Paul R. Hales J.D, is an attorney at law in St. Louis, Missouri whose practice has included specialization in the HIPAA Privacy and Security Rules from the dates they became effective. He provides assistance and counseling on the new, more demanding compliance requirements of the HITECH modifications to HIPAA. Mr. Hales is licensed to practice before the Supreme Court of the United States, Federal Appellate and District Courts, the State Courts of Missouri and is a graduate of Columbia University Law School.
his lesson is designed to enable your Organization to perform a complete Risk Analysis of all PHI it creates, receives, maintains or transmits in any format. You will understand and identify threats, vulnerabilities and risks to your organization's PHI wherever it is located.
Top 7 HIPAA Violation Concerns revealed by Federal HIPAA Compliance Audits ordered by Congress. The U. S. Department of Health and Human Services (HHS) is conducting mandatory HIPAA Compliance Audits of covered entities and business associates to ensure they comply with HIPAA Privacy and Security Law. HHS's HIPAA Compliance Audit has more than 170 detailed sections- but picked only 7 for the first round! Why? Those 7 are responsible for the most violations, the most breaches of Unsecured PHI-they are the most dangerous and worrisome. This webinar tells you what they are and the simple steps to comply with each and protect your organization.
The global Internet of Things and the HIPAA Privacy and Security Rules allow Protected Health Information (PHI) created by Covered Entities in the United States to be transmitted and stored outside the United States - and outside the reach of U.S. government regulators. Risks for Covered Entities, patients and Business Associates may lurk anywhere in a world where identity theft is rampant and medical identity is the Golden Egg for identity thieves. The U. S. Department of Health and Human Services Inspector General in a widely cited review of State Medicaid outsourcing to foreign vendors highlighted the vulnerabilities in 2014. For example, Medicaid agencies or domestic contractors who send PHI offshore may have limited means of enforcing Business Associate Agreements (BAAs) intended to safeguard PHI. Yet little has been done to publicize, let alone address the problems.
This course explains treacherous Ransomware threats attacking the Healthcare Industry and how to prevent, prepare for, respond to and recover from a Ransomware attack. It covers HIPAA Rules that apply to Ransomware, compliance with the HIPAA Rules and how to conduct a HIPAA Breach Risk Assessment to prove a Ransomware attack did not result in a Breach of Unsecured Protected Health Information (PHI) - a violation of the HIPAA Privacy Rule.
HIPAA Privacy, Security, Breach Notification and Enforcement Rules mandate compliance by Health Care Providers of all sizes - from one physician, dentist, optometrist, or licensed clinical social worker to the largest medical center.
This lesson is designed to enable your Organization to perform a complete Risk Analysis of all PHI it creates, receives, maintains or transmits in any format. You will understand and identify threats, vulnerabilities and risks to your organization's PHI wherever it is located.
This webinar focuses on HIPAA Rules for transmitting informational email and text messages to patients over an electronic communications network.
The webinar will concentrate on topics that HHS has announced will be the focus of the first round of "desk audits". They reflect significant areas of non-compliance revealed in the 2012 pilot audits and HHS HIPAA violation investigations concluded by Resolution Agreements and Corrective Action Plans.