About | Speakers | Exhibitors | Reviews | Photos |
With the new HIPAA random audit program now getting under way, and increases in enforcement actions following breaches, now is the time to ensure .. Read more your organization is in compliance with the regulations and meeting the e-mail and texting communication needs and desires of its providers and patients. This session will describe the information security compliance process, how it works, and how it can help you decide how to integrate e-mail and texting into your organization in a compliant way. You will learn how to use an information security management process to evaluate risks and make decisions about how best to protect PHI and meet patient needs and desires. You need the proper privacy protections for health information, and the necessary documented policies and procedures, as well as documentation of any actions taken pursuant to your policies and procedures. Your policies and procedures will probably need major revisions to maintain compliance in areas such as individual access of records, accounting of disclosures, and breach notification. And, of course, you will need to train your staff in all the new policies and procedures.
- Share your Experience
- Organizer