Mobile Medical Applications: Software Regulatory Requirements
Tim Stein
90 Min
Product Id: 702812
This mobile medical apps training will outline the regulatory requirements for medical device software development processes, and the requirements for submissions.
Conducting a Risk Analysis to Comply with Meaningful Use, HIPAA and HITECH
William Miaoulis
90 Min
Product Id: 703347
This webinar will discuss how to do a security risk analysis to meet the requirements of HIPAA, HITECH and Meaningful Use attestation. It will describe ways for effectively completing a risk analysis at the organizational level, the network level and the application level.
Risk Areas Planned for Review and Regulatory Changes - New Challenges With Respect to Government Audits and Investigations in Health Care
Susan Lee Walberg
60 Min
Product Id: 703322
This webinar will focus on the current healthcare fraud and abuse enforcement environment and the specific emerging risk areas and strategies for dealing with those. Attendees will learn how to best use their existing resources and data to stay ahead of these government audits and investigations.
7 Pillars of an Effective Compliance Program for Healthcare Companies: Lessons Learned from a Prosecutor's Perspective
Alice H Martin,Michael Rosen
60 Min
Product Id: 703280
This healthcare best practices training will discuss the seven recognized pillars that a compliance plan should include and the details that will allow attendees to reduce their company’s potential liability under the Federal U.S. Sentencing Guidelines. Learn from examples of healthcare companies that did not have or follow an effective compliance plan and the resulting civil fines and penalties as well as government oversight and audits that ensued.
Performing an OIG (Office of Inspector General) Excluded Provider Audit
Kevin McPoyle
90 Min
Product Id: 703276
This training on healthcare compliance will teach the attendees best practices for conducting a self audit of excluded providers. Learn how to prepare and conduct an audit to ensure compliance with this important mandate of Medicare participation.
Staying Ahead of the OIG: Best Practices in avoiding Fraud and Abuse and Civil Fines and Penalties
Alice H Martin,Michael Rosen
75 Min
Product Id: 703231
This webinar will discuss how to review the OIG Strategic Plan for 2014-2018 and recent cases of enforcement in the area of Fraud and Abuse. This session will cover the best practices and a compliance plan that can help you avoid these pitfalls and penalties.
Social Media Trends, Best Practices and Compliance for Healthcare Professionals
Janet Kennedy
60 Min
Product Id: 703247
This social media training for healthcare professionals will provide attendees best practices to ensure compliance with social media policies and avoid HIPAA violations and the resulting penalties and lawsuits.
Navigating and Negotiating HIPAA Business Associate Agreements
Amy Fehn
60 Min
Product Id: 703208
This training on HIPAA compliance will discuss the modifications made to the Final Omnibus Rule and the impact of these changes on agreements between covered entities and business associates. Attendees will learn best practices for developing and negotiating new business associate agreements.
6,379 Covered Entity Social Media Sites and Counting: what to know and do before you join the list
Paul Frisch
90 Min
Product Id: 703173
This webinar on the use of social media by covered entities will discuss the risks, compliance requirements, the effective policies and procedures that you should have in place when using social media.
B.Y.O.D. in a Healthcare Setting - Risks, Policies and Procedures, Access Controls and More
Paul Frisch
90 Min
Product Id: 703171
This webinar will discuss the best practices for protecting the privacy and security of Protected Health Information (PHI) when clinicians, other healthcare personnel and patients use their own devices to access PHI.
Effective Risk Analysis for HIPAA Covered Entities and Business Associates
Keith Mattox
60 Min
Product Id: 703128
This HIPAA compliance training will eliminate the confusion around conducting an effective security risk analysis to fulfill the core requirements of the HIPAA Omnibus Final Rule for covered entities and business associates.
Countdown to HIPAA Compliance: Preparing for the September 23, 2013 Deadline
Jim Sheldon-Dean
90 Min
Product Id: 703077
This webinar will explain the changes that every health care-related entity should make to their policies and procedures and their Notices of Privacy Practices, to reflect the new HIPAA rules, before the September 23 deadline.
HIPAA Breach Notification - New rules significantly change how you determine what to report
Jim Sheldon-Dean
90 Min
Product Id: 703064
This webinar will provide a comprehensive overview of the new HIPAA Breach Notification rules, tips for preventing and preparing for breaches, the new penalties for non compliance, and how to prepare for HIPAA audits. It will include case-study discussions to explain the key elements in an HIPAA audit.
Social Media Compliance for Healthcare Professionals
Joanna Wolfe
70 Min
Product Id: 703050
This webinar on social media compliance in a healthcare setting will explain how you can use social media to communicate with patients while ensuring that you meet the privacy, security and compliance aspects of handling sensitive patient data. It will also discuss the documentation needed to explain proper social media adoption, during an OCR audit.
HIPAA/HITECH Assessment for Healthcare Business Associates
Srini Kolathur
70 Min
Product Id: 703036
This HIPAA compliance training will help healthcare business associates understand the risks associated with handling Protected Health Information (PHI) and show how to implement the steps required to mitigate the risks to secure PHI and comply with new HIPAA/HITECH omnibus rule.
Detecting Healthcare Contractual Fraud, Waste, Abuse and Non-compliance - Detection, Auditing, and Oversight
Jeffrey Baron
90 Min
Product Id: 703035
This healthcare compliance training will help you understand the framework of healthcare contracts, the contractual or contracting risk areas, areas of actual and potential financial exposure, and various detection tools and techniques. You will learn to detect and eliminate ambient back door losses via contracting malfeasance.
Information Security and Cybercrime Prevention Essentials
Peter Goldmann
75 Min
Product Id: 702839
This IT security training will summarize current and emerging cyber-threats and provide latest insights and advice from experts on how to protect the organization.
Preparing for a Centers for Medicare and Medicaid Services (CMS) Audit: What Not To Do
Mark Sexton
60 Min
Product Id: 702811
This CMS audit training will address the types of information CMS is seeking, the documentation that you need to have to demonstrate not only compliance, but good faith as well.
Information Security Awareness Training - Why It is Important?
Thomas DeLaine
60 Min
Product Id: 702819
This training will teach you how to develop, support and deliver an effective information security awareness program in your organization. You will learn how to establish and provide information security awareness training within your respective organizations.
HIPAA Risk Analysis: The HIPAA Standard, HIPAA Security rule
Coy Murchison
60 Min
Product Id: 702605
This HIPAA risk analysis webinar will help you to understand the components needed to conduct a comprehensive security, risk analysis for your organization, in order to comply with the HIPAA standards and the far reaching affects of the HITECH Act. You will learn how to identify sources of PHI and ePHI in your organization, external sources and the threats to information system that contain PHI and ePHI.