Jim Sheldon Dean

Director of Compliance Services, Lewis Creek Systems, LLC

Jim Sheldon-Dean is the founder and director of compliance services at Lewis Creek Systems, LLC, a Vermont-based consulting firm founded in 1982, providing information privacy and security regulatory compliance services to a wide variety of health care entities.

Sheldon-Dean serves on the HIMSS Information Systems Security Workgroup, has co-chaired the Workgroup for Electronic Data Interchange Privacy and Security Workgroup, and is a recipient of the WEDI 2011 Award of Merit. He is a frequent speaker regarding HIPAA and information privacy and security compliance issues at seminars and conferences, including speaking engagements at numerous regional and national healthcare association conferences and conventions and the annual NIST/OCR HIPAA Security Conference in Washington, D.C.

Sheldon-Dean has more than 30 years of experience in policy analysis and implementation, business process analysis, information systems and software development. His experience includes leading the development of health care related Web sites; award-winning, best-selling commercial utility software; and mission-critical, fault-tolerant communications satellite control systems. In addition, he has eight years of experience doing hands-on medical work as a Vermont certified volunteer emergency medical technician. Sheldon-Dean received his B.S. degree, summa cum laude, from the University of Vermont and his master’s degree from the Massachusetts Institute of Technology.



  •  Friday, August 25, 2017
  • 10:00 AM PDT | 01:00 PM EDT,
  • 90 Minutes
  • ¤139.00
Texting and E-mail with Patients: Patient Requests and Complying with HIPAA

This session will focus on the rights of individuals to communicate in the manner they desire, and how a medical office can decide what is an acceptable process for communications with individuals. The session will explain how to discuss communications options with individuals so that you can best meet their needs and desires, while preserving their rights under the rules.

  •  Friday, September 1, 2017
  • 10:00 AM PDT | 01:00 PM EDT,
  • 90 Minutes
  • ¤139.00
HIPAA Breach Evaluation and Reporting - What Qualifies as a Reportable Breach and how to Report It

The HIPAA Breach Notification Rule has been in effect since 2010 and has been significantly modified in 2013. We will discuss the origins of the rule and how it works, including interactions with other HIPAA rules and penalties for violations. Whenever there may be a privacy issue involving Protected Health Information, there may be a reportable breach under the HIPAA regulations. Not all privacy violations are reportable breaches, though, so it is essential to have a good process for evaluating incidents to see if they have resulted in a reportable breach.

  •  Thursday, September 28, 2017
  • 10:00 AM PDT | 01:00 PM EDT,
  • 90 Minutes
  • ¤139.00
HIPAA for HR - Some Good News for Employers

Now that the HIPAA rules have been in place for more than a dozen years, the days of advice and counseling have been replaced by a hard-nosed enforcement attitude, where HHS OCR is ready to make health care organizations that violate the rules feel some pain for their actions, and employer-based health plans are no exception. In order to determine their HIPAA compliance obligations, employers need to go through an analysis of their health insurance offereings for their employees. Employers need to examine, is the plan insured or self insured, is it one plan or several, do they rely on an insurer for all the functions or do they use a third party administrator, and much more. Much of the determination of how to comply depends on how involved the employer is with the operation of the plan and the kinds of information the employer receives about the health plan.

  •  Monday, October 16, 2017
  • 10:00 AM PDT | 01:00 PM EDT,
  • 90 Minutes
  • ¤139.00
De-Identification of PHI under HIPAA - Follow the Guidance to Avoid Penalties

Today health information needs to be shared more than ever, but how can that be done most easily within the limits of HIPAA? One way is to de-identify the information. Once PHI has been de-identified, it is no longer protected under HIPAA and may be shared freely without limitation. The problem is that it is not easy to truly de-identify information and if it is not done correctly, the sharing of the information may be considered a breach that requires reporting to HHS and the potential for penalties and corrective action plans.





  • Recorded
  • View Anytime
  • ¤245.00
HIPAA Privacy Policies and Procedures: Prepare for Updates and New Requirements

Learn how having good policies and procedures and good documentation can make compliance easier.

  • Recorded
  • View Anytime
  • ¤245.00
Making Revisions to Medical Records: How to properly make changes to records and avoid penalties and fines

This teleconference will enable health information professionals to know how to respond to requests to revise closed records, to know what is required for individual rights under HIPAA, and to know what belongs in any organization’s procedures for revising medical records.

  • Recorded
  • View Anytime
  • ¤245.00
HIPAA Security Rule Compliance When Communicating with Patients Using Mobile Devices

The session will discuss the requirements, the risks, and the issues of the increasing use of mobile devices for patient communications and provide a road map for how to use them safely and effectively, to increase the quality of health care and patient satisfaction.

  • Recorded
  • View Anytime
  • ¤245.00
HIPAA Breach Notification: How to Prevent, Prepare for, and Report Breaches of Healthcare Information Privacy and Security

We will discuss the kinds of threats that exist for PHI and how they're changing as the hackers gain experience and abilities, and why you need to prepare for next-generation attacks now.