Healthcare Laws/Reform

If you can't find what you want, Ask Us.

Refine Your Results

reset

Filter by Category

Location

Dates

FEATURED VENDORS

Showing 21-40 of 318 results Sort by:

Courses

  • 21 Request Info

    Reimbursement Explained

    Overview: Healthcare reimbursement systems can be complex and difficult to understand. Each payor may use a different method to reimburse providers, or they may use a variation of a commonly used method. This course will provide a foundation for understanding the common reimbursement systems in use today.
  • 22 Request Info

    How to Conduct a HIPAA Risk Assessment

    Overview: This course will cover the proper methodologies on conducting a HIPAA Risk Assessment based on the formula used by Federal auditors and via the guidelines of the NIST (National Institute of Standard for Technologies). The course will also cover the most important aspects to be aware of in terms of the Federal auditing process as well as the new risks regarding patients suing for wrongful disclosures.
  • 23 Request Info

    Problems with Aging Physicians

    Overview: Practicing medicine is not like other jobs that have a tradition of retirement at age 65. Physician shortages fuel support for physicians seeking to continue their careers indefinitely. Patient safety is paramount, but is it served by applying an age limit to medical staff membership and clinical privileges? If so, what is the magic number? Why you should Attend: Can medical staffs and hospitals place restrictions on physicians based on age? Should hospitals and medical staffs place restrictions on physicians based on age? Can physicians sue, alleging discrimination and civil rights violations?
  • 24 Request Info

    HIPAA Fundraising: What you Need to Know, What you Need to Do

    Overview: In 2013, The US Department of Health and Human Services made major changes to rules implementing The Health Insurance and Portability Act of 1996 (HIPAA) and Health Information Technology for Economic and Clinical Health Act of 2003 (HITECH). Among the many areas impacted by these rules (billing, marketing, research, IT security, etc.) is fund raising. The amendments significantly modify the methods and practice that hospitals, their institutionally related foundations, and other healthcare charities may or must employ when using ANY patient or client information for fund raising.
  • 25 Request Info

    MIPS Risk Assessment - What, How, Why?

    Overview: Whatever the reason: MIPS or Meaningful Use the risk assessment is a foundational tripwire to you getting your reimbursement check. This risk assessment is a HIPAA risk assessment and is required every year, just like taxes. Skip it and, 5 years later, you can get that request for more information or pay back the money they gave you. How much was that check? $5000? Avoid having to pay back all of that money by doing your risk assessment each year.
  • 26 Request Info

    Conducting a Behavioral Health Risk Assessment

    Overview: There are some unique challenges to identifying the most significant compliance risks in the delivery of behavioral health services. This presentation will address both the risk assessment process and the specific risk areas associated with behavioral health.
  • 27 Request Info

    HIPAA Texting, Emailing, and Personal Devices - New Guidance

    Overview: This 90-minute webinar will be going into great detail regarding you practice or business information technology and how it relates to the HIPAA/HITECH Security Rule and securing PHI in transmission. I will go through multiple examples and specific scenarios and also offer simple common-sense solutions. Areas covered will be texting, email, encryption, medical messaging, voice data, personal devices, and risk factors. I will uncover myths versus reality as it relates to this very enigmatic law based on over 1000 risk assessments performed as well as years of experience in dealing directly with the Office of Civil Rights HIPAA auditors.
  • 28 Request Info

    How to do a HIPAA Risk Analysis

    Overview: This lesson is designed to enable your Organization to perform a complete Risk Analysis of all PHI it creates, receives, maintains or transmits in any format. You will understand and identify threats, vulnerabilities and risks to your organization's PHI wherever it is located. Explain HIPAA Risk Analysis clearly and simply for staff of Covered Entities and Business Associates tasked with doing a HIPAA Risk Analysis who are not members of "the computer security community" Clarify and follow NIST methods without confusing jargon and complexity Cover Risk Analysis of all PHI - not just electronic PHI Demonstrate an interactive, intuitive method for completing the Risk Analysis and creating a Risk Management Program to help you jump start compliance
  • 29 Request Info

    HIPAA, Consents, and 42 CFR Part 2 - Tracking the Release of Information Under Conflicting Rules

    Overview: For much of healthcare, HIPAA sets the standards for how to manage uses and disclosures of patient information, known as Protected Health Information (PHI). But when it comes to information related to the treatment of substance use disorders, regulations of the Substance Abuse and Mental Health Services Administration (SAMHSA) under 42 CFR Part 2 prevail, including rigorous controls on the release and re-release of patient information.
  • 30 Request Info

    Secure Messaging - How to Email and Text in the World of HIPAA

    Overview: One errant email or text message can cost you tens of thousands of dollars in HIPAA fines and penalties and it doesn't matter who you're communicating with: patients, staff, providers or with insurance carriers. A violation is a violation. And if you think it couldn't happen to you, think again. Text and email HIPAA violations are not always caused by what you might think. For example, you may think you are safe as long as you don't text patients - you're wrong. Many violations generally occur between providers messaging their staff. You can avoid getting hit with a HIPAA audit and violations with a few simple changes to your current processes. But you have to be able to identify the danger zones. National HIPAA expert, John Brewer, will walk you through how to escape being hit with HIPAA emailing and texting violations.
  • 31 Request Info

    Privacy and Security Challenges in Integrated Care

    Overview: This presentation will cover the challenges of maintaining information privacy and security presented by the shift to an integrated model of health care. Why should you Attend: A lack of familiarity with the differences in privacy and security statutes and regulations exposes behavioral health care providers to significant legal, financial and reputational risk. Areas Covered in the Session: What is the Rationale for Integrated Care What is the need for Health Information Exchanges Privacy Isues Security Issues Implementation Challenges Who Will Benefit: Compliance, Privacy and Security Officers Tim Timmons - MentorHealthSpeaker Profile Tim Timmons Following 25 years as a hospital financial manager and administrator, Tim has spent the past eighteen years assisting behavioral health organizations, hospitals, physician practices and home health agencies with the implementation of ethics and compliance programs.
  • 32 Request Info

    Federal Requirements for Interoperability - New Directions for EHRs, Patient and Provider Data

    Overview: In March 2019, the Department of Health and Human Services issued proposed rules to give providers and patients access to the electronic data stored in EHRs and health plans. These rules require specific technology (APIs using the HL7 Fast Healthcare Interoperability Resources, or FHIR) to be built into all EHRs for providers. Using this technology, vendors can build applications to access EHRs from providers and get specific clinical data for use by other providers and by patients.
  • 33 Request Info

    Let's Make The "Call" Together: Cell Phones and HIPAA

    In this webinar you will learn how to maximize the advantages of a digital tool that can allow employees to do more on the go without violating their patients’ HIPAA rights, Also learn how to use your smart phone responsibly is necessary for smart healthcare practice in regards to the HIPAA Privacy Rule.
  • 34 Request Info

    Behavioral Health in the Digital Age Ethical and Risk Management Issues

    This webinar will include "must have"information that will be provided by Dr. Frederic Reamer, who chaired several national and international projects that developed state-of-the-art standards related to practitioners' use of technology.
  • 35 Request Info

    HIPAA and the Security Officer

    This webinar will address major changes under the Omnibus Rule and any other applicable updates for 2019.
  • 36 Request Info

    Burning up while Burning out - Compassion Fatigue Awareness & Burnout Prevention for Practitioners

    Overview: Healthcare professionals are under more stress than ever evidenced by increases in demand for better services that are more efficient and thorough, higher costs, reduced staffing, and diminishing resources. Many healthcare workers are putting in longer hours and for less pay. From working twenty-four shifts to simply burning the midnight oil catching up on paperwork, the healthcare industry puts a great deal of stress and fatigue on the average worker and their relationships, including family. Healthcare professionals bare witness to human suffering on a routine basis and are constantly reminded that tragedy, pain, and challenge often loom large in the midst of helping patients heal. As a result, compassion fatigue and burnout are major hazards of the profession that are becoming far too common.
  • 37 Request Info

    HIPAA Fundraising: What you Need to Know, What you Need to Do

    In 2013, The US Department of Health and Human Services made major changes to rules implementing The Health Insurance and Portability Act of 1996 (HIPAA) and Health Information Technology for Economic and Clinical Health Act of 2003 (HITECH). Among the many areas impacted by these rules (billing, marketing, research, IT security, etc.) is fund raising. The amendments significantly modify the methods and practice that hospitals, their institutionally related foundations, and other healthcare charities may or must employ when using ANY patient or client information for fund raising.
  • 38 Request Info

    Budgeting and Forecasting Physician Practices with Ease and Quality

    Overview: Strong budgeting and forecasting is about getting the fundamentals right. This webinar will teach you which areas to focus the majority of your time and effort in order to achieve the best results. Examples of high-quality detailed volume and physician compensation templates will be shown in order to illustrate the level of detail necessary to create a budget you will not be nervous to show your boss, banks, corporate office, or partners.
  • 39 Request Info

    Prolonged Service Codes

    Overview: Gain an understanding of the prolonged service codes that take place within health care and appropriately document what is needed. Prolonged service codes exist to allow for additional payment to the provider for time spent above and beyond typical times.
  • 40 Request Info

    HIPAA and Having a Compliant Front Office

    In this 60 minutes webinar you can get everything you need to protect your practice from the most common front-desk HIPAA violations, Rhonda's session will help you ensure your front-desk staff are trained to identify violations before they get you in trouble, and successfully handle even the most challenging patient complaint.