Home > Training > Live Webinars > How to Perform a HIPAA Risk Assessment
Processing, please wait

  • Product id  :  IQW15C8446

    How to Perform a HIPAA Risk Assessment

Speaker
: Jim Wener
Schedule
: Thursday, May 25, 2017 | 10:00 AM PDT | 01:00 PM EDT
Change Timezone
:

Duration
: 60 Mins
Level
: Basic
Purchase options
  • Description
  • Why should you attend
  • Areas covered
  • Who will benefit
  • Speaker
The primary goal of this session is to demonstrate why the health care organization needs to perform a risk assessment and how to perform the risk assessment. This includes a description of the types of breaches of protected health information that have already occurred and the reasons those breaches happened. The presentation then provides that reasons that a risk assessment is required in a health care organization and who needs to perform the assessment. There are a number of approaches available both for purchase on the web and performed by professionals on site. This discussion helps the participant determine which approach is best for their health care organization and what portions of the assessment are most important to the organization.
The topic addresses the key components of a risk assessment and how to perform the risk assessment. This includes how to define the specific risks, how to know, how to assess the likelihood and impact of the risk and the final determination on the level of severity of the risk for the organization. Finally, the session explains how to interpret the results of the risk assessment, how to use the results of the risk assessment for preparing the health care organization’s policies and procedures and how to conduct the HIPAA training for its staff. 
In addition to the negative publicity and potential fines, a breach of a patient’s health information often leads to a loss of trust with the health care organization and litigation which is also time-consuming and costly. The way to avoid these situations is to perform a Risk Assessment to understand where the health care organization is under the risk of an unauthorized breach and provide a basis for becoming HIPAA compliant.
There are three reasons why a Risk Assessment is necessary:
  • First, both the HIPAA Privacy and Security Regulations require a Risk Assessment for the organization to be HIPAA compliant.
  • Second, as a result of the Risk Assessment, the organization knows where it needs to address its efforts to minimize its risk.
  • Third, if a breach should occur, a Risk Assessment is a demonstration that the health care organization has used reasonable diligence and either eliminate fines or keep them to a minimum.
  • Why is the risk assessment important to the health care organization and business associates?
  • What is important to consider in doing a risk assessment?
  • How to do a risk assessment?
  • When to look for outside assistance?
  • How to link your assessment to your training responsibilities?
  • How to interpret the results of the risk assessment?
  • What to do with the results of your assessment?
  • Health Care Organization Owners 
  • Senior Management
  • Healthcare Organization Compliance Officer
  • Office Management
  • Work staff
  • Business Associates
  • Physicians

Jim Wener has over 40 years of experience in assisting health care organizations – both providers and payers- in identifying their automation requirements and helping these organizations select and successfully implement the automation most applicable for their needs.  Since 1996 he has been an active lecturer, trainer and HIPAA assessment consultant helping a variety of health care providers (hospitals, payers, clinics and individual physician practitioners) become HIPAA compliant. He developed the IBM HIPAA assessment and training products for their consulting practice.   Mr. Wener is a certified HIPAA consultant and has authored articles regarding various topics on the subject.  His HIPAA consulting practice offers comprehensive HIPAA privacy and security consulting tools, practice walkthrough assessment tools, a full set of HIPAA privacy and security policy and procedures templates, training presentations and a breach mitigation tool – all geared and used by small and large health care organizations.

People also viewed :