Training Course
Syllabus:
This seminar is designed for business and office managers, hospital administrators, health care providers, medical records directors, billing managers, nurses, compliance officers, physicians and attorneys.
In today’s health care environment, almost every individual or entity involved in meeting patients’ needs is affected by HIPAA and EDI. This highly informative seminar will examine the fundamental issues related to HIPAA and EDI, and provide you with the information you need to understand every aspect of HIPAA and EDI and their impact on the health care industry. The presentations will first focus on the core aspects of HIPAA, including covered entities and business associates, transaction and data code sets, privacy and security, penalties, and recent developments. The seminar will then analyze the basic concepts and components of EDI, and the interplay between the industry and EDI. Participants will also benefit from practical considerations and information related to complex compliance requirements offered by our expert speakers throughout the day.
9:00 a.m. - 10:45 a.m.
I. Introduction To HIPAA And Background
A. History And Objectives
B. Statutory And Regulatory Framework
C. Who Must Comply?
D. Covered Entities, Business Associates, And Business Associate Contracts
E. Breaches
F. Penalties For Noncompliance
G. Other Issues To Consider
10:45 a.m. - 11:00 a.m.
Break
11:00 a.m. - 12:00 p.m.
II. Transactions And Data Code Sets
A. The Covered Transactions
B. The Code Sets
C. Compliance: Whose Issue Is It?
D. Working With Payers And Clearinghouses Under HIPAA
12:00 p.m. - 1:00 p.m.
Lunch (On Your Own)
1:00 p.m. - 2:00 p.m.
III. EDI Overview
A. Basic Ideas And Definitions
B. The Role Of EDI In The Health Care Industry
C. The HIPAA Implementation Guides
D. How To Achieve Compliance
E. The Place Of Payer Requirements In The HIPAA Standard
F. Questions You Should Ask To Learn If You Are Getting It Right
2:00 p.m. - 4:15 p.m. (Break 2:45 p.m. - 3:00 p.m.)
IV. Understanding The Security Requirements
A. History And Background Of Security Rules
B. Required Implementation Specifications
C. Addressable Implementation Specifications
D. Security Administration
E. Technical Safeguards
F. Physical Safeguards
4:15 p.m. - 4:30 p.m.
V. Questions And Answers
|