HIPAA Compliance and Cyber Security Protection Strategies for the ASC

HIPAA Compliance and Cyber Security Protection Strategies for the ASC

HIPAA Compliance and Cyber Security Protection Strategies for the ASC

HIPAA Compliance and Cyber Security Protection Strategies for the ASC

Clicl here for video

DOT
Ambulatory Surgery Centers must maintain compliance with HIPAA Privacy and Security regulations or face civil and monetary penalties. Surgeons, nurses, technicians, independent, support staff and contractors all play an important role in maintaining HIPAA compliance including; understanding the privacy and security requirements for Protected Health Information (PHI) and how it applies to the many sources and uses of PHI in a busy, ASC environment. In this course we will take a brief, but comprehensive review of HIPAA regulations and requirements for ASCs and increased threats to Protected Health Information (PHI) by cyber attacks, Phishing schemes, ransomware, and the use of mobile technology. Examples will demonstrate the need for everyone on the surgical team to actively participate in maintaining HIPAA compliance with a focus on all potential threats to PHI security. We will also cover current and relevant HIPAA topics that involve mental health and substance abuse disorder (SUD) permitted disclosures which includes situations on how PHI is shared which is dependent on a patient’s decision-making capacity, the provider’s professional judgement, and public safety considerations. The course will briefly cover state specific guidelines and the US Supreme Court’s recognition of marriage equality and its effect on HIPAA Privacy Rules.

COURSE INFORMATION

1 hrsValid for 12 monthsCreated 2019-10-16Updated 2019-10-16

Course Objectives

  • Recall the fundamentals of the HIPAA Privacy and Security regulation as it applies to the ASC environment.
  • Describe the importance of being actively involved in the ongoing security of PHI through safeguards and policies that prevent HIPAA Breaches and unauthorized disclosures.
  • State the minimum necessary requirements when accessing or distributing PHI, including patient and representative’s access to PHI rights, as well as mandated reporting requirements.
  • Identify permitted uses and disclosures of PHI and the need to utilize safeguards to avoid transmitting unencrypted data.
  • Determine the continuous impact of electronic and medical devices, and techniques to avoid becoming a victim of various hacking activities.

Take course now!
div#stuning-header .dfd-stuning-header-bg-container {background-image: url(https://medtrainer.com/wp-content/uploads/2017/11/terms-bg.jpg);background-size: cover;background-position: center center;background-attachment: initial;background-repeat: no-repeat;}#stuning-header div.page-title-inner {min-height: 550px;}