HIPAA Breach – or Not? How to Find Out & What to Do

Level

Basic & Intermediate & Advanced

Webinar ID

IQW19I0956

This webinar for HIPAA Covered Entities and Business Associates explains the 5 Steps of HIPAA Breach Notification Rule Compliance:

1.Potential Breach Investigation

  • How to recognize a Potential Breach
  • The information you need to gather
  • Five Key Questions that can confirm no Breach occurred
  • The Data-based Decision – Breach, No Breach or possible "Low Probability of Compromise" indicating a Breach Risk Assessment should be dome

2.Breach Risk Assessment

  • How to apply the factors that can demonstrate a "Low Probability of Compromise" to PHI meaning Breach Notifications are not required
  • How to conduct Breach Risk Assessment of a Ransomware Attack that can overcome the presumption that the Ransomware Attack was a Breach of Unsecured PHI requiring Breach Notification

3.Determination and Documentation – what to do next based on the results of your Potential Breach Investigation or Breach Risk Assessment

4.Notifications

  • The timing and content of Notifications that must be made in the case of a Breach of Unsecured PHI
  • Notification Procedures when 500 or more Individuals are affected by a single Breach
  • Notification Procedures when 1 to 499 Individuals are affected by a single Breach

5.Other Breach Notification Rule compliance requirements

  • Mitigation
  • Protection against further Breaches
  • Law Enforcement Delay
  • State Breach Notification Rule Requirements

Overview of the webinar

More than 170 million Americans have been affected by Breaches of Unsecured Protected Health Information (PHI) since 2009.A Ransomware attack that encrypts PHI is now presumed to be a HIPAA Breach by Federal regulators.HIPAA Breach Notification Content and Timeliness are 2 of the top Enforcement priorities of the Office for Civil Rights (OCR), the HIPAA enforcement arm of the U. S. Department of Health and Human Services.This webinar explains the inter-connected Breach Notification Rule requirements of Covered Entities and Business Associates when a Business Associate or Subcontractor Business Associate suffers a Breach. And it covers the special, more restrictive compliance requirements when a Business Associate or Subcontractor is an Agent under the Federal Common Law of Agency – including how to avoid creating an Agency relationship by mistake.

Who should attend?

Health Care Providers of all types – for example: 
  • Large, Multi-site Hospitals
  • Small Critical Access Hospitals
  • Dentists
  • Optometrists
  • Chiropractors
  • Physical Therapists
  • Podiatrists
  • Licensed Clinical Social Workers
  • Multi-Specialty Medical Groups 
  • Long Term Care, Assisted Living and Skilled Nursing Facilities
  • Federally Qualified Health Centers 
  • Medical Billing and Coding companies
  • IT Vendors
  • Electronic Health Record Providers
  • EHR Consultants
  • Practice Management Firms 
  • CPA and Law Firms
  • Third Party Administrators – usually Insurance Brokers
  • Health Care Practice and Business Associate Owners
  • Compliance Official
  • Chief Executive Officer
  • Chief Operating Officer
  • Chief Compliance Officer
  • Chief Information Officer
  • Chief Information Security Officer 
  • Risk Management Director
  • HIPAA Compliance Official
  • HIPAA Privacy Officer
  • HIPAA Security Officer
  • Information Technology Supervisor
  • General Counsel – Associate General Counsel
  • Attorney

Why should you attend?

Breaches of unsecured PHI is becoming more and more common.The question is not whether a Covered Entity or Business Associate will suffer a Breach.Unfortunately, it is when will you suffer your next (or first) Breach. You should attend this session to learn exactly what to do if your organization suspects it has suffered a Potential Breach or has been attacked by Ransomware.You will learn how to investigate, assess, determine and document whether you have suffered a Breach of Unsecured PHI that requires Breach Notifications, when and how to provide Breach Notification and the other things you must do when you have a Breach.There is a secret to HIPAA Compliance.The secret is the HIPAA Rules are easy to follow, step-by-step, when you know the steps.In this session, you will learn and see the 5 steps of HIPAA Breach Notification Rule compliance explained clearly in plain language.

Faculty - Mr.Paul R. Hales

Paul R. Hales, J.D. is widely recognized for his ability to explain the HIPAA Rules clearly in plain language. Paul is an attorney licensed to practice before the Supreme Court of the United States and a graduate of Columbia University Law School with an international practice in HIPAA privacy and security. He is the author of all content in The HIPAA E-Tool®, an Internet-based, complete HIPAA compliance solution with separate editions for Covered Entities, Business Associates, Health Plans and Third Party Administrators.

100% MONEY BACK GUARANTEED

Refund / Cancellation policy
For group or any booking support, contact: