Importing FDA regulated products requires careful planning before you even start. Registration, product compliance, record and data submission must be exactly correct or your product will be detained.
Likewise, the U.S. Customs and Border Protection (CBP) must be precise or your entry is not going anywhere. Some mistakes are common, others reflect a lack of understanding of how FDA and Customs and Border Protection (CBP) operate a joint program.
This webinar will be addressing how IT managers (and HIPAA Security Offers) need to get their HIPAA house in order before the imminent audits occur.
It will also address major changes under the Omnibus Rule and any other applicable updates for 2019. Areas also covered will be texting, email, encryption, medical messaging, voice data and risk factors as they relate to IT.
This lesson will be addressing how practice/business managers (or compliance offers) need to ensure their organization is complying with the Federal Substance Abuse and Mental Health Administration (SAMHSA) regulations (42 CFR Part 2).
This lesson will cover the latest updates which were released in January 2018 and also cover multiple scenarios and FAQ's relating to Substance Abuse Records, Mental Health Records, Alcohol Abuse Records, and the proper ways to secure this information and/or release this information. An overview of a comparative analysis will be presented comparing SAMHSA to the HIPAA laws relating to protected health information in general.
This lesson will be addressing how practice/business managers (or compliance offers) need to get their HIPAA house in order as HIPAA is now fully enforced and the government is not using kid gloves any more.
It will also address major changes under the Omnibus Rule and any other applicable updates for 2019 and beyond. There are an enormous amount of issues and risks for covered entities and business associates these days.
Healthcare reimbursement systems can be complex and difficult to understand. Each payor may use a different method to reimburse providers, or they may use a variation of a commonly used method. This course will provide a foundation for understanding the common reimbursement systems in use today.
This course will cover the proper methodologies on conducting a HIPAA Risk Assessment based on the formula used by Federal auditors and via the guidelines of the NIST (National Institute of Standard for Technologies).
The course will also cover the most important aspects to be aware of in terms of the Federal auditing process as well as the new risks regarding patients suing for wrongful disclosures.
Practicing medicine is not like other jobs that have a tradition of retirement at age 65. Physician shortages fuel support for physicians seeking to continue their careers indefinitely. Patient safety is paramount, but is it served by applying an age limit to medical staff membership and clinical privileges?
If so, what is the magic number?
Why you should Attend: Can medical staffs and hospitals place restrictions on physicians based on age?
Should hospitals and medical staffs place restrictions on physicians based on age?
Can physicians sue, alleging discrimination and civil rights violations?
In 2013, The US Department of Health and Human Services made major changes to rules implementing The Health Insurance and Portability Act of 1996 (HIPAA) and Health Information Technology for Economic and Clinical Health Act of 2003 (HITECH).
Among the many areas impacted by these rules (billing, marketing, research, IT security, etc.) is fund raising.
The amendments significantly modify the methods and practice that hospitals, their institutionally related foundations, and other healthcare charities may or must employ when using ANY patient or client information for fund raising.
Whatever the reason: MIPS or Meaningful Use the risk assessment is a foundational tripwire to you getting your reimbursement check. This risk assessment is a HIPAA risk assessment and is required every year, just like taxes.
Skip it and, 5 years later, you can get that request for more information or pay back the money they gave you. How much was that check? $5000? Avoid having to pay back all of that money by doing your risk assessment each year.
There are some unique challenges to identifying the most significant compliance risks in the delivery of behavioral health services.
This presentation will address both the risk assessment process and the specific risk areas associated with behavioral health.
This 90-minute webinar will be going into great detail regarding you practice or business information technology and how it relates to the HIPAA/HITECH Security Rule and securing PHI in transmission.
I will go through multiple examples and specific scenarios and also offer simple common-sense solutions. Areas covered will be texting, email, encryption, medical messaging, voice data, personal devices, and risk factors.
I will uncover myths versus reality as it relates to this very enigmatic law based on over 1000 risk assessments performed as well as years of experience in dealing directly with the Office of Civil Rights HIPAA auditors.
This lesson is designed to enable your Organization to perform a complete Risk Analysis of all PHI it creates, receives, maintains or transmits in any format. You will understand and identify threats, vulnerabilities and risks to your organization's PHI wherever it is located.
Explain HIPAA Risk Analysis clearly and simply for staff of Covered Entities and Business Associates tasked with doing a HIPAA Risk Analysis who are not members of "the computer security community"
Clarify and follow NIST methods without confusing jargon and complexity
Cover Risk Analysis of all PHI - not just electronic PHI
Demonstrate an interactive, intuitive method for completing the Risk Analysis and creating a Risk Management Program to help you jump start compliance
For much of healthcare, HIPAA sets the standards for how to manage uses and disclosures of patient information, known as Protected Health Information (PHI).
But when it comes to information related to the treatment of substance use disorders, regulations of the Substance Abuse and Mental Health Services Administration (SAMHSA) under 42 CFR Part 2 prevail, including rigorous controls on the release and re-release of patient information.
One errant email or text message can cost you tens of thousands of dollars in HIPAA fines and penalties and it doesn't matter who you're communicating with: patients, staff, providers or with insurance carriers.
A violation is a violation. And if you think it couldn't happen to you, think again. Text and email HIPAA violations are not always caused by what you might think. For example, you may think you are safe as long as you don't text patients - you're wrong. Many violations generally occur between providers messaging their staff. You can avoid getting hit with a HIPAA audit and violations with a few simple changes to your current processes. But you have to be able to identify the danger zones.
National HIPAA expert, John Brewer, will walk you through how to escape being hit with HIPAA emailing and texting violations.
This presentation will cover the challenges of maintaining information privacy and security presented by the shift to an integrated model of health care.
Why should you Attend: A lack of familiarity with the differences in privacy and security statutes and regulations exposes behavioral health care providers to significant legal, financial and reputational risk.
Areas Covered in the Session:
What is the Rationale for Integrated Care
What is the need for Health Information Exchanges
Who Will Benefit:
Compliance, Privacy and Security Officers
Tim Timmons - MentorHealthSpeaker Profile
Tim Timmons Following 25 years as a hospital financial manager and administrator, Tim has spent the past eighteen years assisting behavioral health organizations, hospitals, physician practices and home health agencies with the implementation of ethics and compliance programs.
In March 2019, the Department of Health and Human Services issued proposed rules to give providers and patients access to the electronic data stored in EHRs and health plans.
These rules require specific technology (APIs using the HL7 Fast Healthcare Interoperability Resources, or FHIR) to be built into all EHRs for providers. Using this technology, vendors can build applications to access EHRs from providers and get specific clinical data for use by other providers and by patients.
In this webinar you will learn how to maximize the advantages of a digital tool that can allow employees to do more on the go without violating their patients’ HIPAA rights, Also learn how to use your smart phone responsibly is necessary for smart healthcare practice in regards to the HIPAA Privacy Rule.
This webinar will include "must have"information that will be provided by Dr. Frederic Reamer, who chaired several national and international projects that developed state-of-the-art standards related to practitioners' use of technology.
Healthcare professionals are under more stress than ever evidenced by increases in demand for better services that are more efficient and thorough, higher costs, reduced staffing, and diminishing resources. Many healthcare workers are putting in longer hours and for less pay.
From working twenty-four shifts to simply burning the midnight oil catching up on paperwork, the healthcare industry puts a great deal of stress and fatigue on the average worker and their relationships, including family.
Healthcare professionals bare witness to human suffering on a routine basis and are constantly reminded that tragedy, pain, and challenge often loom large in the midst of helping patients heal. As a result, compassion fatigue and burnout are major hazards of the profession that are becoming far too common.