Education Training Courses

If you can't find what you want, Ask Us.

Refine Your Results

reset

Filter by Category

Location

Dates

FEATURED VENDORS

Showing 1-20 of 735 results Sort by:

Courses

  • 1 Request Info

    Controlling Human Error in the Manufacturing Floor

    Overview: Human error is known to be the major cause of quality and production losses in many industries. Although it is unlikely that human error will ever be totally eliminated, many human performance problems can be prevented. Human errors start at the design stage. From procedures, training, and workplace environment many variables that affect human behavior CAN be manipulated reducing the likelihood of these occurrences. To work with these challenges it is really important to understand human behavior and the psychology of error as well as understand exactly where the systems weaknesses are, so they can be improved and/or fixed. This course offers practical approaches and models to address human performance issues in GMP related environments by using a specific methodology to correct, prevent and avoid re-occurrence of these issues.
  • 2 Request Info

    Travel and Entertainment Expenses: Expense Reimbursement Fraud

    Overview: This training program will address why internal controls over travel and entertainment (T&E) expenditures are a critical component of the control environment. Although the topic of travel and entertainment abuse is not one that management likes to address, it is a very important indicator of the adequacy of a company's control environment.
  • 3 Request Info

    PMDA Look for When Conducting cGMP Regulatory Inspections

    Overview: This webinar will cover the key areas of how ICH Q7 was established, it's goals and objectives, expectations of the healthcare authorities involved and practical differences that you will experience in a GMP inspection of a facility by FDA, an EU Competent Authority or PMDA.. After this event, you will be fully prepared for cGMP regulatory inspections in those countries.
  • 4 Request Info

    Assay Validation According to CLSI Guidelines 2018

    Overview: Bioassay development and validation is very critical in pre-clinical drug discovery, clinical biomarker and translational research, diagnostic product (including companion diagnostic) development. In this presentation, overview if given for the terminologies, the scientific principles, and the regulatory guidelines that are related to assay validation. Then each of the assay performance characteristics (specificity, sensitivity, accuracy, precision, linearity, stability, reportable range, reference range) will be explained in terms of experimental design and statistical analysis.
  • 5 Request Info

    European Privacy Regulation what and how in 2018

    Overview: The GDPR (General Data Protection Regulation) compels companies that process Personally Identifiable Information (PII) of European citizens to demonstrate their insight in all PII processing in their business. After assessment by a Data Protection Officer (DPO), they should implement appropriate organizational and technical controls.
  • 6 Request Info

    That your Supplier can meet all your Expectations

    Overview: This training program will provide participants with a working knowledge of supplier audits. The why, when, who, how, and what of conducting a supplier audit will be reviewed to ensure that your supplier can meet all your expectations. When contemplating the use of a supplier you would normally have many requirements and expectations that must be met. These include technical, regulatory, quality, responsiveness, location, readiness, and those less defined but critical. One of the tools at your disposal to verify the supplier’s acceptability is to audit the operation.
  • 7 Request Info

    Hiring & Firing: A Risky Business

    This lecture will help business owners, and specifically health care business and practice owners learn to look beyond the candidate resume. It is all well and good to select candidates that have the right credentials and experience for a position, but there is much more that must be considered when adding a new employee to your practice. For example, if those candidates will not mesh well with other members of your practice or if they will not have enough work available to them to keep them happy in their new position - hiring the candidate may be a disaster from day one. Employers must be careful to consider broader issues when hiring without considering any aspects of the candidate that an employer may be prohibited from considering under the law.
  • 8 Request Info

    Secure Messaging - How to Email and Text in the World of HIPAA

    Overview: One errant email or text message can cost you tens of thousands of dollars in HIPAA fines and penalties and it doesn't matter who you're communicating with: patients, staff, providers or with insurance carriers. A violation is a violation. And if you think it couldn't happen to you, think again. Text and email HIPAA violations are not always caused by what you might think. For example, you may think you are safe as long as you don't text patients - you're wrong. Many violations generally occur between providers messaging their staff. You can avoid getting hit with a HIPAA audit and violations with a few simple changes to your current processes. But you have to be able to identify the danger zones. National HIPAA expert, John Brewer, will walk you through how to escape being hit with HIPAA emailing and texting violations.
  • 9 Request Info

    HIPAA, Ransomware & Cyber Criminal Chaos - Prepare, Prevent, Respond and Recover

    Overview: This webinar will explain about Ransomware attack on a Covered Entity or BA that encrypts PHI is presumed to be a HIPAA Breach according to the U. S. Department of Health and Human Services (HHS). Ransomware including new, more treacherous varieties used by cyber-criminals to attack the Healthcare Industry HIPAA Rules that apply to Ransomware attacks "Social Engineering" tricks criminals use to sneak Ransomware into Electronic Information Systems What to do if your organization suffers a Ransomware attack Best practices to: Prevent Prepare Respond Recover from Ransomware Attacks Why should you Attend: Healthcare is the biggest target for Ransomware attacks in 2017. New types of Ransomware are particularly dangerous. They not only lock up your information system - they steal Protected Health Information (PHI).
  • 10 Request Info

    The 5 most Dangerous Risks Under New HIPAA Laws

    Overview: This lesson will be addressing how practice/business managers (or compliance offers) need to get their HIPAA house in order as HIPAA is now fully enforced and the government is not using kid gloves any more.It will also address major changes under the Omnibus Rule and any other applicable updates for 2016 and beyond. There are an enormous amount of issues and risks for covered entities and business associates these days as it relates to patients ability to sue you and the Federal governments audit process. I will speak on specific experiences from over 17 years of experience in working as an outsourced compliance auditor, expert witness on HIPAA cases, and thoroughly explain how patients are now able to get cash remedies for wrongful disclosures of private health information. More importantly I will show you how to limit those risks by simply taking proactive steps and utilizing best practices
  • 11 Request Info

    Webinar On Incident to Billing Services

    Overview: Incident-to coding for your non-physician practitioners (NPPs) services in conjunction with a supervising physician continues to generate confusion- and 2018 will be no exception. So, it's no surprise that these claims generate higher than average denials, and lead to hefty penalties for physician practices ranging from $163K to $1.5 million - but they don't have to. Obviously, being paid 100% vs. 85% for your NPPs services is the goal. However, correctly maneuvering through complex incident-to guidelines so you can avoid audits and fines is anything but easy. That's where expert coder, Rhonda Granja, B.S., CMC, CMOM, CMA, CPC, comes in. Rhonda has put together a 60-minute training session to help you cut through the confusion of these difficult coding situations. Even if you don't see Medicare patients, you should still take note. Private carriers usually end up following suit with CMS at some point.
  • 12 Request Info

    Health Care Leasing 101: Learning the Basics to Stay Out of Trouble

    Overview: In this session Mr. Wolfe will provide an overview of the regulations that impact health care leases. He will also discuss best practices for negotiating and drafting leases on behalf of health systems, hospitals, medical groups and physician practices. The webinar will focus on regulatory requirements, key provisions, valuation considerations and potential pitfalls that should be avoided. Why should you Attend: As health care organizations develop leasing arrangements with referring physicians, it's critical that they understand the key business, legal and regulatory considerations and trends that Mr. Wolfe will discuss in this webinar. For example, a new exception for timeshare arrangements recently went into effect under the Stark Law.Any health care organizations looking to enter into a new timeshare leasing arrangement should understand the requirements of this new timeshare exception.
  • 13 Request Info

    How you are Violating HIPAA Every Day

    Covered entities and business associates have very specific requirements under the HIPAA Privacy Rule, HIPAA Security Rule and Breach Notification Rule. Enforced by the Office for Civil Rights (OCR) HIPAA appears to be constantly changing, not based on new regulations, but guidance and newsletters from the OCR, Office of the Inspector General, Office of National Coordinator and CMS. In addition, OCR adopts many of the publications from the National Institute of Standards and Technology (NIST). Without a clear understanding of how to apply the standards in your office, you will most likely be in violation of some aspect of HIPAA every day. Small matters such as not posting your Notice of Privacy Practices (NPP) in your waiting room or not listing electronic exchanges on your Notice.
  • 14 Request Info

    How to Perform a HIPAA Risk Assessment and Write Policies

    Overview: I will show how to conduct a PROPER risk assessment point by point and how to also avoid scams in the market. We will also be discussing the absolute importance of doing a risk assessment and that this is the first thing the OCR will ask for. I will instruct the listeners on how to write proper policies and procedures which are to be based upon the findings of the risk assessment and how to word the policies to satisfy the Fed. We will also discuss the importance of having policies which are consistent with your procedures and also discuss the negative ramification of cookie cutter templates in the eyes of the Fed. Why should you Attend: Have your done a HIPAA Risk Assessment? Do you know a risk assessment is the first thing the Feds will ask for in an audit? Is your risk assessment adequate? Do you have written policies in place for every single one of the implementation specification of the HIPAA Security Rule (even ones that don't apply) - do you know this is required!!
  • 15 Request Info

    Powerful Pain Management Strategies: Communication Tools to Successfully Assess Pain and Dramatically Increase Patient Satisfaction

    Overview: This session will provide specific and easy to implement strategies to help ALL clinicians, not just pain management specialists. Pain management is more than "passing meds." This session is not about different types of pain medications. Rather, it is about building a relationship with the patient and together finding the best method of managing pain. At times, healthcare professionals cannot completely remove all pain. However, even patients experiencing some pain (that is tolerable) can still give high patient satisfaction scores. Pain management is much more than managing the pain; it is also about managing the perceptions. Choosing the right words is as important as choosing the right medications. Why should you Attend: The inability to clearly understand all facets of pain management could lead to disaster on many levels. Improper communication about pain could lead to patient mismanagement and devastating consequences, including serious medical issues and death.
  • 16 Request Info

    Simple Compliance Steps for Email and Texting to Save Providers from Serious, Widespread HIPAA Violations

    Overview: The HIPAA Rules and HHS/OCR guidance provide a simple, easy to use 3 Step Safe Harbor for using unencrypted email and text messaging to engage patients. This session will explain the 3 Step HIPAA Safe Harbor. The secret is - HIPAA Rules are easy to follow, step-by-step - when you know the steps. Why should you Attend: Patient Engagement is a cornerstone of effective patient care. Communication technology offers indispensable patient engagement tools. Secure patient portals are available. So are encrypted text message and email products. But patients overwhelmingly choose non-secure communication tools like text messaging and email. Appointment reminders, healthcare instructions, patient satisfaction surveys, health and wellness newsletters and recall reminders are just a few patient engagement tools sent electronically by regular (unencrypted) email and text messaging.
  • 17 Request Info

    Structuring and Auditing Medical Director Arrangements: Key Stark Law Considerations

    Overview: In this session Mr. Wolfe will provide an overview of the Stark Law, including its recent changes. He will also discuss best practices for negotiating and drafting administrative arrangements on behalf of health systems, hospitals, medical groups and physician practices. The webinar will focus on regulatory requirements, key provisions, valuation considerations and potential pitfalls that should be avoided. Why should you Attend: As health care organizations and physicians develop administrative arrangements, they must manage their compliance and enterprise risk by ensuring any new arrangements are defensible under the Stark Law. Prior to moving forward with any arrangement, the parties should carefully evaluate whether the proposed structure and financial terms support compliance with Stark's technical requirements and key tenets of defensibility so they will be prepared to mount a defense in the event the arrangement is ever challenged.
  • 18 Request Info

    3-Hour Virtual Seminar - Reporting HIPAA Breaches: Protection and Prevention

    Overview: Everyone in the healthcare industry knows about HIPAA (the Health Insurance Portability and Accountability Act), that has been in effect since 1996. The goal of the legislation was fairly simple - to safeguard our patient health information. The law dictated to entities how to protect health information (PHI), how it can be shared, when it can be shared, and with whom it can be shared. To date, even the best of healthcare organizations struggle with feeling confident that they have all the required areas covered to protect and prevent HIPAA violations from occurring in their organization. It is well documented that by initiating proper training and implementing effective monitoring tools, HIPAA violations can be reduced or more readily identified in the workplace. Often there is not clear communication to employees about "what constitutes a HIPAA breach" and how can this be reported in your organization without "fear of retaliation."
  • 19 Request Info

    How People with Depression Think - How to Help

    Overview: Humans are thinking machines and most people have similar thought processes. Most people have reasonable, measured, moderate thoughts. And while there are many variations on this theme, these thoughts occur on a bell curve with most people being in the meaty part of the curve. Those with major depressive disorder (major depression), however, often have very extreme thoughts and their thought processes often exist on the very far ends of the bell curve. This can make understanding how a person with major depression acts very challenging as these actions are driven by thought processes the average person doesn't experience. While these thoughts may seem “crazy” at first, it's important to realize that these thoughts are simply an extreme part of the human experience that do fall along a continuum that is experienced by everyone.
  • 20 Request Info

    Structuring and Auditing Physician Employment Agreements to Comply with the Stark Law and Anti-Kickback Statute

    Overview: In this session Mr. Wolfe will provide an overview of the Stark Law and Anti-Kickback Statute. He will also discuss best practices for structuring, negotiating physician employment agreements. The webinar will focus on regulatory requirements,key provisions, valuation considerations and potential pitfalls that should be avoided. Why should you Attend: As health care organizations and physicians develop their employment arrangements, they must ensure the employment and compensation structures are defensible under the Stark Law and Anti-Kickback Statute. In this webinar Mr. Wolfe will describe how to develop employment structures and financial terms that comply with the technical regulatory requirements and key tenets of defensibility (fair market value, commercial reasonableness, etc.) to manage risk.