DURHAM, N.C., Feb. 24, 2014 /PRNewswire-iReach/ -- The Cooperative of American Physicians fervently discourages texting of electronic protected health information (e-PHI) by healthcare providers, as it is non-secure and non compliant with HIPAA standards. The new HIPAA Omnibus Update rules contain numerous changes to HIPAA Privacy, Security, and Breach Notification rules that affect communication with patients and clients of health care services, who often ask to communicate with health care offices via e-mails or text messages. Healthcare organizations need to be aware of the various ways that health care communications can take place, and how patient communications fit in with the HIPAA rules. Although, professional communications between providers, insurers, business associates, and other business parties should always be conducted securely, there is more flexibility in using less secure technologies for communication with patients in some circumstances. It's time to ensure your organization is in compliance with the regulations and meeting the e-mail and texting communication needs and desires of its providers and patients. Compliance expert Jim Sheldon Dean will discuss about the patient communication using text and email with compliance in his conference at AudioEducator.
Patient Communication Under New HIPAA Rules (Texting, Email etc.)
Join Jim Sheldon Dean in this power-packed conference on Thursday, February 27, 2014, to comprehend the differences between professional communications and patient communications, and how they must be treated to best serve patients, most efficiently enable communications, and remain within the bounds of HIPAA compliance. He will focus on the rights of individuals to communicate in the manner they desire, and how an office can decide what's an acceptable process for communication with individuals.
Take a look at the topics covered:
- Find out the ways that patients want to use their e-mail and texting to communicate with providers, and the ways providers want to use e-mail and texting to enable better patient care.
- Learn the risks of using e-mail and texting, what can go wrong, and what can result when it does.
- Find out about HIPAA requirements for access and patient preferences, as well as the requirements to protect PHI.
- Learn how to use an information security management process to evaluate risks and make decisions about how best to protect PHI and meet patient needs and desires.
- Find out what policies and procedures you should have in place for dealing with e-mail and texting, as well as any new technology.
- Learn about the training and education that must take place to ensure your staff uses e-mail and texting properly and does not risk exposure of PHI.
- Find out the steps that must be followed in the event of a PHI breach .
- Learn about how the HIPAA audit and enforcement activities are now being increased and what you need to do to survive a HIPAA audit.
For more information, http://www.audioeducator.com/hipaa/new-hipaa-rules-02-27-14.html
Compliance with HIPAA Security and Breach Rules - What Every Medical Office Must Know
Join Jim Sheldon Dean in this riveting session on Tuesday, March 25, 2014, where he will cover the essentials of information security methods you can use to keep breaches from happening, by being in compliance with the HIPAA Security Rule. He'll also discuss the new penalties for non-compliance, including mandatory penalties for "willful neglect" that begin at $10,000. Jim will help you to understand what isn't a breach and under what circumstances you don't have to consider breach notification. You'll find out how to report the smaller breaches (less than 500 individuals), as required, within 60 days of the end of each year and you'll know why you want to avoid a breach involving more than 500 individuals – media notices, Web site notices, and immediate notification of HHS, including posting on the HHS breach notification "wall of shame" on the Web.
Topics covered in the session:
- Find out how to use an information security management process and good security practices to help prevent breaches and understand how you use information, so that you will know better what to do if you do have a breach.
- Find out the steps that must be followed in the event of a breach of PHI. Learn what's required to be reported and how if there is a reportable breach.
- The content of good security, incident, and breach policies
- Learn about the training that must take place to ensure your staff uses safe computing practices and does not risk exposure of PHI.
- Learn about new HIPAA audit and enforcement activities and higher penalties now being issued when good security practices are not followed and breaches result.
AudioEducator brings the most compelling list of audio conferences on wide array of healthcare topics—medical coding, billing to CPT changes, E/M Modifiers to OIG work plan, Affordable Care Act to ERISA, RAC updates to fee schedule, Electronic Health Record system to ICD 10 transition, HIPAA and more. Get trained from the comfort of your home or office without spending a penny on travel. Pick a format of your choice for training— live conference/On Demand/ CD/ PDF transcripts and start learning.
To learn more about other updates events for more than 24 specialties, please visit AudioEducator.com
We have enabled a special promotional discount of 10%. Use coupon code SAVE10 to get your discount, Applicable on all purchases. For further query you can call our customer support as mention below.
Media Contact: Adam K, Audio Educator, 1-866-458-2965, email@example.com
News distributed by PR Newswire iReach: https://ireach.prnewswire.com
SOURCE Audio Educator