Healthcare CE/CEU/CME

If you can't find what you want, Ask Us.

Refine Your Results

reset

Filter by Category

Location

Dates

FEATURED VENDORS

Showing 21-40 of 467 results Sort by:

Courses

  • 21 Request Info

    HIPAA, Ransomware & Cyber Criminal Chaos - Prepare, Prevent, Respond and Recover

    Overview: This webinar will explain about Ransomware attack on a Covered Entity or BA that encrypts PHI is presumed to be a HIPAA Breach according to the U. S. Department of Health and Human Services (HHS). Ransomware including new, more treacherous varieties used by cyber-criminals to attack the Healthcare Industry HIPAA Rules that apply to Ransomware attacks "Social Engineering" tricks criminals use to sneak Ransomware into Electronic Information Systems What to do if your organization suffers a Ransomware attack Best practices to: Prevent Prepare Respond Recover from Ransomware Attacks Why should you Attend: Healthcare is the biggest target for Ransomware attacks in 2017. New types of Ransomware are particularly dangerous. They not only lock up your information system - they steal Protected Health Information (PHI).
  • 22 Request Info

    The 5 most Dangerous Risks Under New HIPAA Laws

    Overview: This lesson will be addressing how practice/business managers (or compliance offers) need to get their HIPAA house in order as HIPAA is now fully enforced and the government is not using kid gloves any more.It will also address major changes under the Omnibus Rule and any other applicable updates for 2016 and beyond. There are an enormous amount of issues and risks for covered entities and business associates these days as it relates to patients ability to sue you and the Federal governments audit process. I will speak on specific experiences from over 17 years of experience in working as an outsourced compliance auditor, expert witness on HIPAA cases, and thoroughly explain how patients are now able to get cash remedies for wrongful disclosures of private health information. More importantly I will show you how to limit those risks by simply taking proactive steps and utilizing best practices
  • 23 Request Info

    How you are Violating HIPAA Every Day

    Covered entities and business associates have very specific requirements under the HIPAA Privacy Rule, HIPAA Security Rule and Breach Notification Rule. Enforced by the Office for Civil Rights (OCR) HIPAA appears to be constantly changing, not based on new regulations, but guidance and newsletters from the OCR, Office of the Inspector General, Office of National Coordinator and CMS. In addition, OCR adopts many of the publications from the National Institute of Standards and Technology (NIST). Without a clear understanding of how to apply the standards in your office, you will most likely be in violation of some aspect of HIPAA every day. Small matters such as not posting your Notice of Privacy Practices (NPP) in your waiting room or not listing electronic exchanges on your Notice.
  • 24 Request Info

    Powerful Pain Management Strategies: Communication Tools to Successfully Assess Pain and Dramatically Increase Patient Satisfaction

    Overview: This session will provide specific and easy to implement strategies to help ALL clinicians, not just pain management specialists. Pain management is more than "passing meds." This session is not about different types of pain medications. Rather, it is about building a relationship with the patient and together finding the best method of managing pain. At times, healthcare professionals cannot completely remove all pain. However, even patients experiencing some pain (that is tolerable) can still give high patient satisfaction scores. Pain management is much more than managing the pain; it is also about managing the perceptions. Choosing the right words is as important as choosing the right medications. Why should you Attend: The inability to clearly understand all facets of pain management could lead to disaster on many levels. Improper communication about pain could lead to patient mismanagement and devastating consequences, including serious medical issues and death.
  • 25 Request Info

    Simple Compliance Steps for Email and Texting to Save Providers from Serious, Widespread HIPAA Violations

    Overview: The HIPAA Rules and HHS/OCR guidance provide a simple, easy to use 3 Step Safe Harbor for using unencrypted email and text messaging to engage patients. This session will explain the 3 Step HIPAA Safe Harbor. The secret is - HIPAA Rules are easy to follow, step-by-step - when you know the steps. Why should you Attend: Patient Engagement is a cornerstone of effective patient care. Communication technology offers indispensable patient engagement tools. Secure patient portals are available. So are encrypted text message and email products. But patients overwhelmingly choose non-secure communication tools like text messaging and email. Appointment reminders, healthcare instructions, patient satisfaction surveys, health and wellness newsletters and recall reminders are just a few patient engagement tools sent electronically by regular (unencrypted) email and text messaging.
  • 26 Request Info

    Structuring and Auditing Medical Director Arrangements: Key Stark Law Considerations

    Overview: In this session Mr. Wolfe will provide an overview of the Stark Law, including its recent changes. He will also discuss best practices for negotiating and drafting administrative arrangements on behalf of health systems, hospitals, medical groups and physician practices. The webinar will focus on regulatory requirements, key provisions, valuation considerations and potential pitfalls that should be avoided. Why should you Attend: As health care organizations and physicians develop administrative arrangements, they must manage their compliance and enterprise risk by ensuring any new arrangements are defensible under the Stark Law. Prior to moving forward with any arrangement, the parties should carefully evaluate whether the proposed structure and financial terms support compliance with Stark's technical requirements and key tenets of defensibility so they will be prepared to mount a defense in the event the arrangement is ever challenged.
  • 27 Request Info

    3-Hour Virtual Seminar - Reporting HIPAA Breaches: Protection and Prevention

    Overview: Everyone in the healthcare industry knows about HIPAA (the Health Insurance Portability and Accountability Act), that has been in effect since 1996. The goal of the legislation was fairly simple - to safeguard our patient health information. The law dictated to entities how to protect health information (PHI), how it can be shared, when it can be shared, and with whom it can be shared. To date, even the best of healthcare organizations struggle with feeling confident that they have all the required areas covered to protect and prevent HIPAA violations from occurring in their organization. It is well documented that by initiating proper training and implementing effective monitoring tools, HIPAA violations can be reduced or more readily identified in the workplace. Often there is not clear communication to employees about "what constitutes a HIPAA breach" and how can this be reported in your organization without "fear of retaliation."
  • 28 Request Info

    How People with Depression Think - How to Help

    Overview: Humans are thinking machines and most people have similar thought processes. Most people have reasonable, measured, moderate thoughts. And while there are many variations on this theme, these thoughts occur on a bell curve with most people being in the meaty part of the curve. Those with major depressive disorder (major depression), however, often have very extreme thoughts and their thought processes often exist on the very far ends of the bell curve. This can make understanding how a person with major depression acts very challenging as these actions are driven by thought processes the average person doesn't experience. While these thoughts may seem “crazy” at first, it's important to realize that these thoughts are simply an extreme part of the human experience that do fall along a continuum that is experienced by everyone.
  • 29 Request Info

    Auditing Physician Contracts for Compliance With the Stark Law and Anti-Kickback Statute

    Overview: In this session Mr. Wolfe will provide an overview of the Stark Law and Anti-Kickback Statute. He will also discuss best practices for auditing physician contracts on behalf of health systems, hospitals, medical groups and physician practices. The webinar will focus on regulatory requirements, key provisions, valuation considerations and potential pitfalls that should be avoided. Why should you Attend: This webinar will offer best practices for implementing and auditing physician contracts to minimize liability and penalties. Areas Covered in the Session: Provide a general Stark and Anti-Kickback Overview Examine critical regulatory requirements related to physician compensation arrangements Review processes for documenting fair market value and commercial reasonableness Discuss best practices for auditing physician compensation arrangements and potential pitfalls Discuss how to resolve issues that may arise during the audit process
  • 30 Request Info

    Structuring and Auditing Physician Employment Agreements to Comply with the Stark Law and Anti-Kickback Statute

    Overview: In this session Mr. Wolfe will provide an overview of the Stark Law and Anti-Kickback Statute. He will also discuss best practices for structuring, negotiating physician employment agreements. The webinar will focus on regulatory requirements,key provisions, valuation considerations and potential pitfalls that should be avoided. Why should you Attend: As health care organizations and physicians develop their employment arrangements, they must ensure the employment and compensation structures are defensible under the Stark Law and Anti-Kickback Statute. In this webinar Mr. Wolfe will describe how to develop employment structures and financial terms that comply with the technical regulatory requirements and key tenets of defensibility (fair market value, commercial reasonableness, etc.) to manage risk.
  • 31 Request Info

    Topical Wound Triage for Dressing Selection

    Overview: This lecture helps to unpack the basic decision-making algorithm required when deciding what wound product to place on a wound bed. The webinar divides products into absorbers and hydrators that can wick, fill, or cover wound beds depending on the wound presentation. Understanding the basic product features by category empowers the clinician to make wound care decisions that fit the presentation, frequency of wound care needed, and obstacles to consider like incontinence contamination. Why should you Attend: Wound dressing change products are ever-changing and expensive. Understanding basic categories helps with decision-making based on wound presentation regardless of the formulary constraints.
  • 32 Request Info

    Key Considerations When Buying or Selling Physician Practices

    Overview: In this session Mr. Wolfe will provide an overview of the Stark Law, including its 2016 changes. He will also discuss best practices for negotiating and drafting physician practice acquisition arrangements on behalf of health systems, hospitals, medical groups and physician practices. The webinar will focus on regulatory requirements, key provisions, valuation considerations and potential pitfalls that should be avoided. Why should you Attend: As health care organizations and physician practices pursue acquisition strategies and transition to more innovative post-transaction models, they must manage their compliance and enterprise risk by ensuring any new arrangements are defensible under the Stark Law.
  • 33 Request Info

    What is the Government Looking for In a HIPAA Audit

    This lesson will be addressing how practice/business managers (or compliance offers) need to get their HIPAA house in order as HIPAA is now fully enforced and the government is not using kid gloves any more.
  • 34 Request Info

    Key Legal Considerations When Redesigning your Physician Compensation Plans

    Overview: In this session Mr. Wolfe will provide an overview of the Stark Law, including its technical requirements and key tenets of defensibility. He will also discuss best practices for structuring evaluating and structuring new compensation models. The webinar will focus on regulatory requirements, key provisions, valuation considerations and potential pitfalls that should be avoided. Why should you Attend: As health care organizations redesign their compensation plans, they must be sure the process they follow and the models the new models they develop are defensible under the Stark Law. In this webinar Mr. Wolfe will discuss developing best practices and how to evaluate whether a new compensation model is compliant with Stark's technical requirements and key tenets of defensibility.
  • 35 Request Info

    GDPR - How to Comply as an American Business or Healthcare Entity

    Overview: This lesson will be addressing the specifics on how American businesses and healthcare organizations need to quickly get on the task of compliance with the European Union's (EU) new General Data Protection Regulation (GDPR). In addition, this webinar will address how to best accomplish compliance with GDPR and also understand how to assess risks and exposure specifically to American organizations and healthcare. We will be going through a breakdown of what policies are necessary for compliance, new required consent forms, right of erasure, EU definition of sensitive data, duties of the Data Protection Office, and much more relating to how data is collected and the responsibilities of the American organization. To continue to do business in the EU, most companies will have to implement additional privacy protections and adopt end-to-end data protection strategies.
  • 36 Request Info

    Structuring Physician Leases Under the New Stark Rules

    Overview: In this session Mr. Wolfe will provide a general Stark Law overview. He will also discuss best practices for auditing existing space lease arrangements and for implementing new time-share arrangements under the new 2016 Stark rules. Why should you Attend: Given the substantial awards and settlements in recent Stark Law enforcement actions, Stark Law compliance has become more than just a compliance issue: it is an enterprise risk management issue. As medical groups, hospitals, and health systems pursue integration strategies and transition to more innovative hospital-physician arrangements, these organizations must manage their compliance and enterprise risk by ensuring their compensation arrangements are defensible under the Stark Law.
  • 37 Request Info

    How to Perform a HIPAA Risk Assessment and Write Policies

    Overview: I will show how to conduct a PROPER risk assessment point by point and how to also avoid scams in the market. We will also be discussing the absolute importance of doing a risk assessment and that this is the first thing the OCR will ask for. I will instruct the listeners on how to write proper policies and procedures which are to be based upon the findings of the risk assessment and how to word the policies to satisfy the Fed. We will also discuss the importance of having policies which are consistent with your procedures and also discuss the negative ramification of cookie cutter templates in the eyes of the Fed. Why should you Attend: Have your done a HIPAA Risk Assessment? Do you know a risk assessment is the first thing the Feds will ask for in an audit? Is your risk assessment adequate? Do you have written policies in place for every single one of the implementation specification of the HIPAA Security Rule (even ones that don't apply) - do you know this is required!!
  • 38 Request Info

    3-Hours Virtual Seminar - Reporting HIPAA Breaches: Protection and Prevention

    Everyone in the healthcare industry knows about HIPAA (the Health Insurance Portability and Accountability Act), that has been in effect since 1996. The goal of the legislation was fairly simple - to safeguard our patient health information. The law dictated to entities how to protect health information (PHI), how it can be shared, when it can be shared, and with whom it can be shared. To date, even the best of healthcare organizations struggle with feeling confident that they have all the required areas covered to protect and prevent HIPAA violations from occurring in their organization. It is well documented that by initiating proper training and implementing effective monitoring tools, HIPAA violations can be reduced or more readily identified in the workplace. Often there is not clear communication to employees about "what constitutes a HIPAA breach" and how can this be reported in your organization without "fear of retaliation."
  • 39 Request Info

    What is the Government Looking for In a HIPAA Audit

    This lesson will be addressing how practice/business managers (or compliance offers) need to get their HIPAA house in order as HIPAA is now fully enforced and the government is not using kid gloves any more. It will also address major changes under the Omnibus Rule and any other applicable updates for 2016 and beyond. There are an enormous amount of issues and risks for covered entities and business associates these days. I will speak on specific experiences from over 17 years of experience in working as an outsourced compliance auditor as well as working directly with auditors used by Health and Human Services and dispel myths vs realities. I will go over steps to take to avoid an audit or survive an audit. I have also served as expert witness on legal cases involving HIPAA violations, and I will thoroughly explain how patients are now able to get cash remedies for wrongful disclosures of private health information (which leads to more audits).
  • 40 Request Info

    Webinar On Reimbursement Explained

    Healthcare reimbursement systems can be complex and difficult to understand. Each payor may use a different method to reimburse providers, or they may use a variation of a commonly used method. This course will provide a foundation for understanding the common reimbursement systems in use today. We start with Medicare's reimbursement systems of RBRVS, DRGs, and APCs because many other payors use modified versions of these systems. We then discuss other payor types such as HMOs, PPOs, and ACOs and how these organizations use other reimbursement methods such as capitation, per diems, and carve outs. Finally, we discuss the key data elements needed to adjudicate claims according to each scheme, and we discuss the financial incentives (and disincentives) associated with each method.