Sale Date Ended
The Health Insurance Portability and Accountability Act of 1996, otherwise known as HIPAA, has requirements for Healthcare Covered Entities to conduct a Breach investigation when a patient’s record has been compromised. In order to meet the requirements of the Federal Government, each organization has to conduct a Breach Investigation. Sometimes, there is grey area as to whether or not a situation is or is not a breach, but the law is very clear. In January of 2013, the Government released the HIPAA Omnibus Final Rule which changed the definition of a Breach, and some of the definitions and requirements for Health Care Covered Entities. Every breach, regardless of how many individuals records have been affected, has to be reported to the Federal Government at some point in time. Depending on the circumstances, the Government may wish to conduct their own investigation of a breach. In order to ensure your organization has and is doing all it can to fix the situation, there are certain things you should be doing to help ensure the best possible outcome. This webinar will identify what an organization must do to lessen the already negative breach event.
Why should you attend
In this webinar, we will discuss the absolute essentials to performing a quality breach investigation. Ideally, your organization will never have a breach, but realistically speaking, a breach can occur anytime, anyplace to any organization, regardless of how much money you spend on your security.
Some of your biggest threats are already within your organization.
Identifying a Breach
Investigating a Breach
Mitigating a Breach
Documenting a Breach
Follow-up – Monitoring/Audit Plan
Who will benefit
Privacy Officer, Privacy Analyst
Compliance Analyst, Compliance Officer
Information Security Analyst, Information Security Officer
Director of Health Information Management
Director of Quality/Safety
Chief Executive Officer, Chief Operating Officer, Chief Compliance Officer
Registration Link : https://www.complianceiq.com/trainings/LiveWebinar/conducting-a-breach-investigation