Modern HIPAA Compliance - Managing Privacy, Security, and Breach Notification in a World of New Technologies, New Threats, and New Rules 2017
Day one sets the stage with an overview of the HIPAA regulations including HIPAA Breach Notification and the process that must be used to determine whether or not a breach is reportable, and then continues with presentation of the specifics of the Privacy Rule, recent changes to the rules, and the basics of the Security Rule.
Rules about Patient Rights and the limitations on uses and disclosures by covered entities will be explained, including recent guidance on access of PHI by individuals and sharing information with family and friends of a patient, and the latest rule changes for substance abuse information under 42 CFR Part 2. Discussion will include the impacts of the 21st Century Cures Act as well as the repeal of the Affordable Care Act, and potential impacts of privacy concerns combined with immigration crackdowns on the accuracy and completeness of records on individuals who may fear deportation.
Day two begins with a detailed examination of HIPAA Security Rule requirements and what must be done to survive audits by the US Department of Health and Human Services, including an examination of how risk analysis can be used to drive compliance by the systematic examination of information flows and mitigation of risks discovered, and an exploration of the official HHS HIPAA Audit Protocol, including how to use the protocol to help manage your compliance work and its documentation.
The day continues with an exploration of typical risks, including modern technologies like texting, e-mail, and portable devices, and issues of planning risk mitigation and the necessary follow-up. Finally, the day concludes with a session on the essential activities of documenting policies, procedures, and activities, training staff and managers in the issues and policies they need to know about, and examining compliance readiness through drills and self-audits, finishing up with a look at long-term compliance planning and making sure you stay ahead of compliance needs.
Why should you attend:
The HIPAA Regulations carry significant obligations to protect the privacy and security of Protected Health Information, and significant penalties in the millions of dollars can result from non-compliance.
Even if you have worked on your HIPAA compliance in the past, you could be out of compliance today because of the changes to the rules, new guidance, changes in how you do business and manage PHI, changes to the threats to privacy and security, and even changes in other laws and policies not directly related to HIPAA.
All of these changes have an impact on your HIPAA compliance, and if you don΄t keep up, you are leaving yourself open to complaints and enforcement investigations. It is essential to review all the aspects of HIPAA compliance now, to be sure you are working in the right direction and are addressing the issues of greatest importance.
Many organizations haven΄t yet finished implementing changes required by the HIPAA Omnibus Update of 2013. Areas of the rules that have shown compliance problems in the past are now targeted with guidance and audits to improve and verify compliance. And new threats from insiders and Ransomware could destroy your information and harm your patients. There is plenty that can go wrong with HIPAA compliance, but with the right training and resources you have a chance to make your patients happy and stay out of trouble.
Day 1 Schedule
Overview of HIPAA Regulations
The Origins and Purposes of HIPAA
Privacy Rule History and Objectives
Security Rule History and Objectives
Breach Notification Overview and Analysis of Duty to Report
HIPAA Privacy Rule Principles, Policies and Procedures
Patient Rights under HIPAA, including Rights of Access
Limitations on Uses and Disclosures
Required Policies and Procedures
Training and Documentation Requirements
Recent and Proposed Changes to HIPAA and Related Rules
New Penalty Structure and HIPAA Audit Program
New Patient Rights to Restrict Disclosures to Health Plans
New Accounting of Disclosures Rules
New Rules for Sharing Information under 42 CFR Part 2
Impacts of 21st Century Cures Act and Repeal of ACA
HIPAA Security Rule Principles
General Rules and Flexibility Provisions
The Role of Risk Analysis
Training and Documentation
Day 2 Schedule
HIPAA Security Policies and Procedures and Audits
HIPAA Security Policy Framework
Sample Security Policy Content
New Policies and New Guidance from NIST
The New HIPAA Compliance Audit Protocol
Risk Analysis for Security and Meaningful Use
Principles of Risk Analysis for Information Security
Information Security Management Process
Risk Analysis Methods
Risk Analysis Example
Risk Mitigation and Compliance Remediation
Typical Security Risks
Social Media, Texting, e-mail, and Privacy
Dealing with Portable Devices and Remote Access
Documentation, Training, Drills, Self-Audits, and Long Term Compliance Planning
How to Organize and Use Documentation to Your Advantage
Training Methods and Compliance Improvement
Conducting Drills in Incident and Audit Response
Using the HIPAA Audit Protocol for Documentation and Self-Auditing
Planning your Compliance Work into the Future
Jim Sheldon Dean
Director of Compliance Services, Lewis Creek Systems, LLC
Jim Sheldon-Dean is the founder and director of compliance services at Lewis Creek Systems, LLC, a Vermont-based consulting firm founded in 1982, providing information privacy and security regulatory compliance services to a wide variety of health care entities.