Developing Best Practices from OCR Audit Protocols and Issue Resolutions

Published: March 2, 2018

The Objectives / Goals of this Pre-Recorded Webinar are as follows :

  • Learn about the OCR and its responsibilities
  • Review recent OCR Enforcement Actions
  • Analyze recent Resolution Agreements and Civil Money Penalties
  • Identify the “takeaways” from the OCR Enforcement Actions
  • Conduct an activity applying the lessons learned from the OCR Enforcement Actions.

Speaker: Rita Bowen, MA, RHIA, CHPS, CHPC, SSGB

Spring 2018 SCHIMA Midlands Webinar

April 5, 2018
12:00 PM – 2:00 PM

12 – 1 PM – Overview of Litigation from the IG Perspective: What, When, Who

Presenter: Ronald J. Hedges JD, Senior Counsel with Dentons US LLP

Overview of Litigation from the IG Perspective: What, When, Who Information Governance should play a major role in preparing for and engaging in litigation. That role requires an understanding of what an electronic health record might be and how health information management and information governance processes can be created and used to further litigation-related goals. This presentation will focus on how these disciplines might be used.

1 CEU – Privacy/Security

1 – 2 PM – Pharmacology for Coders: DELIVERY, PHARMACODYNAMICS, PHARMACOKINETICS

Presenter: Ed O’Beirne, CCS, PA, CDIP, Director of HIM Revenue Integrity, Health Resource Group

This presentation will describe the fundamentals of pharmacology to enhance the participants’ insight into the clinical care of the patient as it affects their understanding of the coding scenario. Emphasis will be given on routes of administration, pharmacokinetics, pharmacodynamics, and toxicity.

1 CEU – Clinical Foundations

HIPAA Hot Topics and Current Trends

February 8, 2018
12:00 PM – 1:00 PM ET

This timely presentation delivers an update of the most important healthcare privacy and security rule / guidance regulatory changes, including but not limited to, HIPAA. The session also covers some evolving best practices that address these rule changes. The presentation is intended to impart a large volume of information about the rapidly changing regulatory privacy and security environment in a relatively short time frame with comprehensive slide content usable by attendees after the presentation as they adopt and train others on these subjects. Mr. McLendon is well known for condensing and simplifying the complex presentation content into easily learnable points with his signature delivery style.

Topics such as; patient’s right of access and how attorneys are using newly clarified guidance to their advantage, along with new information about the OCR phase 2 audit program will be highlighted, but not dominate the presentation. Other topics such as January’s SAMHSA final rule, the Cures Act, the Federal Trade Commission’s actions and various security issues such as mobile devices, phishing and ransomware are constantly being revised by Mr. McLendon and may be discussed.

The slides themselves will be selected from a larger master set Mr. McLendon maintains to reflect the timing and audience of the presentation. This master set of slides constantly undergoes updates as the rules and guidance changes. Any really ‘HOT’ topics that arise after handout submission, as is typical within the fast changing nature of healthcare privacy and security, will be covered with new slides that are also discussed with an updated slide deck for these additions to be offered to the attendees after the session. For example, OCR has several rules including penalty splitting and Accounting of Disclosures that might drop at any time, if they are released prior to the seminar they will be addressed within its content.

Mr. McLendon works with many successful privacy and security professionals, including attorneys, on the topics of healthcare regulatory privacy and security which allows him rapid access to the deluge of information that is now typical, as new pressures on privacy and security compliance is being applied in an ever increasing manner as increasingly records become electronic and health information exchange expands.

Speaker: Kelly McLendon, RHIA, CHPS

 

Privacy and Security Webinar Series

The LHIMA Privacy and Security Webinar Series is designed to answer the latest privacy and security questions in the HIM industry. The series is sponsored by MRO, and Privacy expert Rita Bowen, MA, RHIA, CHPS, CHPC, SSGB, Vice President of Privacy, Compliance and HIM Policy for MRO will be the presenter for our five pre-recorded webinars and will host the final live webinar to answer your follow up questions. The first webinar is now available (1.5 CEU) and the next two webinars (2 CEUs) will be available by December 15, 2017. The final two webinars will be available by January 12, 2018, and our final roundtable webinar will be held on January 31, 2018 at 12:00 PM CT.

Speaker: Rita Bowen, MA, RHIA, CHPS, CHPC, SSGB

Learn More and Register

Cybersecurity Awareness / Ransomware: What You Need to Know

October 18, 2017
12:00 – 1:00 PM CT

Healthcare has experienced an increase in cyber-attacks: hacking, phishing, ransomware and other malicious software. Experts anticipate that cyber-attacks will continue to specifically target the healthcare industry.

Phishing is the most common way ransomware is delivered. More than 20% of email recipients open phishing emails and approximately 12% click on an attachment or embedded link. Unfortunately, just one computer user clicking on one link within an email or while visiting a website can lead to a catastrophic compromise of the hospital’s data or infrastructure.

The danger posed by cyber-attacks has also become a patient safety issue. The ‘WannaCry’ and ‘Petya’ ransomware attacks affected many healthcare organizations, including wreaking havoc for the National Health Service in the United Kingdom.

If a healthcare organization does experience ransomware, it must also determine if there is a reportable breach.

Program Objectives:

  • Provide an overview of the evolving cybersecurity landscape: Threats, threat agents, malicious code, etc.
  • Explain phishing and ransomware
  • Describe the process for properly investigating, containing, and recovering from an incident
  • Discuss the challenges of treating ransomware as a breach unless the organization can prove differently, per the Office for Civil Rights (OCR)
  • Discuss tips for preventing ransomware

Speaker: Tom Walsh, CISSP

Learn More and Register