Skip to main content

How to Handle HIPAA and HITECH Act Breaches, Complaints and Investigations: Everything You Need to Know

Compliance Key INC - HIPAA Compliance Training

Jonathan P. Tomes , J.D., is Keynote Speaker at Compliance key Inc. He is a health care attorney practicing in the greater Kansas City. He is a nationally recognized authority and expert witness on the legal requirements for health information.
 Seminar Id: IJ2018S5
 06:00 AM PT | 09:00 AM ET
 03/05/2018
 Duration: 1 Day
Overview
Every covered entity and the business associate will experience one or more security incidents every year. Such incidents range from an employee forgetting to log off with no harm done because you caught it before any unauthorized person accessed the computer to a ransomware attack in which you must pay a six-figure ransom to access your data.
Serious breaches require the covered entity to report the matter to the Department of Health and Human Services (DHHS) who will post the breach on the so-called "wall of shame". Not only is the breach so publicized, it may also need to be reported to local media! Worst of all, this self-reporting can result in a seven-figure civil money penalty. Further, an entity's report and response procedure for handling these incidents is an item of high interest in DHHS audits.This Continuing Education will teach attendees everything they need to know to identify security incidents, decides which ones are breaches, and tell which ones are reportable. The training will also cover how to handle incidents to minimize harm to affected individuals and to the entity. This portion will include a practical exercise to see how the methodology works in practice.Handing outside investigations and internal complaints are also key to avoiding or minimizing liability. The training will demonstrate how to respond to these events and will have another practical exercise to show how it works in practice.The course author has successfully defended eight out of eight investigations by DHHS and provided dozens of opinions as to whether a security incident was a breach, whether it was reportable, and how to handle it

Why should you attend this seminar?

Under the HITECH Act and the Omnibus Rule, covered entities and business associates must report certain breaches of PHI to the Department of Health and Human Services. These reports can result in large civil money penalties (CMP) (fines)-as high to $4.8 million to date.
Having a proper procedure to determine whether a security incident is a breach and, if so, is it reportable is absolutely crucial. Not only can it result in a CMP, it is a priority compliance issue in the HIPAA audits that are ongoing. The possibility of a CMP is illustrated by Presence Health's $475,000 settlement with the DHHS Office of Civil Rights (OCR) 2017. And it was for late reporting. God knows how bad the monetary settlement in lieu of a CMP would be if it was non-reporting rather than late reporting
The breach occurred on October 22, 2013, when paper operating room schedules - containing the protected health information of 836 individuals - went missing from a surgical facility at Joliet, Illinois-based Presence St. Joseph Medical Center.
Presence Health didn't report that fact to OCR until January 31, 2014, more than three months later. But OCR requires all organizations to report a breach within 60 days of the first person who discovers the breach.
Virtually every healthcare entity will have security incidents. Handling them properly can prevent them ripening into a breach and even if the incident is a breach, prevent having to report them to DHHS. And can help result in no penalty or a lesser penalty than a mishandled breach.
HIPAA also requires mitigation-lessening the harm of a breach. Knowing how to properly mitigate can keep a breach from being reportable and save unnecessary costs by preventing more harm from the breach.

Areas Covered in the Session:

  • HIPAA definition of a security incident.
  • Every breach is a security incident, but not every security incident is a breach of HIPAA.
  • Reporting and responding to a security incident.
  • HIPAA definition of a breach.
  • Investigating a security incident to determine whether it is a breach.
  • Practical exercise identification of security incidents and breaches?
  • Elements of an effective security incident report and response policy and procedure.
  • Who must report a security incident and to whom and when and how and why?
  • Mitigating a security incident.
  • Training your workforce on how to handle a HIPAA security incident.
  • How do you determine whether a breach is reportable?
  • Written documentation requirements.
  • Practical exercise in determining whether a breach is reportable.
  • How to provide patients/clients their right to complain.
  • Who do they complain to?
  • How do you respond to complaints?
  • How do you respond to Office for Civil Rights investigations?
  • Conclusion and question and answer.
Who can Benefit:

HIPAA compliance officers, HIPAA Security Officers, HIPAA Privacy Officers, CFOs, CEOs, COOs, CIOs, human resources directors, business office managers, administrators, medical records personnel, health information management professionals, health care attorneys, patient accounts managers, billing services, physicians, dentists, pharmacists, physical and occupational therapists, mental and behavioral health professionals, speech and language pathologists and audiologists, nurses, chiropractors, and business associates.


717-208-8666

Comments

Popular posts from this blog

HIPAA changes 2018 and How to comply?

Compliance Key INC  -  HIPAA W ebinar                                                   Brian L Tuttle Brian Tuttle is Keynote Speaker at Compliance key Inc . He is Certified Professional in Health IT (CPHIT), Certified HIPAA Professional (CHP), Certified Business Resilience Auditor (CBRA) with over 17 years experience in Health IT and Compliance Consulting.     Webinar Id:   HIPHBLT001 10:00 AM PT | 01:00 PM ET  01/23/2018 Duration: 90 mins  Overview This lesson will be addressing how practice/business managers (or compliance offers) need to get their HIPAA house in order as HIPAA is now fully enforced and the government is not using kid gloves any more. It will also address major changes under the Omnibus Rule, Trump administration, and any other applicable updates for 2018 and beyon...

Strategies for Becoming a Business Partner to Your Healthcare Leaders.Compliance Key INC -

Compliance Key INC  -  Healthcare Training Online                                                    Jay Anstine Mr. Anstine's professional background includes working on the provider and the payer side of the market, for large for-profit and non-profit health systems, and small physician-owned entities. In tackling the countless regulatory and operational issues for these diverse organization types, he has developed a deep understanding of the business of healthcare and the regulations that govern the industry.  Webinar Id:  LSHCSJA022  10:00 AM PT | 01:00 PM ET  12/13/2017  Duration 60 mins  Overview All too often compliance is seen as an obstacle or otherwise viewed negatively by healthcare leaders. This presentation will discuss strategies and insights to help the compliance of...

Oversight & Signatures

Compliance Key INC - Medical Device Training                                            Jennifer L. Searfoss Jennifer is the Managing Owner and Chief Solutions Strategist of SCG Health, LLC since 2011. SCG Health is a boutique value improvement organization focused on creating value in healthcare through workflow optimization, revenue cycle management and strategic planning in this post-health reform industry.   Webinar Id:  LSHCOJ001   12:30pm PT | 03:30pm ET  12/07/2017  Duration 60min mins  Overview CMS and other payers are cracking down on rules for signatures used on claims and orders - missing signatures and improper supervision of orders is an easy way for payers to pull back otherwise legitimate payments from your practice. Get the low-down on signature rules (including signature stamps) and how ...