Medical Identity Theft Identity theft is an ongoing problem, and the medical field is no exception. Learn and understand how to prevent medical identify theft. A recent health care information hack exposed the nonpublic financial information of potentially 20 million Quest Diagnostic, LabCorp, and BioReference patients to fraudsters resulting in harm and damage to the brand reputations of the affected laboratories as well as vendors providing critical payment services on their behalf. As more and more convenient technologies are put into use to allow patients to view their medical records, schedule appointments, pay bills, and chat with others with similar diagnoses, how attuned are we to the potential risks of medical identity theft and what tools do we have to detect and prevent suspicious activity? In this topic, you will be able to identify and debunk myths about medical identity theft while learning about current trends and concerns of data security experts. From a compliance perspective, this will prepare you to fine-tune your organization's own programs. You will be able to update your strategies for handling and documenting investigations as well as your options for offering credit monitoring resources or other remedies should you be faced with one or more instances of medical identity theft. Finally, in this material, you will review data and statistics about where medical identity theft is occurring to assure you are aware of how and whether your organization and its programs are vulnerable to it. Instructor: Leslie Bender, CIPP/US, CCCO, CCCA, IFCCE, Eversheds Sutherland (US) Runtime: 89 Minutes (CE’s: CLE 1.5 - AHIMA 1.5 including Information Protection: Access, Disclosure, Privacy, and Security)
Strategies in Updating and Negotiating HIPAA Business Associate Agreements (BAAs) Understand how to implement a proper business associate agreement (BAA) and the obligations and responsibilities under HIPAA. Nearly a decade ago, the Department of Health and Human Services (HHS) issued a final rule to implement some of the statutory amendments to the Health Insurance Portability and Accountability Act of 1996 and its accompanying regulations (collectively, HIPAA). This final rule known as the 'omnibus final rule' took effect in March of 2013, and among other things clarified the direct liability that business associates have under HIPAA. There still is some confusion over who are and who are not considered to be business associates under HIPAA. Business associates are a wide and broad group of vendors, service providers and others who perform services by and on behalf of entities covered by HIPAA directly ('covered entities' in HIPAA refers to health care providers, health plans and health care clearinghouses) and in so doing must use or disclose patients' nonpublic individually identifiable health information. When the omnibus rule took effect, HHS estimated that as many as half a million separate entities were business associates and would be affected by the omnibus rule - before giving consideration to any other or further vendors or service providers doing work for those business associates. Come prepared to explore what has happened in the nearly ten years since the omnibus final rule took effect. Instructor: Leslie Bender, CIPP/US, CCCO, CCCA, IFCCE, Eversheds Sutherland (US) Runtime: 64 Minutes (CE’s: CLE 1.0 - AHIMA 1.0 Including Informatics, Analytics, and Data Use)
Utilizing AI Tools to Boost Productivity Learn how AI is revolutionizing business operations, streamlining workflows, and improving efficiency and productivity. The rapid advancement of AI technology presents both challenges and opportunities in various sectors, including content creation, marketing, e-commerce, and customer support. This webinar on Utilizing AI Tools to Boost Productivity addresses these aspects, providing attendees with valuable insights into the latest AI trends and tools. Participants will learn how AI is revolutionizing business operations, enhancing customer experiences, and streamlining workflows, thereby improving efficiency and productivity. Instructor: Noel R. Bagwell, III, Esq., ExecutiveLP® Runtime: 70 Minutes (CE’s: ASAP PACE 0.1 - IAAP 1.0 )
Tuning up Your Cybersecurity Incident Response Playbook for Today's Threats Understand key aspects of incident response and the legal, contractual, and reputational risks of a data breach. The headlines are awash with news about new cybersecurity incidents affecting every economic sector, and organizations large and small. While not every data security incident is newsworthy, every incident requires a response. What seems like an insignificant incident could be just the beginning of a major data breach. This topic will offer you an overview of current and emerging cyber threats and the evolving legal landscape. You will also hear about practical tactics for incident readiness, including the importance of building an incident response team and organizational culture. Next, the material will cover key aspects of incident response and the legal, contractual, and reputational risks of a mismanaged response, based on lessons learned from infamous incidents. Then, the information will review how to document lessons learned by identifying and remediating gaps in incident response policies and procedures. Instructor: Julia B. Jacobson, Squire Patton Boggs LLP Runtime: 66 minutes (CE’s: CLE - NALA 1.1)