Health and Environment Training Classes

If you can't find what you want, Ask Us.

Refine Your Results

reset

Filter by Category

Location

Dates

FEATURED VENDORS

Showing 1-20 of 1377 results Sort by:

Courses

  • 1 Request Info

    Make Your FDA Inspection as Painless as Possible

    In this session will be the limits of FDA's scope during an inspection, including what documents you are not required to show them, and the permissibility of photographs and affidavits. Without adequate preparation and cross-functional communication, it is difficult to manage a good FDA inspection. Your goal is to illustrate your firm is in substantial compliance with all regulations, but also to respond to the inspector's questions or concerns in a timely manner. This webinar will identify systems and processes, and recommended tactics, to make the inspection as painless as possible.
  • 2 Request Info

    Understanding and Meeting your Regulatory and Processing Responsibilities

    The course will include the current review and enforcement climate within FDA and the manner, in which Drug Master Files (DMFs) are reviewed by FDA personnel. Besides the US, the use of DMFs in the EU, Japan, Canada and Australia will also be discussed. Similarities and differences to the U.S. system will be highlighted. The conversion of paper to e-filings requirements with FDA will also be discussed. The process used for e-filings will be reviewed in detail. Maintaining filings for Annual Reports and DMF Amendments will also be covered.
  • 3 Request Info

    The Interplay of the Americans With Disabilities Act

    The intersecting of these three laws is complicated and open to problems if not handled correctly. ADA, FMLA and Workers Compensation have different goals and protections for employees, yet all three have provisions that may require an employer to give job-protected time off when the right circumstances are met.
  • 4 Request Info

    MIPS Risk Assessment - What, How, Why?

    Overview: Whatever the reason: MIPS or Meaningful Use the risk assessment is a foundational tripwire to you getting your reimbursement check. This risk assessment is a HIPAA risk assessment and is required every year, just like taxes. Skip it and, 5 years later, you can get that request for more information or pay back the money they gave you. How much was that check? $5000? Avoid having to pay back all of that money by doing your risk assessment each year.
  • 5 Request Info

    Conducting a Behavioral Health Risk Assessment

    Overview: There are some unique challenges to identifying the most significant compliance risks in the delivery of behavioral health services. This presentation will address both the risk assessment process and the specific risk areas associated with behavioral health.
  • 6 Request Info

    HIPAA Texting, Emailing, and Personal Devices - New Guidance

    Overview: This 90-minute webinar will be going into great detail regarding you practice or business information technology and how it relates to the HIPAA/HITECH Security Rule and securing PHI in transmission. I will go through multiple examples and specific scenarios and also offer simple common-sense solutions. Areas covered will be texting, email, encryption, medical messaging, voice data, personal devices, and risk factors. I will uncover myths versus reality as it relates to this very enigmatic law based on over 1000 risk assessments performed as well as years of experience in dealing directly with the Office of Civil Rights HIPAA auditors.
  • 7 Request Info

    How to do a HIPAA Risk Analysis

    Overview: This lesson is designed to enable your Organization to perform a complete Risk Analysis of all PHI it creates, receives, maintains or transmits in any format. You will understand and identify threats, vulnerabilities and risks to your organization's PHI wherever it is located. Explain HIPAA Risk Analysis clearly and simply for staff of Covered Entities and Business Associates tasked with doing a HIPAA Risk Analysis who are not members of "the computer security community" Clarify and follow NIST methods without confusing jargon and complexity Cover Risk Analysis of all PHI - not just electronic PHI Demonstrate an interactive, intuitive method for completing the Risk Analysis and creating a Risk Management Program to help you jump start compliance
  • 8 Request Info

    HIPAA, Consents, and 42 CFR Part 2 - Tracking the Release of Information Under Conflicting Rules

    Overview: For much of healthcare, HIPAA sets the standards for how to manage uses and disclosures of patient information, known as Protected Health Information (PHI). But when it comes to information related to the treatment of substance use disorders, regulations of the Substance Abuse and Mental Health Services Administration (SAMHSA) under 42 CFR Part 2 prevail, including rigorous controls on the release and re-release of patient information.
  • 9 Request Info

    Secure Messaging - How to Email and Text in the World of HIPAA

    Overview: One errant email or text message can cost you tens of thousands of dollars in HIPAA fines and penalties and it doesn't matter who you're communicating with: patients, staff, providers or with insurance carriers. A violation is a violation. And if you think it couldn't happen to you, think again. Text and email HIPAA violations are not always caused by what you might think. For example, you may think you are safe as long as you don't text patients - you're wrong. Many violations generally occur between providers messaging their staff. You can avoid getting hit with a HIPAA audit and violations with a few simple changes to your current processes. But you have to be able to identify the danger zones. National HIPAA expert, John Brewer, will walk you through how to escape being hit with HIPAA emailing and texting violations.
  • 10 Request Info

    Physician Employment Agreements: Items to Consider

    Overview: We will review the various elements of the physician employment agreement, focusing on the pitfalls and the problems that can develop when the agreement does not clearly define the relationship, and/or when the parties do not fully understand what is being agreed to.
  • 11 Request Info

    Principles of Web Design for the Healthcare Industry

    Overview: A brief review of the basic principles of solid web design. Awareness of the possible compliance standards, including ADA, HIPAA, GDPR and FCC. Fundamentals of marketing: SEO, messaging, continuity Education on how to find the right experts for creating or improve a healthcare website, including functionality and design.
  • 12 Request Info

    Designing Stark Compliant Physician Compensation Models

    In this program, we will review the physician anti-referral laws (Stark I and II), provide an in-depth discussion of physician employment contracting, review the relevant Stark exceptions and discuss how physician compensation models can be in compliance with the Stark prohibitions. Why you should attend This session is designed for health care executives, physicians and other health care providers who participate in and receive remuneration from Medicare, Medicaid, and other federal health care programs such as TriCare. Several recent cases bring home the realization that Stark II (the physician anti-referral law) is alive, still with us and as viable as ever, and it can be used as the basis of a False Claims Act action.
  • 13 Request Info

    Boot Camp - Cracking the Code to Healthcare Billing, Coding and Reimbursement

    This course covers the fundamentals of medical billing, coding, and reimbursement by explaining how all of these components work together. Emphasis will be placed on the practical application of the latest industry knowledge and standards, with the goal of helping those who work with medical claims and claims data stay ahead of the game. Participants will learn about the following: The claim flow process from registration through adjudication and payment How physicians and hospitals set and manage charges.
  • 14 Request Info

    The Family and Medical Leave Act, and Workers' Compensation

    Legal compliance can get confusing when some legal regulations seemingly overlap or even seem almost contradictory to implement. This is the case when the Americans with Disabilities Act (ADA), the Family and Medical Leave Act (FMLA), and Workers’ Compensation intersect. The intersecting of these three laws is complicated and open to problems if not handled correctly. ADA, FMLA and Workers Compensation have different goals and protections for employees, yet all three have provisions that may require an employer to give job-protected time off when the right circumstances are met. It's essential for employers to understand Federal and State laws with respect to these three laws in order to be compliant. The majority of unscheduled and scheduled absences are related to the illness of employees or their family members. Under those circumstances, one, both, or all three of these laws may be involved.
  • 15 Request Info

    Privacy and Security Challenges in Integrated Care

    Overview: This presentation will cover the challenges of maintaining information privacy and security presented by the shift to an integrated model of health care. Why should you Attend: A lack of familiarity with the differences in privacy and security statutes and regulations exposes behavioral health care providers to significant legal, financial and reputational risk. Areas Covered in the Session: What is the Rationale for Integrated Care What is the need for Health Information Exchanges Privacy Isues Security Issues Implementation Challenges Who Will Benefit: Compliance, Privacy and Security Officers Tim Timmons - MentorHealthSpeaker Profile Tim Timmons Following 25 years as a hospital financial manager and administrator, Tim has spent the past eighteen years assisting behavioral health organizations, hospitals, physician practices and home health agencies with the implementation of ethics and compliance programs.
  • 16 Request Info

    Federal Requirements for Interoperability - New Directions for EHRs, Patient and Provider Data

    Overview: In March 2019, the Department of Health and Human Services issued proposed rules to give providers and patients access to the electronic data stored in EHRs and health plans. These rules require specific technology (APIs using the HL7 Fast Healthcare Interoperability Resources, or FHIR) to be built into all EHRs for providers. Using this technology, vendors can build applications to access EHRs from providers and get specific clinical data for use by other providers and by patients.
  • 17 Request Info

    Let's Make The "Call" Together: Cell Phones and HIPAA

    In this webinar you will learn how to maximize the advantages of a digital tool that can allow employees to do more on the go without violating their patients’ HIPAA rights, Also learn how to use your smart phone responsibly is necessary for smart healthcare practice in regards to the HIPAA Privacy Rule.
  • 18 Request Info

    HIPAA Texting and Emailing: Do's and Don'ts

    This lesson will explain new changes going on at Health and Human Services as it relates to enforcement of HIPAA for both covered entities and business associates as it relates to portable devices, texting, and emailing of PHI.
  • 19 Request Info

    Behavioral Health in the Digital Age Ethical and Risk Management Issues

    This webinar will include "must have"information that will be provided by Dr. Frederic Reamer, who chaired several national and international projects that developed state-of-the-art standards related to practitioners' use of technology.
  • 20 Request Info

    HIPAA and the Security Officer

    This webinar will address major changes under the Omnibus Rule and any other applicable updates for 2019.