Archive for 'Free Webinars'

How to Conduct A HIPAA Security Compliance Self Audit

How to Conduct A HIPAA Security Compliance Self Audit Posted 16 April 2013 | By | Categories: HIPAA Compliance Program Management, On Demand Webinars | No Comments

OCR has published audit protocols as part of the program to conduct the HITECH-mandated audits of Covered Entities and Business Associates.  Learn the specific audit procedures around meeting the explicit requirement to conduct an Evaluation at 45 CFR §164.308(a)(8). If you create, receive, maintain or transmit ePHI, you should view this webinar.

The Critical Difference: HIPAA Security Evaluation v HIPAA Security Risk Analysis

The Critical Difference: HIPAA Security Evaluation v HIPAA Security Risk Analysis Posted 10 April 2013 | By | Categories: On Demand Webinars | 2 Comments

Compliance assessment?Security Evaluation? Risk Assessment? Risk Analysis? Compliance Analysis? Huh? Just what does the HIPAA Security Final Rule and/or The HITECH Act and/or Meaningful Use Final Rule require? We end the confusion in this webinar…

HIPAA-HITECH 101

HIPAA-HITECH 101 Posted 10 April 2013 | By | Categories: Omnibus Final Rule, On Demand Webinars | No Comments

With increasing penalties, greater enforcement and a growing set of sources of business risks and sources of liabilities, healthcare organizations and companies that support healthcare organizations must gain a solid understanding of the HIPAA Privacy and Security and HITECH Breach Notification Rules. While it is fairly well known that these rules provide for the privacy… Read More »

The Critical Difference: HIPAA Security Evaluation v HIPAA Security Risk Analysis

The Critical Difference: HIPAA Security Evaluation v HIPAA Security Risk Analysis Posted 10 April 2013 | By | Categories: Free Webinars, Live Webinars | No Comments

Compliance assessment?Security Evaluation? Risk Assessment? Risk Analysis? Compliance Analysis? Huh? Just what does the HIPAA Security Final Rule and/or The HITECH Act and/or Meaningful Use Final Rule require? We end the confusion in this webinar…

How to Set Up and Administer a Business Associate Management Program

Posted 08 April 2013 | By | Categories: On Demand Webinars | No Comments

Covered Entities, Business Associates and their agents  who create, received, maintain and transmit ePHI for a “chain of custody” or “chain of trust” when it comes to HIPAA HITECH regulations. Responsibilities for safeguarding ePHI exist for all of these organizations. Sometimes the most security organizations suffer the embarrassment (HHS Wall of Shame) and liability of… Read More »

Guided Tour of the Clearwater HIPAA Security Assessment™ Software

Guided Tour of the Clearwater HIPAA Security Assessment™ Software Posted 03 April 2013 | By | Categories: HIPAA Compliance Guides, Live Webinars, Omnibus Final Rule | No Comments

Are you in compliance with the HIPAA Security Final Rule? If you are looking for a hipaa security risk assessment tool, look no further! In this webinar, you will learn about a powerful compliance Software as a Service that will enable you to affordably and quickly determine how you stack up against the actual law and… Read More »

How The Final Omnibus Rule Raised the Ante for HIPAA Compliance

How The Final Omnibus Rule Raised the Ante for HIPAA Compliance Posted 14 March 2013 | By | Categories: Free Webinars, Live Webinars, Omnibus Final Rule | No Comments

Business Associates (BAs) of Covered Entities under HIPAA, became statutorily obligated to comply with the HIPAA Security Rule in February 2010, a year after The HITECH Act was passed. Additionally, the Final Rule, published in the Federal Register on January 25, 2013, extends the definition of “business associate” to include a “subcontractor that creates, receives,… Read More »

How to Prepare for HIPAA Audits or Investigations

How to Prepare for HIPAA Audits or Investigations Posted 14 March 2013 | By | Categories: Free Webinars, Live Webinars | No Comments

Business Associates (BAs) of Covered Entities under HIPAA, became statutorily obligated to comply with the HIPAA Security Rule in February 2010, a year after The HITECH Act was passed. Additionally, the Final Rule, published in the Federal Register on January 25, 2013, extends the definition of “business associate” to include a “subcontractor that creates, receives,… Read More »