Information Protection: Access, Disclosure, Archival, Privacy and Security
Medical devices are part of the Internet of Things (IoT). A threat to patient privacy and now, patient safety. The department of Health and Human Services and the Healthcare Industry Cybersecurity Task Force have agreed medical devices are a primary threat vector for malicious cybersecurity attackers and unintended malware incidents like Notpetya & Wannacry. It’s not if you will be breached, it’s when and have you prepared?
Join this session and learn CMS's "Top 5 Threats" and "10 Best Practices" targeted to mitigate specific cybersecurity threats for your facility. Easy to understand terminology, participants are provided the Best Practice guidelines, which include templates and toolkits. This HHS publication is now referenced in proposed Congressional Legislation as a means by which organizations can substantially mitigate the penalties of a breach.
In this session, we will discuss: What is Privacy Risk? How does the Privacy Framework support the HIPAA Privacy Rule? How can healthcare organizations of all sizes leverage this new tool? What is the model & how are methodologies used? What does Risk Mitigation look like?
The Objectives / Goals of this Pre-Recorded Webinar are as follows : Learn about the OCR and its responsibilities Review recent OCR Enforcement Actions Analyze recent Resolution Agreements and Civil Money Penalties Identify the “takeaways” from the OCR Enforcement Actions Conduct an activity applying the lessons learned from the OCR Enforcement Actions.
This live session will offer a platform for LHIMA members to address questions about the content delivered in the 5-part webinar series that covered the topics of OCR audits, patient access, telehealth, building a privacy program, information security and problems on the horizon. Privacy expert Rita Bowen, MA, RHIA, CHPS, CHPC, SSGB, Vice President of Privacy, Compliance and HIM Policy for MRO, will be live on the line to answer all your questions about the previously covered topics, in addition to any other hot topics submitted for discussion.
This presentation will discuss the current environment and statistics related to healthcare breach, review the need for Covered Entities and Business Associates to develop sophisticated incident response plans, and shed light on best practices for assembling an incident response team, review critical steps for the first 24 hours following a breach, discuss communications strategies for patient notification and outline various approaches for specific incident types.
This presentation will review the targeted voluntary recommendations produced by our Joint Cybersecurity Workgroup. Introduce Framework terms to start educating the health sector professionals on important and generally-accepted cybersecurity terms.