Request Info

    3-Hour Virtual Seminar on HIPAA Texting and E-mailing

    Overview: This lesson will be going into great detail regarding you practice or business information technology and how it relates to the HIPAA/HITECH Security Rule and securing PHI in transmission. I will go through multiple examples and specific scenarios and also offer simple common-sense solutions. Areas covered will be texting, email, encryption, medical messaging, voice data, personal devices, and risk factors. I will uncover myths versus reality as it relates to this very enigmatic law based on over 1000 risk assessments performed as well as years of experience in dealing directly with the Office of Civil Rights HIPAA auditors. I will speak on specific experiences from over 17 years of experience in working as an outsourced compliance auditor, expert witness on multiple HIPAA cases in state law, and thoroughly explain how patients are now able to get cash remedies for wrongful disclosures of private health information.
  • 17 Request Info

    The Role of the HIPAA Security Official

    Overview: Being in compliance with HIPAA involves not only ensuring you provide the appropriate patient rights and controls on your uses and disclosures of protected health information, but you also have the proper policies and procedures in place. If audited or the subject of a compliance review you will be required to show the government you have all the necessary documentation in place for safeguarding patient Protected Health Information and indicate how you addressed all required security safeguards. This starts with the fundamentals of a HIPAA compliance program. If your organization needs to understand the role of the HIPAA Security Official, the requirements, and make sure the current compliance program is adequate and can withstand government scrutiny, please join us for this informative and interactive course.
  • 18 Request Info

    Effective Design of Experiments (DOE) Strategies

    Overview: This DOE (Design of experiments) training focuses on DOE strategies. It is not focused on statistical methods, analysis of variance, and other techniques, but rather the overall approach for successful DOEs. Why should you Attend: Attendees will learn: Effective DOE strategies Avoiding pitfalls when performing DOEs How to capture the essence of a process Using the right resolution at the right time Use of DOEs during process validation How to prevent "expert" bias when designing experiments Letting the process do the talking "Poke the Alligator" - see how the process reacts Areas Covered in the Session: Gauge R&R considerations Screening DOEs Mapping DOEs Robust Process DOEs Use of Six Sigma DMAIC when using DOEs and vice versa Obtaining proper input from various stakeholders
  • 19 Request Info

    3-Hour Virtual Seminar on DHF, DMR, DHR, TF , Design Dossiers - The Requirements

    Overview: This webinar will examine the existing and proposed requiements for the U.S. FDA's DHF, 21 CFR 820.30 and now ISO 13485:2016 7.3 including its derivitive documents, the DMR and DHR. It will consider the European Union's MDD TF/DD and its transition to the EU MDR requirements, and evaluate the documents' differing purposes / goals, as well as the two different device classification schemes. Required and desirable contents will be discussed. Also considered: Areas requiring frequent re-evaluation / update; Similiarities and differences; Future trends; Typical DHF Table of Contents, Technical File or Design Dossier Table of Contents, The importance and usefulness of the "Essential Requirements"; Structure of the "Declaration of Conformity",self-declaring or N-B reviewed; Parallel approaches to development. Finally, the differing approaches to file audits by the FDA and the Notified Body will be discussed.
  • 20 Request Info

    Process Validation Requirements & Compliance Strategies

    Overview: This Process Validation Requirements webinar will review process validation basics, with emphasis on looking beyond compliance towards achieving a robust process. Review of process validation basics, with emphasis on looking beyond compliance towards achieving a robust process. Why should you Attend: When used as intended, process validation can provide increased process reliability, improved yields, and reduced operating expenses. Areas Covered in the Session: Global Harmonization Task Force requirements (includes FDA and ISO) Installation Qualification (IQ) Operational Qualification (OQ) Performance Qualification (PQ) Design Qualification Facilities and utilities Strategies for achieving a robust and reliable process Typical process validation protocols