Healthcare

If you can't find what you want, Ask Us.

Refine Your Results

reset

Filter by Category

Location

Dates

FEATURED VENDORS

Showing 1-20 of 1319 results Sort by:

Courses

  • 1 Request Info

    New HIPAA Rules for Text Messaging & Email

    Overview: There is a simple 3 step HIPAA "safe harbor" that frees Covered Entities and Business Associates from any responsibility or liability for unauthorized access to Protected Health Information (PHI) in unencrypted emails and text messages during transmission and after receipt by the patient. Why you should Attend: Patient Engagement is a cornerstone of MACRA. Communication technology offers indispensable patient engagement tools. Secure patient portals are available. So are encrypted text message and email products. But patients overwhelmingly choose non-secure communication tools like text messaging and email. Appointment reminders, healthcare instructions, patient satisfaction surveys, health and wellness newsletters and recall reminders are just a few patient engagement tools sent electronically by regular (unencrypted) email and text messaging. The HIPAA Rules for sending Protected Health Information (PHI) by unencrypted electronic transmission are clear - and new.
  • 2 Request Info

    Incident to Billing Services

    Overview: Incident-to coding for your non-physician practitioners (NPPs) services in conjunction with a supervising physician continues to generate confusion- and 2019 will be no exception. So, it's no surprise that these claims generate higher than average denials, and lead to hefty penalties for physician practices ranging from $163K to $1.5 million - but they don't have to. Obviously, being paid 100% vs. 85% for your NPPs services is the goal. However, correctly maneuvering through complex incident-to guidelines so you can avoid audits and fines is anything but easy. That's where expert coder, Rhonda Granja, B.S., CMC, CMOM, CMA, CPC, comes in. Rhonda has put together a 60-minute training session to help you cut through the confusion of these difficult coding situations.
  • 3 Request Info

    Serious Legal and HIPAA Consequences of Improper EMR-EHR Usage

    Overview: I will address specific litigated cases I have worked where the covered entity had to pay out nasty fines to the Federal government and high settlements to patients affected by inappropriate usage of the EMR system. I will also address situations where the covered entity DID NOT receive any fines or judgements (even in the event of a breach or malicious actions) due to the fact they were using the systems in a "compliant manner".
  • 4 Request Info

    Problems with Aging Physicians

    Overview: Practicing medicine is not like other jobs that have a tradition of retirement at age 65. Physician shortages fuel support for physicians seeking to continue their careers indefinitely. Patient safety is paramount, but is it served by applying an age limit to medical staff membership and clinical privileges? If so, what is the magic number? Why you should Attend: Can medical staffs and hospitals place restrictions on physicians based on age? Should hospitals and medical staffs place restrictions on physicians based on age? Can physicians sue, alleging discrimination and civil rights violations?
  • 5 Request Info

    De-Identification of PHI under HIPAA - Follow the Guidance to Avoid Penalties

    Overview: Today health information needs to be shared more than ever, but how can that be done most easily within the limits of HIPAA? One way is to de-identify the information. Once PHI has been de-identified, it is no longer protected under HIPAA and may be shared freely without limitation. The problem is that it is not easy to truly de-identify information and if it is not done correctly, the sharing of the information may be considered a breach that requires reporting to HHS and the potential for penalties and corrective action plans. De-identification of Protected Health Information requires removing all eighteen of the listed identifiers, or anything else that might be used to identify the individual about whom the information exists. Or you can have an expert certify that the information is not identifiable. But neither of these is foolproof. You need to look more closely to be sure the data cannot be identified.
  • 6 Request Info

    How to do a HIPAA Risk Analysis

    Overview: This lesson is designed to enable your Organization to perform a complete Risk Analysis of all PHI it creates, receives, maintains or transmits in any format. You will understand and identify threats, vulnerabilities and risks to your organization's PHI wherever it is located. Explain HIPAA Risk Analysis clearly and simply for staff of Covered Entities and Business Associates tasked with doing a HIPAA Risk Analysis who are not members of "the computer security community" Clarify and follow NIST methods without confusing jargon and complexity Cover Risk Analysis of all PHI - not just electronic PHI Demonstrate an interactive, intuitive method for completing the Risk Analysis and creating a Risk Management Program to help you jump start compliance
  • 7 Request Info

    Cloud Computing and Telehealthcare - Things to Consider

    Overview: The advent of COVID-19, though tragic, will be the backdrop for this webinar, which will cover the specific points of how cloud is a unique vehicle to use for normal on-prem operations while facilitating a smooth transition to telework or telehealth operations, and how this enables almost seamless business continuity when conditions force migration from “inhouse-to-telework-back-to-inhouse” operations. The major take-away will be how a strategic plan for cloud adoption can be integrated with operations continuity during times like this to keep everything running and address patient needs {almost} without missing a step.”
  • 8 Request Info

    HIPAA Compliant Fundraising: What You Need to Know, What You Need to Do

    Overview: In 2013, The US Department of Health and Human Services made major changes to rules implementing The Health Insurance and Portability Act of 1996 (HIPAA) and Health Information Technology for Economic and Clinical Health Act of 2003 (HITECH). Among the many areas impacted by these rules (billing, marketing, research, IT security, etc.) is fund raising. The amendments significantly modify the methods and practice that hospitals, their institutionally related foundations, and other healthcare charities may or must employ when using ANY patient or client information for fund raising. The webinar will cover how to effectively implement the fund raising regulations in a manner that increases both opportunities for philanthropic support and compliant implementation of the new mandates. The rules include specific operational requirements, some of which prohibit protocols that were required under the original HIPAA regulations.
  • 9 Request Info

    3-Hour Virtual Seminar on HIPAA Texting and E-mailing

    Overview: This lesson will be going into great detail regarding you practice or business information technology and how it relates to the HIPAA/HITECH Security Rule and securing PHI in transmission. I will go through multiple examples and specific scenarios and also offer simple common-sense solutions. Areas covered will be texting, email, encryption, medical messaging, voice data, personal devices, and risk factors. I will uncover myths versus reality as it relates to this very enigmatic law based on over 1000 risk assessments performed as well as years of experience in dealing directly with the Office of Civil Rights HIPAA auditors. I will speak on specific experiences from over 17 years of experience in working as an outsourced compliance auditor, expert witness on multiple HIPAA cases in state law, and thoroughly explain how patients are now able to get cash remedies for wrongful disclosures of private health information.
  • 10 Request Info

    HIPAA and the IT Manager

    Overview: This lesson will be going into great detail regarding the practice or business information technology and how it relates to the HIPAA Security Rule, in particular portable devices. Areas covered will be texting, email, encryption, medical messaging, voice data and risk factors as they relate to personal devices. I will uncover myths versus reality as it relates to this very enigmatic law based on over 1000 risk assessments performed as well as years of experience in dealing directly with the Office of Civil Rights HIPAA auditors. I will speak on specific experiences from over 17 years of experience in working as an outsourced compliance auditor, expert witness on multiple HIPAA cases, and thoroughly explain how patients are now able to get cash remedies for wrongful disclosures of private health information. More importantly I will show you how to limit those risks by simply taking proactive steps and utilizing best practices.
  • 11 Request Info

    Healthcare and Automation - Not Smarter Machines: Smarter Man-Machine Processes

    Overview: Healthcare is often driven by factors extraneous to but impacting on care delivery: regulation, revenue cycle, supplychain and many others. Now, enter IT automation as a companion driving force - no longer in the business office but out on the floors. Old news, but still a problem that needs to be addressed: how to best integrate it smoothly. Why you should Attend: There are many examples of successful EMR, HIE, and other automation implementations within American healthcare. There are also many examples of projects not going according to plan, with the attendant cost-overruns and missed schedule dates. Equally important is that even the dates that are met often don't deliver as promised.
  • 12 Request Info

    HIPAA Waivers During COVID-19

    Overview: This webinar will review the sections of the HIPAA privacy rule that under the federal emergency for COVID-19 declared in March will be under a waiver issued by the OCR and penalties will be waived. HIPAA, as a whole, is still being monitored however and the webinar will also include those areas that are still being enforced and what you need know, whether you are a covered entity or a business associate. Why you should Attend: There are many portions of the HIPAA Privacy Rule in which enforcement by the Office of Civil Rights (OCR) are going to be waived. This Webinar will explain these waivers by the OCR and how they may affect covered entities and business associates. Areas Covered in the Session: Brief review of HIPAA Privacy Rule Parts of the rule affected by waivers Parts of the rule still in full effect
  • 13 Request Info

    Home Health OASIS-D1 Functionality Items and PDGM

    Overview The few, specific OASIS-D1 items that affect payment under the PDGM payment model are a gold mine for securing fair payment. That is, if OASIS-completing clinicians are OASIS-accuracy-savvy. Informed clinicians will capture a patient’s full impairment at Start of Care and capture changes, as well as status at discharge. Result - fair payment each 30-day period and stellar scores on Home Health Compare. Uninformed clinicians may fail, causing the agency to leave deserved money on the table as well as to appear sub-standard on Home Health Compare. Your clinicians and leaders need this education. Give them the tools they need to make your agency succeed.
  • 14 Request Info

    Healthcare and Automation - Not Smarter Machines: Smarter Man-Machine Processes

    Overview: Healthcare is often driven by factors extraneous to but impacting on care delivery: regulation, revenue cycle, supplychain and many others. Now, enter IT automation as a companion driving force - no longer in the business office but out on the floors. Old news, but still a problem that needs to be addressed: how to best integrate it smoothly.
  • 15 Request Info

    Cloud Computing and Telehealthcare - Things to Consider

    Overview: The advent of COVID-19, though tragic, will be the backdrop for this webinar, which will cover the specific points of how cloud is a unique vehicle to use for normal on-prem operations while facilitating a smooth transition to telework or telehealth operations, and how this enables almost seamless business continuity when conditions force migration from “inhouse-to-telework-back-to-inhouse” operations. The major take-away will be how a strategic plan for cloud adoption can be integrated with operations continuity during times like this to keep everything running and address patient needs {almost} without missing a step.”
  • 16 Request Info

    HIPAA 2020: Texting, Emailing, And Personal Devices - New Guidance

    Professional communications involving Protected Health Information must be conducted securely, according to guidance from HHS and any reasonable Risk Analysis required by the Security Rule, so any office communications must be carefully controlled to avoid breaches of PHI.
  • 17 Request Info

    3-Hour Virtual Seminar on HIPAA Security and Breach Rule Compliance- Understanding Risk Analysis, Policies and Procedures and Managing Incidents

    Overview: This seminar is designed to provide intensive training in HIPAA Security and Breach Notification Rule compliance designed for both the seasoned HIPAA professional as well as the individual newly appointed to the position of HIPAA Security Officer. The session begins with a detailed examination of HIPAA Security Rule and Breach Notification requirements, including what you need to do to protect information and what you have to do if you don't.
  • 18 Request Info

    3-Hour Virtual Seminar on HIPAA Privacy Rule Compliance-Understanding New Rules and Responsibilities of Privacy Officer

    Overview: This session is designed to provide intensive training in HIPAA Privacy Rule compliance designed for both the seasoned HIPAA professional as well as the individual newly appointed to the position of HIPAA Privacy Officer. The session begins with overview of the HIPAA regulations and then continues with presentation of the specifics of the Privacy Rule, such as Individual Rights and Uses & Disclosures, and recent and expected changes to HIPAA and other rules such as 42 CFR Part 2 regarding Substance Use Disorder information, including the impacts of required changes in your practices to meet the rules.
  • 19 Request Info

    6-Hour Virtual Seminar on Auditing Analytical Laboratories for FDA Compliance

    There are two phases to this topic. The first is auditing itself. Good audits are well structured. They must consider the reasons for the audit, the regulatory requirements, as well as the nature of the laboratory being audited. We will discuss the considerations that must be made when auditing a laboratory. The social interactions that must be expected, the nature of the regulatory requirements and the nature of work that the laboratory performs will be discussed. The second phase considers what must be considered during the audit itself. Audits conducted by inexperienced or ignorant auditors are often worthless, wasting the time and money of both the auditors and the laboratory being audited. Auditors who are familiar with laboratory operations are needed as it is easy to be fooled into thinking that a non-compliant laboratory is operating normally.
  • 20 Request Info

    6-Hour Virtual Seminar - The New EU Medical Device Regulation

    In 2012, the Commission adopted a package of measures on innovation in health. The package consisted of a Communication and two regulation proposals to revise existing legislation on general medical devices and in vitro diagnostic medical devices. In particular, the Directives on active implantable medical devices (90/385/EEC) and on medical devices (93/42/EEC) are intended to be replaced by a Regulation on medical devices, while the Directive on in-vitro diagnostic medical devices (98/79/EC) is intended to be replaced by a Regulation on the same subject.