Continuing Education Programs (CEU)

If you can't find what you want, Ask Us.

Refine Your Results

reset

Filter by Category

Location

Dates

FEATURED VENDORS

Showing 1-20 of 824 results Sort by:

Courses

  • 1 Request Info

    Sepsis: Increasing Incidence, Causes, Disease Progression

    Sepsis and septic Shock are major healthcare problems. It has been described as the Achilles' heel of health care. Sepsis occurs when the immune system goes into over-drive vigorously attacking an expanding infection. It is the No. 1 inpatient hospital expense in the United States, with costs surging by 3X over the last decade to $27 billion. Sepsis is a leading cause of death, morbidity and expense responsible for one third to one-half of hospitalized patients' deaths. In the U.S., more than 1.5 million people develop sepsis, of whom over 250,000 die as a result. It has now become one of the top five causes of hospitalization in for those over the age of 18.
  • 2 Request Info

    What You Need to Know as a Business Associate about HIPAA and Health IT

    As defined by the Health Information Portability and Accountability Act (HIPAA), a Business Associate can be any organization or person working in association with or providing services to a Covered Entity who handles or discloses Protected Health Information (PHI) or Personal Health Records (PHR). With certain exceptions, a person or entity that creates, receives, maintains, or transmits PHI for a function or activity regulated by the HIPAA Privacy Rule for a Covered Entity is a Business Associate. The HITECH Act, a recent update made to overall HIPAA regulations require Business Associates to comply with HIPAA mandates regarding the handling and use of health information. As a Business Associate you must comply with a wide-range of regulatory obligations, including certain privacy obligations, security standards, and breach notification requirements.
  • 3 Request Info

    Auditing Physician Contracts Under the New Stark Rules 2018

    In this session Mr. Wolfe will provide an overview of the Stark Law, including its recent changes. He will also discuss best practices for auditing physician compensation arrangements on behalf of health systems, hospitals, medical groups and physician practices. The webinar will focus on regulatory requirements, key provisions, valuation considerations and potential pitfalls that should be avoided. This webinar will offer best practices for implementing and auditing physician compensation arrangements to minimize liability exposure and penalties, including conducting compliance audits, instituting policies, and establishing ongoing monitoring and reviews.
  • 4 Request Info

    Proper Usage of EMR-EHR Systems to Achieve HIPAA Compliance

    This lesson will be addressing how practice managers (or compliance offers) need to understand how to properly utilize the EMR system for HIPAA compliance. I will address specific litigated cases I have worked where the covered entity had to pay out nasty fines to the Federal government and high settlements to patients affected by inappropriate usage of the EMR system - I will also address situations where the covered entity DID NOT receive any fines or judgements (even in the event of a breach or malicious actions) due to the fact they were using the systems in a "compliant manner" . I will also address major changes under the Omnibus Rule and any other applicable updates for 2017 and beyond. There are an enormous amount of issues and risks for covered entities and business associates these days.
  • 5 Request Info

    How to Prevent the Next Attack in Healthcare using Cybersecurity

    With the ever-changing landscape of cybersecurity, there are many threats, vulnerabilities, and malicious individuals trying to take down your network or get access to ePHI. With ePHI being the most valuable data on the dark web sometimes selling for over $100 per record, the bad people are targeting your organization. We will first look at what are the different types of risk, threats, and vulnerabilities on ePHI and methods to keep your data secure. We will talk though topics such as why spectre and meltdown while not a problem today, could be the cause of the next big attack. Other attacks such as ransomware, phishing, social engineering, and insider attacks will discussed to help you better understand these threats and what you need to be doing to prevent them. In addition, we will take a brief look at medical device vulnerabilities and the importance of keeping those devices secure.
  • 6 Request Info

    How to Put a Hipaa Compliance Program in Place

    Being in compliance with HIPAA involves not only ensuring you provide the appropriate patient rights and controls on your uses and disclosures of protected health information, but you also have the proper policies and procedures in place. If audited or the subject of a compliance review you will be required to show the government you have all the necessary documentation in place for safeguarding patient Protected Health Information and indicate how you addressed all required security safeguards. This starts with the fundamentals of a HIPAA compliance program. If your healthcare practice, business, or organization needs to understand how to put HIPAA compliance program in place or make sure the current program is adequate and can withstand government scrutiny, please join us for this informative and interactive course.
  • 7 Request Info

    Documentation Challenges in Behavioral Health

    This webinar will provide participants with an overview and in-depth examination of compelling documentation issues in behavioral health. Dr. Frederic Reamer will explore high-risk ethical issues and practical strategies designed to protect clients and practitioners. The webinar will explore a series of documentation challenges and explore practical steps that professionals can take to manage ethical issues skillfully and minimize risk. Key topics will include: The content of documentation Documentation wording Credibility issues related to documentation Accessing confidential records Record retention Responding to subpoenas Managing records in integrated health settings
  • 8 Request Info

    Key Stark Law Considerations for Structuring and Auditing Medical Director Arrangements

    In this session Mr. Wolfe will provide an overview of the Stark Law, including its recent changes. He will also discuss best practices for negotiating and drafting administrative arrangements on behalf of health systems, hospitals, medical groups and physician practices. The webinar will focus on regulatory requirements, key provisions, valuation considerations and potential pitfalls that should be avoided.
  • 9 Request Info

    Webinar On Hospital Systems:Medical Staff Issues

    Overview: This webinar addresses the medical staff issues arising when hospitals merge or are acquired by healthcare systems.Change in hospital ownership affects governance, including medical staff governance. The existing medical staff bylaws, rules and regulations and policies may be replaced as a result. Already established systems also create conflicts as system-wide documents may not fit all medical staffs in that system hospitals.The complication of recent changes in Medicare Conditions of Participation to allow systems to unify medical staffs will also be analyzed. Why should you Attend: Hospitals are merging or being acquired continuously by expanding healthcare systems.Merging medical staffs is no less complicated than the financial side of system growth. Planning and preparation can guard against combined medical staff conflicts and liability.
  • 10 Request Info

    Take the Fear out of HIPAA - Basic Step-by-Step Compliance

    Overview: The HIPAA Rules are frequently misunderstood and inadvertently violated. However, HIPAA Rules are easy to follow, step-by-step, when you know the steps. This session will explain exactly how a health care provider's designated HIPAA Compliance Official can find the right steps for each HIPAA compliance topic and how the health care provider can review and be assured the practice is up to date and in compliance with the HIPAA Rules. Why should you Attend: HIPAA can be complicated but this session provides practical solutions and answers to everyday problems you can understand. This session covers the HIPAA Privacy, Security, Breach Notification and Enforcement Rule compliance requirements for health care providers in plain language. Using practical, everyday examples Step-by-Step, with PowerPoint presentations and interactive exercises
  • 11 Request Info

    Structuring and Auditing Non-Physician Practitioner Arrangements Under the Anti-Kickback and Stark Laws

    Overview: In this session Mr. Wolfe will provide an overview of the Stark Law, including its 2016 changes. He will also discuss best practices for negotiating and drafting NPP arrangements on behalf of health systems, hospitals, medical groups and physician practices. The webinar will focus on regulatory requirements, key provisions, valuation considerations and potential pitfalls that should be avoided. Why should you Attend: Prior to moving forward with any NPP arrangements, the parties should carefully evaluate whether the proposed structure and financial terms support compliance with Stark's technical requirements and key tenets of defensibility so they will be prepared to mount a defense in the event the lease is ever challenged. This webinar will focus on the Stark Law's underlying technical requirements and key tenets of defensibility as they apply to NPP arrangements.
  • 12 Request Info

    Compensating Employed Physicians: Key Stark Law Considerations

    Overview: In this session Mr. Wolfe will provide an overview of the Stark Law, including its recent changes. He will also discuss best practices for structuring, negotiating physician employment agreements. The webinar will focus on regulatory requirements, key provisions, valuation considerations and potential pitfalls that should be avoided. Why should you Attend: As health care organizations and physicians develop their employment arrangements, they must ensure the employment and compensation structures are defensible under the Stark Law. In this webinar Mr. Wolfe will describe how to evaluate whether a proposed employment structure and financial terms will support compliance with Stark's technical requirements and key tenets of defensibility to manage risk.
  • 13 Request Info

    Key Legal Considerations When Redesigning Your Physician Compensation Plans

    Overview: In this session Mr. Wolfe will provide an overview of the Stark Law, including its technical requirements and key tenets of defensibility. He will also discuss best practices for structuring evaluating and structuring new compensation models. The webinar will focus on regulatory requirements, key provisions, valuation considerations and potential pitfalls that should be avoided. Why should you Attend: As health care organizations redesign their compensation plans, they must be sure the process they follow and the models the new models they develop are defensible under the Stark Law. In this webinar Mr. Wolfe will discuss developing best practices and how to evaluate whether a new compensation model is compliant with Stark's technical requirements and key tenets of defensibility.
  • 14 Request Info

    Developing a Physician Compensation Strategy Focused on Quality and Value

    Overview: In this session Mr. Wolfe will provide a straight-forward, practical explanation of developing concepts, including the quality and value metrics into new federal health care programs and commercial payment systems, new delivery models, what providers can be doing to develop a value-based strategy, and the application of the Stark Law and other fraud and abuse laws to new models aimed at population health, quality of care and cost control. Mastering these concepts will be a must for health care executives looking to position their organizations for success in this new value-based world. Why should you Attend: Medicare, Medicaid and private payors are looking to accelerate the transition from volume to value and population health through targeted incentives.
  • 15 Request Info

    HIPAA Cyber Crime - How to Prevent, Prepare, Respond and Recover

    Overview: This webinar for HIPAA Covered Entities and Business Associates explains how to use the HIPAA Rules to Prevent, Prepare, Respond and Recover from Cyber Attacks. Why should you Attend: Cyber Threats to the Security of Health Information are at Crisis levels. The latest threats are caused by two security flaws called "Meltdown" and "Spectre" in nearly all "chips" - microprocessors installed in electronic devices like computers, smartphones and tablets. Windows, Linux, iOS, MacOS, tvOS, Android and nearly all operating systems are affected by these vulnerabilities. Meltdown and Spectre, could allow hackers to lift passwords, photos, documents and other data from electronic devices and cloud computing services used by the entire Healthcare Industry. Meltdown and Spectre add to a list of Cyber-Threats that, today, are more dangerous to the Healthcare Industry like Ransomware.
  • 16 Request Info

    Scoop-Top Targets of Fed HIPAA Enforcers & Simple Steps to Take Control

    Overview: This webinar for HIPAA Covered Entities and Business Associates will identify the top OCR HIPAA enforcement priorities for 2018 and explain simply how you can master HIPAA compliance requirements for each enforcement priority. Why should you Attend: HIPAA Compliance is in crisis throughout the United States. The Office for Civil Rights (OCR), the HIPAA enforcement arm of the U. S. Department of Health and Human Services has just announced results of its recent HIPAA Compliance Audits of Covered Entities (CEs). The audited CEs represented a cross-section of all types and sizes throughout the nation. All knew they were on a shortlist to be audited and had access well in advance to the questions they would be asked and documents they would be required to produce. Nevertheless, OCR found 94% (59 of 63) of CEs to be inadequate or worse in Risk Management compliance and 87% (55 of 63) to be inadequate or worse in Risk Analysis compliance.
  • 17 Request Info

    Managing Your FDA Inspection: Before, During and After

    FDA's inspection program follows well-established procedures and conducts the inspections with as much consistency as possible. FDA trains its investigators from day one. During the first six months, they attend extensive classroom and hands on training. FDA investigators learn basic skills. As time goes on, special training is given and the field staff use detailed reference materials to guide their thinking, actions, decisions and conclusions. If you understand FDA's management of its investigators and inspectional process, you can keep your establishment ahead of a needless regulatory disaster. FDA conducts inspections with standard operating procedures and detailed information on how to handle almost any situation the FDA investigator may face. Click to Continue Reading: https://www.globalcompliancepanel.com/control/globalseminars/~product_id=901411SEMINAR?trainingregistry-April-2018-SEO
  • 18 Request Info

    Tougher Import Rules for FDA Imports in 2018

    FDA and the Customs and Border Patrol Service (CBP) have become increasingly sophisticated and equally demanding in the submission of import information and adherence to government procedures. Firms that fail to understand and properly execute an import and export program find their shipments delayed, detained or refused. As of December 2016, FDA and CBP officially implemented the Automated Commercial Environment (ACE) entry filing system. You either meet ACE requirements or face entry refusals and monetary penalties of up to $10,000 per offense. Click to Continue Reading: https://www.globalcompliancepanel.com/control/globalseminars/~product_id=901402SEMINAR?trainingregistry-April-2018-SEO
  • 19 Request Info

    A Risk Based Strategy for the Development & Validation of and Validation of Analytical Methods with a QbD Approach

    Following the initial development, the steps further continues thru optimization and subsequently to Validation, leading to the understanding of Validation Parameters and their generic definitions. Guidance from EP, USP, ICH Q2 (R)1, AOAC etc. will be discussed. The presentation continually builds on from a conceptual level to practical applications leading to data handling, Data Integrity, Validation Protocol and other documentation, vis-a-vis Regulatory requirements. Discussions provide extensive guidance for preparing Methods Validation Protocols for the various stages of regulatory submissions, e.g. IND, NDA, ANDA, PAI, CMC etc. Various aspects of Laboratory Controls (CGMP), QC procedures, SOPs that cover calibration, standardization, Qualification and Validation, will be included, along with statistical tools, SQC, SPC for processing and monitoring of analytical data. Strategies for the development Stability indicating assays will be touched along ...
  • 20 Request Info

    Evolution of the Quality Management System - How to go from Surviving to Thriving

    Many companies struggle to establish and maintain a Quality Management System (QMS) that is both efficient and effective. An ineffective QMS leads to disastrous consequences such as medical device reports, recalls, 483s, and warning letters. An ineffective QMS can result in serious consequences for your customers leading to dissatisfaction, serious injury, or even death. It is imperative that medical device companies can effectively establish a QMS. And an inefficient QMS results in wasted time, money, and missed opportunities. In this 2-day seminar, we will use lecture, exercises, and discuss to learn the fundamentals of a Quality Management System and how you can take your program from surviving to thriving. A thriving QMS can help you achieve your compliance objectives and improve product quality, leading to higher customer satisfaction and business results.