** More HIPAA Compliance BootCamp™ and complementary HIPAA HITECH webinars dates released for 2014 - 2015 and beyond! View our schedule or find your nearest event at http://www.clearwatercompliance.com **
The HITECH Act is a “game changer” when it comes to HIPAA Security Rule Compliance. Numerous experts have advised that the best way to get started with your compliance program is to take stock of where you are today. Unfortunately, the advice includes many terms used interchangeably to complete a: Compliance assessment! Security Evaluation! Risk Assessment! Risk Analysis! Compliance Analysis! This webinar ends the confusion, identifies the types of evaluations required by the HIPAA Security Final Rule (and Meaningful Use Stage I Requirements) and explains the differences. Complying with the HIPAA Security Final Rule itself and as amended by the Health Information Technology for Economic and Clinical Health (HITECH) Act, which was enacted as part of the American Recovery and Reinvestment Act (ARRA) of 2009 involves many steps and considerations. What’s most important is starting on the right foot.
Learn The Difference Security Assessment V. Risk Analysis
1. Learn the Difference: HIPAA Security
Assessment vs. Risk Analysis
Thursday, January 20, 2011 2:30 PM – 3:30 PM CST Webinar
End the Confusion Get Stared Today!
The HITECH Act is a “game changer” when it comes to HIPAA Security Rule
Compliance. Numerous experts have advised that the best way to get started with
your compliance program is to take stock of where you are today. Unfortunately, the
advice includes many terms used interchangeably to complete a: Compliance
assessment! Security Evaluation! Risk Assessment! Risk Analysis! Compliance
Analysis! This webinar ends the confusion, identifies the types of evaluations
required by the HIPAA Security Final Rule (and Meaningful Use Stage I Requirements)
and explains the differences. Complying with the HIPAA Security Final Rule itself and
as amended by the Health Information Technology for Economic and Clinical Health
(HITECH) Act, which was enacted as part of the American Recovery and Reinvestment
Act (ARRA) of 2009 involves many steps and considerations. What’s most important is
starting on the right foot.
No matter where you are in your HIPAA-HITECH compliance journey, you will benefit
from learning about:
• The requirements of the HIPAA Security Final Rule for evaluations
• The difference between a compliance assessment and a risk analysis
• The HIPAA Security Final Rule civil and criminal penalties
• Practical, actionable steps to complete the evaluations required by law
• Available ToolKits to jump-start your evaluation processes and overall compliance program
• Becoming HIPAA-HITECH Security Rule compliant is an important and large project for any
organization.
Agenda:
• Two Security Rule Evaluation requirements
• The difference between a compliance assessment and a risk analysis
• Proven approaches to completing these evaluations
• Step-by-Step Instructions for compliance assessments and risk analysis
• Tools, templates and forms available to help you
Register Today: https://www1.gotomeeting.com/register/197480760