Healthcare CE/CEU/CME

If you can't find what you want, Ask Us.

Refine Your Results

reset

Filter by Category

Location

Dates

FEATURED VENDORS

Showing 1-20 of 431 results Sort by:

Courses

  • 1 Request Info

    How to Perform a HIPAA Risk Assessment and Write Policies

    Overview: I will show how to conduct a PROPER risk assessment point by point and how to also avoid scams in the market. We will also be discussing the absolute importance of doing a risk assessment and that this is the first thing the OCR will ask for. I will instruct the listeners on how to write proper policies and procedures which are to be based upon the findings of the risk assessment and how to word the policies to satisfy the Fed. We will also discuss the importance of having policies which are consistent with your procedures and also discuss the negative ramification of cookie cutter templates in the eyes of the Fed. Why should you Attend: Have your done a HIPAA Risk Assessment? Do you know a risk assessment is the first thing the Feds will ask for in an audit? Is your risk assessment adequate? Do you have written policies in place for every single one of the implementation specification of the HIPAA Security Rule (even ones that don't apply) - do you know this is required!!
  • 2 Request Info

    3-Hours Virtual Seminar - Reporting HIPAA Breaches: Protection and Prevention

    Everyone in the healthcare industry knows about HIPAA (the Health Insurance Portability and Accountability Act), that has been in effect since 1996. The goal of the legislation was fairly simple - to safeguard our patient health information. The law dictated to entities how to protect health information (PHI), how it can be shared, when it can be shared, and with whom it can be shared. To date, even the best of healthcare organizations struggle with feeling confident that they have all the required areas covered to protect and prevent HIPAA violations from occurring in their organization. It is well documented that by initiating proper training and implementing effective monitoring tools, HIPAA violations can be reduced or more readily identified in the workplace. Often there is not clear communication to employees about "what constitutes a HIPAA breach" and how can this be reported in your organization without "fear of retaliation."
  • 3 Request Info

    What is the Government Looking for In a HIPAA Audit

    This lesson will be addressing how practice/business managers (or compliance offers) need to get their HIPAA house in order as HIPAA is now fully enforced and the government is not using kid gloves any more. It will also address major changes under the Omnibus Rule and any other applicable updates for 2016 and beyond. There are an enormous amount of issues and risks for covered entities and business associates these days. I will speak on specific experiences from over 17 years of experience in working as an outsourced compliance auditor as well as working directly with auditors used by Health and Human Services and dispel myths vs realities. I will go over steps to take to avoid an audit or survive an audit. I have also served as expert witness on legal cases involving HIPAA violations, and I will thoroughly explain how patients are now able to get cash remedies for wrongful disclosures of private health information (which leads to more audits).
  • 4 Request Info

    Webinar On Reimbursement Explained

    Healthcare reimbursement systems can be complex and difficult to understand. Each payor may use a different method to reimburse providers, or they may use a variation of a commonly used method. This course will provide a foundation for understanding the common reimbursement systems in use today. We start with Medicare's reimbursement systems of RBRVS, DRGs, and APCs because many other payors use modified versions of these systems. We then discuss other payor types such as HMOs, PPOs, and ACOs and how these organizations use other reimbursement methods such as capitation, per diems, and carve outs. Finally, we discuss the key data elements needed to adjudicate claims according to each scheme, and we discuss the financial incentives (and disincentives) associated with each method.
  • 5 Request Info

    Employment Agreements, Contractor Agreements & Negotiating Skills

    This lecture will provide an overview of how to read and interpret a typical physician or health care provider employment or contractor agreement.It is critical that any agreement that an employee or contractor is required to sign be provided to the employee or contractor well in advance of the start date with plenty of time and opportunity to review and revise as needed. The presenter will begin by outlining the difference between being an employee and a contractor, and what the ramifications are of each classification, as well as providing a general overview of other basic business considerations when considering an employment or contractor position of any kind. Attendees will learn how to interpret basic agreement terms and learn how to eliminate the term "boilerplate" and "legalese" from their vocabulary when considering such contracts.
  • 6 Request Info

    3-Hour Virtual Seminar on HIPAA vs. SAMHSA 42 CFR Part 2

    This session focuses on the issues of managing health information when it may involve substance use disorder treatment information. HIPAA allows a number of disclosures without consent that SAMHSA prohibits without consent. First we will explain how HIPAA relates to information management and release and explain the processes required for various releases of information under the HIPAA rules, including release according to individual access requests, and under HIPAA authorizations. When substance use disorder treatment information is involved, first you need to understand how to identify it. We will discuss how to make it distinguishable from "regular" health information, so that the appropriate extra protections can be provided. You may be able to use functions in your EHR to flag the information, or you may create a manual process for tracking the information, if it is rarely handled in your organization.
  • 7 Request Info

    HIPAA Violations - Social Media, Web Sites, Patient Reviews - Simple Compliance Steps to Avoid Danger

    Overview: This session will explain the HIPAA Rules for Web Sites and Social Media. The secret is - HIPAA Rules are easy to follow, step-by-step - when you know the steps. Why should you Attend: This webinar provides the guidance needed to use Web Sites and Social Media in healthcare and stay compliant with HIPAA. The HIPAA Rules, HHS/OCR guidance, Resolution Agreements provide a simple, easy to use blueprint using your Web Site and Social Media to engage patients and comply with HIPAA. Areas Covered in the Session: A clear explanation of the HIPAA Rules that apply to Health Care Provider Web Sites and Social Media How to keep your Web Site and Social Media dynamic, effective and follow simple HIPAA Rules HIPAA Rules for Web Sites and Social Media are clear, unequivocal and easy to follow. It only takes one look at a Health Care Provider's Web Site or Social Media page to find violations
  • 8 Request Info

    Webinar On HIPAA for Dummies: Boot Camp

    This lesson is going to get back to the basics using multiple real life scenarios and "what if's". My goal is to make this very confusing and not well explained law easy to understand for the typical staff member. I will uncover myths versus reality as it relates to this enigmatic law based on over 1000 risk assessments performed as well as years of experience in dealing directly with the Office of Civil Rights HIPAA auditors. I will also point out multiple court cases I have been affiliated with where a staff member of a hospital or clinic has been sued or even imprisoned! I will also speak to real life audits conducted by the Federal government (I've been on both sides of these audits) what your highest risks are for being fined (some of the risk factors may surprise you).
  • 9 Request Info

    3-Hours Virtual Seminar - Social Media in Your Medical Practice: Benefits and Risks

    Research data repeatedly indicate that patient outcomes improve when patients are involved and engaged in their own healthcare. Social media can be the ideal opportunity to expand the patient-doctor relationship beyond the traditional face-to-face encounters. However, being aware of inadvertent disclosure of PHI, such as photos or videos, can result in fines and other penalties. To effectively manage this, healthcare organizations should provide HIPAA training to social media managers and conduct compliance checks with continued monitoring. According to a survey conducted January 2016, by the Society of Corporate Compliance and Ethics (SCCE) and Health Care Compliance Association (HCCA), cybersecurity and cybercrime tops the list of compliance and ethics professionals'hot topics.
  • 10 Request Info

    An Overview of Medical Coding Systems: CPTs, HCPCS, DRGs, ICD-10, APCs

    Medical coding is the foundation of the US healthcare system. Medical codes are essential for billing and claims, reimbursement, healthcare analytics, risk scoring, physician compensation, among many other uses.Every claim includes multiple codes from various coding systems. This webinar explains the use of five of the most common schemes in use today: CPT and HCPCS codes, ICD-10 codes, DRGs, and APCs. For each system, we discuss how codes are assigned; where they appear on the claim; how they are used for billing and reimbursement; which types of claims are subject to each coding scheme; and other features of each system. We also provide tips for analyzing data containing these codes.
  • 11 Request Info

    3-Hour Virtual Seminar on Patient Communications, E-mail, and Texting

    E-mail has long been a staple of people's lives, but as we move into the new digital age, it seems everyone is moving to a new smart phone and wants to use it in all the incredible ways it can be used for health care purposes, including the use of e-mail and texting. Doctors are finding that texting is far more flexible, convenient, and effective than paging, and patients want to be able to use short message texting for handling of appointments, updates, and the like, where even e-mail or the telephone would seem inconvenient. In order to integrate the use of e-mail and texting into patient communications, it is essential to perform the proper steps in an information security compliance process to evaluate and address the risks of using the technology. This session will describe the information security compliance process, how it works, and how it can help you decide how to integrate e-mail and texting into your organization in a compliant way.
  • 12 Request Info

    HIPAA Breach - Or Not? How to Find Out & What to Do

    This webinar explains the inter-connected Breach Notification Rule requirements of Covered Entities and Business Associates when a Business Associate or Subcontractor Business Associate suffers a Breach. And it covers the special, more restrictive compliance requirements when a Business Associate or Subcontractor is an Agent under the Federal Common Law of Agency - including how to avoid creating an Agency relationship by mistake. This webinar for HIPAA Covered Entities and Business Associates explains the 5 Steps of HIPAA Breach.
  • 13 Request Info

    Webinar On Behavior Health Coding and Documentation

    Evaluation and Management codes are often vulnerable to third-party auditor scrutiny. Payers frequently use different types of analyses to identify outliers with E/M coding, such as physicians who bill higher-than-normal levels of more intensive codes. Other auditors, such as Recovery Auditors, Medicare Administrative Contractors, and Zone Program Integrity Contractors often follow the same process to use this same type of data to calculate from analytics. Given the increased scrutiny of these codes, it's important to be confident with E/M and other coding that it is reflective of the accurate documentation during the patient encounter. During this webinar, we will revisit E/M coding guidelines and other top office services for Behavior Health professionals. There will be sample scenarios used during the webinar to help define the reason for the patient encounter documentation requirements that meet the definition of the code.
  • 14 Request Info

    Recent Developments in the Rorschach Inkblot Method

    Overview: This webinar provides an overview of recent developments in the Rorschach Inkblot method, specifically in terms of (a) its current research base, (b) comparison between the Comprehensive System and the Rorschach Performance Assessment System (R-PAS), and (c) considerations in selecting appropriate normative data. The webinar will provide a brief review of several aspects of contemporary Rorschach research, including interrater and test-retest reliability, as well as validity. In addition, you may be unsure about the specific differences between Exner's Comprehensive System (CS) and R-PAS. This webinar will detail several key differences between these two Rorschach systems and the implications of these differences. Selection of appropriate normative data is crucial for interpreting Rorschach results.
  • 15 Request Info

    Webinar On National Practitioner Data Bank Expanded Reporting Parameters

    Overview: Hospitals must file a National Practitioner Data Bank report on any physician's surrender of privileges if an investigation is underway. This has always been a Data Bank reporting requirement, intended to discourage plea bargains which allowed physicians to avoid being reported if they agreed to waive hearing rights. Under the new Guidebook, expanded descriptions of "investigation" and "surrender" stretch what is to be considered a reportable surrender of privileges. OPPE and FPPE and other peer review can be affected, as are physicians ability to make practice decisions without inadvertently tripping Data Bank reporting triggers. Medical staff bylaws and policies need to be reworked under the new Data Bank Guidebook. Why should you Attend: Are you aware of the revisions to the National Practitioner Data Bank Guidebook? New and surprising government interpretations of the regulatory scheme have been recently published. Most medical staff policies and bylaws in hospitals
  • 16 Request Info

    The Anti-Kickback Statute Paying for Referrals is a Bad Idea

    The session will provide an overview of the Anti-Kickback Statute (AKS) and review what it prohibits, as well as review the Statute's available safe harbors. It will also show how violation of the AKS can raise FCA concerns, and it will provide an assessment of enforcement activities, showing how participants may be at risk. In addition, the session will review recent cases and show how they potentially impact participants.
  • 17 Request Info

    3-hour Virtual Seminar on Physician Employment Agreements

    Overview: We will review each of the elements of the physician employment agreement in depth, focusing on the pitfalls and the problems that can develop when the agreement does not clearly define the relationship, and/or when the parties do not fully understand what is being agreed to. Such items as term and termination, termination for cause, duties of the physician, call, non-compete, and compensation are all items that should be clearly set out in the agreement and fully understood by the parties. Why should you Attend: Formal written contracts establish the legal relationship between the parties,they state the terms and conditions of that relationship and the rights and obligations of each party.They confirm the intentions and relationships of the parties as they enter into this relationship, and they eliminate uncertainties regarding mutual rights, obligations, and relationships.
  • 18 Request Info

    Empowering the Latino Immigrant Family as Partners in Education

    Overview: Empowering the immigrant parent as a partner in their children's education is critical if we desire immigrant students to be successful and stride to a higher level of academic achievement. This workshop is designed to help professionals and paraprofessional in the task of facilitating the engagement of immigrant families who may not be accustom to taking an active role alongside teachers and administrators. It is also essential to understand that parents/guardians absence from school activities does not mean a lack of interest but rather a different perspective in their role as parents. In this presentation you will learn these and many more areas of interest that will assist you in moving forward with parent engagement. An initial step prior to engaging the parents is to learn and understand your immigrant population. Understanding what they went through and what their current stressors are will help you in being mindful when planning an activity.
  • 19 Request Info

    Neuroscience Applications to Mental Health Treatment

    Overview: Over the past couple of decades there has been an exciting merging of psychotherapy and neuroscience research that is revolutionizing clinical practice. Cognitive, affective, social, and positive neuroscience research provides profound insight into the brain changes we are capable of producing. We are beginning to learn, through this research, how to enact these changes through the practice of psychotherapeutic techniques that target and improve the functioning of specific brain structures. This webinar, led by clinical expert Dr. Jennifer Sweeton, shares the most up-to-date research discoveries and teaches highly effective psychotherapy techniques clinicians can begin using tomorrow. Why should you Attend: Neuroscience research is providing insight into why, when, and with whom specific psychotherapeutic approaches may be beneficial to therapy clients.
  • 20 Request Info

    HIPAA Breach Evaluation and Reporting - What Qualifies as a Reportable Breach and how to Report It

    Overview: The HIPAA Breach Notification Rule has been in effect since 2010 and has been significantly modified in 2013. We will discuss the origins of the rule and how it works, including interactions with other HIPAA rules and penalties for violations. Whenever there may be a privacy issue involving Protected Health Information, there may be a reportable breach under the HIPAA regulations. Not all privacy violations are reportable breaches, though, so it is essential to have a good process for evaluating incidents to see if they have resulted in a reportable breach. Any privacy rule violation that results in an acquisition, access, use, or disclosure of PHI in violation of the HIPAA Privacy Rule may be a breach, unless the incident is one of the defined exceptions from the definition.