Subscribe to Events Feeds

254 Results Found

HIPAA Enforcement and Portable Devices Today
5/13/2014 10:00 AM - 11:30 AM
online event Fremont, California United States
Event Listing
Summary:

Overview: It seems everyone is moving to a new smart phone and wants to use it in all the incredible ways it can be used, including for health care purposes. New health care apps are being released all the time, and even good old e-mail is being used more and more to communicate, by providers and patients alike.

In order to integrate the use of mobile technology into patient communications, it is essential to perform the proper steps in an information security compliance process to evaluate and address the risks of using the technology. This session will describe the information security compliance process, how it works, and how it can help you decide how to integrate mobile technology into your organization in a compliant way. The process, including the use of information security risk analysis, will be explained, and the policies needed to support the process will be described.

But the process must also include consideration of various patient access requirements in the HIPAA Privacy Rule. There are new requirements to provide patients electronic access of electronically held PHI which raise new questions of how that access will be provided and how the information will be protected during and after access. And there has long been a HIPAA requirement for covered entities to do their best to meet the requests of their patients for particular modes of communication, and using a mobile device is no exception.

The stakes are high – any improper exposure of PHI may result in an official breach that must be reported to the individual and to the US Department of Health and Human Services, at great cost and with the potential to bring fines and other enforcement actions if a violation of rules is involved. Likewise, complaints by a patient if they are not afforded the access they desire can bring about HHS inquiries and enforcement actions, so it is essential to find the right balance of access and control.

HHS compliance audit activity and enforcement penalties are both increased, especially in instances of willful neglect of compliance, if, for instance, your organization hasn't adopted the complete suite of policies and procedures needed for compliance, or hasn’t adequately considered the impact of mobile devices on your compliance. Given that mobile devices are a leading source of breaches of PHI, it is essential to consider these devices and how their use affects the privacy and security of PHI; not doing so is inviting enforcement action by HHS.

The session will discuss the requirements, the risks, and the issues of the increasing use of mobile devices for patient communications and provide a road map for how to use them safely and effectively, to increase the quality of health care and patient satisfaction.

Areas Covered in the Session:

Find out the ways that patients want to use their mobile technology to communicate with providers, and the ways providers want to use their mobile technology to enable better patient care.

Learn what are the risks of using mobile technology, what can go wrong, and what can result when it does.

Find out about HIPAA requirements for access and patient preferences, as well as the requirements to protect PHI.

Learn how to use an information security management process to evaluate risks and make decisions about how best to protect PHI and meet patient needs and desires.

Find out what policies and procedures you should have in place for dealing with mobile devices and any new technology.

Learn about the training and education that must take place to ensure your staff uses mobile devices properly and does not risk exposure of PHI.

Find out the steps that must be followed in the event of a breach of PHI.

Learn about how the HIPAA audit and enforcement activities are now being increased and what you need to do to survive a HIPAA audit.

Who Will Benefit:

Compliance Director

CEO

CFO

Privacy Officer

Security Officer

Information Systems Manager

HIPAA Officer

Chief Information Officer

Health Information Manager

Healthcare Counsel/lawyer

Office Manager

Jim Sheldon-Dean is the founder and director of compliance services at Lewis Creek Systems, LLC, a Vermont-based consulting firm founded in 1982, providing information privacy and security regulatory compliance services to a wide variety of health care entities.

MentorHealth

Phone No: 800-385-1607

FaX: 302-288-6884

webinars@mentorhealth.com

Event Link: http://bit.ly/1hyxw9X

http://www.mentorhealth.com/

HIPAA Issues in Mental and Behavioral Health Webinar By MentorHealth
5/1/2014 10:00 AM - 11:31 AM
online training Fremont, California United States
Event Listing
Summary:

Overview: Without the proper legal awareness needed to stay in compliance, you may face grave legal and financial consequences. This webinar will help alleviate confusion by providing an overview of HIPAA and the Security and Privacy Rules and the changes that the HITECH Act caused, especially regarding civil and criminal penalties for violating HIPAA. Learn how and when HIPAA preempts (does away with) state law and the exceptions to preemption, and what other laws preempt HIPAA, such as 42 Code of Federal Regulations Part II's added protection for substance abuse treatment information.

Gain insight on the Security Rule issues for mental and behavioral health practitioners in terms of the five categories of security requirements: general provisions, administrative safeguards, physical safeguards, technical safeguards, and documentation requirements. Understand the privacy rights of clients under HIPAA, specifically the individual's right of access to protected health information ("PHI"), the individual's right to an accounting of uses and disclosures of PHI, the individual's right to notice of information practices, the individual's right to request restriction of uses and disclosures of PHI, and the individual's right to request correction/amendment of PHI.

The information presented is valuable legal and practical information on how to comply with the laws and regulations that haunt your daily duties. Social workers, psychologists, psychiatrists, counselors, addiction professionals, case managers, health care administrators, privacy officers, security officers, CFO's and risk managers will acquire useful knowledge and solutions to your compliance nightmares and fears of ethics violations, litigation, depositions, and court room testimony. This program will boost your confidence in all of these areas and help you continue to provide "top shelf" care, treatment and advice to your clients. Focus your energies where they count the most and gain the expertise you need to meet the requirements of HIPAA, the HITECH Act, and Omnibus Rule change. Become and remain confident that your Mental and Behavioral health care practice is on the right track.

Why should you attend: The Health Insurance Portability and Accountability Act of 1996 ("HIPAA") and its implementing Department of Health and Human Services ("DHHS") regulations, primarily the Security Rule and the Privacy Rule, however, greatly complicate many important issues, such as whether a clinician could release a second opinion by another clinician to the client under the client's HIPAA right of access or whether HIPAA's narrow exception to disclosure to the client if the disclosure would be reasonably likely to result in death or serious injury would prohibit the disclosure if it would impair the therapeutic relationship.

Much of this type of confusion comes from HIPAA's preemption standard. HIPAA preempts (does away with) other state or federal law that is inconsistent with HIPAA unless, among other grounds, the state or federal law provides more privacy protection. One of the problems, for example, is figuring out whether a state law saying that a psychologist may not release a third-party document to the patient provides more or less privacy protection.

Areas Covered in the Session:

Group therapy

Disclosure to law enforcement and others when the client presents a danger to him or herself or others including interaction with the Tarasoff duty to warn

Denying client chart access

What to do if your client's records contain information about other family members

Whether you can discuss a client's case with another clinician without a signed consent

When you must disclose psychotherapy notes

May you release copyright protected raw test data?

Questions and answers

Who Will Benefit:

HIPAA Compliance Officers

HIPAA Security Officers

HIPAA Privacy Officers

CEOs, COOs, CIOs

Human Resources Directors

Medical Records Personnel

Psychologists, Psychiatrists

Licensed Clinical Social Workers

Mental and Behavioral Health Practitioners

Jonathan P. Tomes , J.D., is a health care attorney and partner in the law firm of TOMES & DVORAK, CHARTERED. He has written more than 50 books, including The Compliance Guide to HIPAA and the DHHS Regulations, and dozens of articles in the area of HIPAA compliance.

MentorHealth

Phone No: 800-385-1607

FaX: 302-288-6884

webinars@mentorhealth.com

Event Link: http://bit.ly/1i1Bkx1

http://www.mentorhealth.com/

Information System Activity Review
5/14/2014 10:00 AM - 11:00 AM
online event Fremont, California United States
Event Listing
Summary:

Overview: Everyone that has access to Protected Health Information has a role in activity review monitoring. The user may need to monitor activity under their login, supervisors, managers and directors should understand what is happening within their departments, security personnel must know and understand what they should be reviewing, the management of the organizations should know what is being reviewed,why it is being reviewed and what that means to the organization. This session will include activity review at the application and network layer.

Audit logs and information can be found at the network, server and application level and all levels of the organization should be aware of the importance of these activity reviews. This includes every employee to the board of the company. This session will explore the type of information everyone should be aware of and methods to communicate this to them. When actively reviewing access reports this session will discuss methods to accomplish this important task.

Why should you attend: The HIPAA Security Management Standard is the foundation of the security rule and it requires organizations to - Implement procedures to regularly review records of information system activity, such as:

Audit logs;

Access Reports; and

Security incident tracking reports

In this session we will review what audit logs should be reviewed and why, how to review access reports and what construes a security incident and why and how an organization should review them. In addition, this session will discuss what information should be communicated to various levels within the organization. Security is everyone’s responsibility and understanding what can be reviewed and by whom is critical.

Areas Covered in the Session:

Why it is important to review this information

Who should be involved in this review

What information should be reviewed

How to obtain this information

Who Will Benefit:

Information Security Officers

IT Management

Compliance and Privacy Officers

Risk Managers

IT/IS Management and Staff

Contract Management Department

William Miaoulis CISA, CISM, is a senior healthcare information system (IS) professional with more than 20 years of healthcare Information Security experience. Bill is the founder and primary consultant for HSP Associates. Prior to starting HSP Associates in January of 2013, Bill was the Chief Information Security Officer (CISO) and led the HIPAA security and privacy consulting efforts for Phoenix Health Systems for over 11 years and also was the HIPAA Consulting Manager for SAIC for 18 months. For seven years, Miaoulis was the University of Alabama Birmingham (UAB) Medical Center’s Information Security Officer, where he instituted the first security and privacy programs at UAB starting in October 1992.

MentorHealth

Phone No: 800-385-1607

FaX: 302-288-6884

webinars@mentorhealth.com

Event Link: http://bit.ly/1cvopTU

http://www.mentorhealth.com/

Key Factors to Write HIPAA Compliance Policies
5/6/2014 10:00 AM - 11:31 AM
online event Fremont, California United States
Event Listing
Summary:

Overview: The webinar will explain the process for covered entities and business associates to use to draft, adopt, and implement HIPAA compliance policies. The webinar will begin with a discussion of how to decide, using a gap analysis and a risk analysis, what policies the organization needs, including required, addressable, and other policies. Then, the webinar will cover writing a policy. Writing a policy is easier than one may think. It is a three-step process: researching, drafting, and revising.

This webinar will teach you to ask questions, solicit help, collect samples, keep the principles of substance, organization, coherence, style, and correctness in mind while you are drafting, send your draft out for review, incorporate comments, implement the policy, and repeat as necessary. The prospect of developing and writing perhaps as many as 70 policies to attain HIPAA compliance may still seem daunting, but this webinar will teach you how to make a checklist, take it step by step, and enlist the help of others when you need it.

Why should you attend: The majority of the DHHS civil money penalties and settlements in lieu thereof involve, sometimes with other violations, failure to perform a written risk analysis, failure to develop required policies, and failure to conduct adequate HIPAA training. These penalties usually are in the seven-figure range.

Failure to conduct a written risk analysis, adopt required policies, or conduct required training qualifies as "willful neglect," which carries the highest civil money penalty ("CMP") and which penalty cannot be waived by DHHS as can violations due to a reasonable cause. DHHS entered into a settlement with Massachusetts General Hospital for $1 million for a breach involving leaving paper PHI records on a subway. The sanction was because Massachusetts General had not trained its workforce on proper security for PHI taken offsite and did not have a work-at-home policy. Significantly, HIPAA does not even mention working at home, much less specifically require such a policy.

Areas Covered in the Session:

Preliminaries

Learn how to decide which policies to write and adopt, using gap analysis and risk analysis

Learn which policies are required and which are addressable

Learn about other policies that your organization may need that are not mentioned in the HIPAA regulations but that organizations have nonetheless been fined for not having

Researching

Ask questions. Learn why you need to nail down the answers to at least 12 questions before you try to write a policy and how to do so

Solicit help. Learn whom to solicit help from both within and outside your organization and when and why and how

Collect samples. Learn what samples to collect and from whom

Drafting

Substance. Learn what substance means and how to achieve it

Organization. Learn how to draft a clear beginning, a clear middle, and a clear end

Coherence. Learn how to connect your ideas so that readers will not have to wonder where something came from or why

Style. Learn how to write for your target audience as simply and clearly as possible

Correctness. Learn how to get rid of the static in your writing

Revising

Review. Learn whom to contact to review your drafts

Incorporate. Learn how to resolve disputes and incorporate changes

Implement. Learn how to lay out a plan for implementation of the policy, including publishing, distribution, implementing (and perhaps even training the workforce on the policy), and schedule for annual review and revision, if necessary

Questions and answers

Who Will Benefit:

Compliance Director

CEO

CFO

Privacy Officer

Security Officer

Information Systems Manager

HIPAA Officer

Chief Information Officer

Health Information Manager

Healthcare Counsel/lawyer

Office Manager

Contracts Manager

Alice M. McCart has been an editor for more than three decades and an attorney admitted to practice law in Illinois since 1993. She has master’s degrees in teaching and journalism and enjoys freelance editing, tutoring, and teaching effective writing to adults. She has held positions in the federal government, in professional associations, in the corporate world, in private law practice, and in HIPAA consulting.

MentorHealth

Phone No: 800-385-1607

FaX: 302-288-6884

webinars@mentorhealth.com

Event Link: http://bit.ly/1kERG1f

http://www.mentorhealth.com/

Negligent Credentialing Strategies to Protect Your Health Care Entity
5/15/2014 10:00 AM - 11:00 AM
online event Fremont, California United States
Event Listing
Summary:

Overview: Hospitals, as corporate entities, have the ultimate responsibility for the quality of medical care provided in its facilities. This statement can be misleading, however, if one concludes that the hospital is liable for all acts of negligence or malpractice by a physician who practices at the hospital. In truth, the hospital must take reasonable steps:

To select a competent medical staff

To ensure that the individual physician on it staff performs only procedures for which he or she is qualified

To implement certain quality control measures to verify that only qualified practitioners remain on the staff and that quality care is provided in the institution

We will review the historical relationship between the physician and the hospital and, to see this relationship in the proper context, the roles each plays under the "corporate responsibility doctrine." We will also review the development of negligent credentialing and examine what actions should be taken to preclude liability for failure to properly credential practitioners.

Why should you attend: In a medical malpractice action, the plaintiff is looking for the defendant with deepest pocket for recovery. There is little question that hospitals have the deepest pocket. You should attend this program to learn how negligent credentialing develops and learn strategies to defend against it.

Areas Covered in the Session:

A brief history of peer review in hospitals

How the doctrine of corporate responsibility developed

Responsibility of the hospital for monitoring the care provided by physicians

What negligent credentialing is and how it developed

A brief review of state lawsuits involving negligent credentialing

Strategies that should be taken to preclude liability

Who Will Benefit:

Hospital Executives

Medical Staff Officers

Physicians who serve on peer review committees

Medical Staff

Support Staff

Attorneys representing Medical Staffs

William Mack Copeland MS, JD, PhD, LFACHE, practices health care law in Cincinnati at the firm of Copeland Law, LLC. He is also president of Executive & Managerial Development Group, a consulting entity providing compliance and other fraud and abuse related services. A graduate of Northern Kentucky University Salmon P. Chase College of Law, Bill is a frequent author and speaker on health law topics.

MentorHealth

Phone No: 800-385-1607

FaX: 302-288-6884

webinars@mentorhealth.com

Event Link: http://bit.ly/1jaANyP

http://www.mentorhealth.com/

Obstructive Sleep Apnea and the Perioperative Period Webinar By MentorHealth
5/13/2014 10:00 AM - 11:00 AM
online event Fremont, California United States
Event Listing
Summary:

Overview: The webinar focuses on the patient safety issues in patients with diagnosed or undiagnosed OSA undergoing surgery. We'll help you understand the risk factors for OSA and use appropriate screening tools can help identify undiagnosed cases.

Determining which patients and procedures can be safely managed in ambulatory settings vs. inpatient settings will be discussed. Anesthesia and intra-operative considerations will also be discussed. But most important will be the discussion on monitoring of OSA patients in the postoperative period. Monitoring OSA patients with pulse oximetry alone is insufficient and may give a false sense of security.

We use many case examples to illustrate the problems encountered in patients with OSA, including opioid-related events, hazards of supplemental oxygen, and others.

Why should you attend:

Are you aware of which patients have or might have OSA?

Are your patients with diagnosed or undiagnosed OSA at risk of dying?

Have you already had adverse events in patients with diagnosed or undiagnosed OSA?

Are you monitoring your at-risk patients correctly?

Does your staff fully understand the risks involved in patients with OSA?

Areas Covered in the Session:

Prevalence of OSA

Risk factors for OSA

Screening for OSA

Risks of OSA in the Perioperative Period

Inpatient vs. Ambulatory Surgery

Pre-operative Considerations

Operative Considerations

Anesthesia

Post-operative Management

Monitoring

Who Will Benefit:

Nurse Managers

Chief Nursing Officers

Nurses

Chief Medical Officers

Physicians

Patient Safety Officers

Quality Improvement Personnel

OR Staff

Risk Management Staff

Brad Truax, M.D is board-certified in both Neurology and Internal Medicine. He is a clinician and educator with 20+ years of experience in medical administration and has been involved in quality and patient safety for over 25 years. He has provided medical director services in a broad range of healthcare venues - a large public teaching hospital, a large private hospital, a small rural hospital, a managed care organization, and an accountable care organization (ACO). He was an original and long-standing member of the NYSDOH council that advised New York State’s hospital incident reporting system (NYPORTS).

MentorHealth

Phone No: 800-385-1607

FaX: 302-288-6884

webinars@mentorhealth.com

Event Link: http://bit.ly/1gJYjvp

http://www.mentorhealth.com/

Risk Analysis to Meet HIPAA HITECH and Meaningful Use Webinar By MentorHealth
5/7/2014 10:00 AM - 11:00 AM
online event Fremont, California United States
Event Listing
Summary:

Overview: This presentation will guide the user on the principles of Risk Analysis and Risk Management to prioritize risks. It will rely heavily on the NIST 800-30 as revised and finalized on 09/18/2012.

The process of risk analysis starts with the simple principle that you must know you have an asset in order to protect it. This presentation will provide information about how to determine where the risks to the organization exist and point organizations to where to look for this information. Once information asset locations have been identified, then the risk and safeguards to that information can be explored.

Risk assessments are a key part of effective risk management and facilitate decision making at all three tiers in the risk management hierarchy including the organization level, network level, and information system level.

Risk Management is a process that provides for the identification, prioritization and management of technical and non-technical risk to the confidentiality, integrity or availability of information. Risks cannot be eliminated; they must be managed appropriately. A key step in security management is risk analysis; that is, identifying threats and vulnerabilities against security controls and measures. A risk analysis allows an organization to estimate potential loss. It also can help determine the most appropriate and cost-effective security measures to implement. After the risk analysis is performed, organizations should implement the safeguards and controls needed to keep risks at an acceptable level as determined by executive management or owner.

Why should you attend: The HIPAA security rule requires every covered entity (CE) to conduct a risk analysis to determine security risks and implement measures "to sufficiently reduce those risks and vulnerabilities to a reasonable and appropriate level." In addition to attest for Meaningful Use and organization must complete a HIPAA Risk Analysis and implement a Risk Management Program. This would include conducting a risk analysis at the organizational, network and application levels.

HITECH EMR Meaningful Use Post-Pay Audits have included a request that organizations provide proof that a risk analysis was performed prior to the end of the reporting period. In addition, they will ask for a risk mitigation plan to address deficiencies and they may request completion dates. It is not the Vendors Responsibility to conduct an application risk analysis; it is the covered entities responsibility. The Meaningful Use guidance has also shown that your risk analysis cannot be limited to just the application.

This session will explore the processes and methods that can assist organizations prioritize IT security projects by addressing the highest risks to the organization. Covered entities must make security decisions on what is appropriate for their specific environment and risk analysis is the tool to ensure that risk mitigation activities are reasonable for a specific environment.

This presentation reviews the regulatory requirements for security risk analysis and management, provides an overview of the types of risk analysis that can be performed, and offers a practical approach on how to comply with these requirements.

Areas Covered in the Session:

Locate the data, and then conduct a risk analysis

Define Reasonable By Using NIST and CMS Guidance as a Guide

Risk Analysis Steps

Identify the scope of the specific analysis

Gather Data

Identify and document potential threats and vulnerabilities

Assess and document current security measures

Determine the likelihood of threat occurrence

Determine the potential impact of threat occurrence

Determine the level of risk

Identify potential security measures and finalize documentation

Risk Management Steps

Develop and implement a risk management plan

Implement security measures

Evaluate (monitor) and maintain security measures

Risk Mitigation or Acceptance Options

Define Reasonable by Using the HIPAA Regulation as a Guide

The size, complexity, and capabilities of the covered entity

The covered entity's technical infrastructure, hardware, and software security capabilities

The costs of security measures

The probability and criticality of potential risks to EPHI

Conducting a Risk Analysis Of my Certified EMR

What questions should I ask?

What Documentation should I retain?

Creating a mitigation plan

Who Will Benefit:

Information Security Officers

Compliance Officers

Chief Information Officers

Meaningful Use Coordinators

William Miaoulis CISA, CISM, is a senior healthcare information system (IS) professional with more than 20 years of healthcare Information Security experience. Bill is the founder and primary consultant for HSP Associates. Prior to starting HSP Associates in January of 2013, Bill was the Chief Information Security Officer (CISO) and led the HIPAA security and privacy consulting efforts for Phoenix Health Systems for over 11 years and also was the HIPAA Consulting Manager for SAIC for 18 months. For seven years, Miaoulis was the University of Alabama Birmingham (UAB) Medical Center’s Information Security Officer, where he instituted the first security and privacy programs at UAB starting in October 1992.

MentorHealth

Phone No: 800-385-1607

FaX: 302-288-6884

webinars@mentorhealth.com

Event Link: http://bit.ly/1kqS7MO

http://www.mentorhealth.com/

Significant Changes Required by the Final Omnibus Rules
5/13/2014 10:00 AM - 11:00 AM
online event Fremont, California United States
Event Listing
Summary:

Overview: The focus of this presentation is to help covered entities and business associates understand what key changes they should have in place now, based upon the final omnibus rules. In this session, you will learn about significant changes to the HIPAA privacy and breach notification rules and some minor changes to the security rule.

Discussions will also include information from the comments to the rule which provided informative guidance to the changes, as well as clarifications for existing rules. Tips to comply with these changes will be reviewed.

Why should you Attend:Determining what changes organizations need to put in place to be in compliance with the final omnibus rules can be frustrating and take a lot of time. Many organizations are still struggling to figure out what they need to do to be in compliance with the original HIPAA rules. The compliance date of the final omnibus rules has come and gone (9/23/13; with a transition compliance date for previously compliant business associate agreements of 9/22/14). If your organization has not reviewed and updated its HIPAA compliance program, it is at risk of penalties, such as fines and corrective action plans. The Office for Civil Rights (OCR) is increasingly penalizing organizations for they investigate incidents reported by patients and employees.

In addition, the OCR will likely resume its random audit program, which could also result in penalties. One common theme for OCR penalties provided is not having appropriately documented and implemented policies and procedures. Attend this webinar to learn what significant changes you should put in place to avoid being penalized. Important note for business associates: the final omnibus rules extended liability to you and requires you to comply with most of the HIPAA rules. Essentially, the OCR may audit, investigate, and provide you with penalties. In other words, your organizations are significantly impacted by the final omnibus rules.

Areas Covered in the Session:

Applicability

Breach notification rule

Business associates

Privacy rule

Security rule

Penalties

Who Will Benefit:

Privacy Officers and their employees

Compliance Officers and their employees

Risk Managers and their employees

Health Information Management leaders and staff (HIM)

Health care attorneys

Clinic Managers/Directors

Privacy and security consultants

Business associates and subcontractors

Holly is a privacy and security consultant who has worked with the HIPAA privacy and security rules for over eleven years. She is recognized for helping small to large sized organizations understand and become compliant with these regulations in an organized, ethical, and straightforward way. Holly has extensive experience in developing and implementing customized policies, procedures, forms, and education programs. In addition, she has facilitated security risk analyses for over 80 covered entities and business associates. She developed a comprehensive toolkit to streamline this process. During her eight year tenure as a Privacy Officer for an integrated community-based health care system, she developed and oversaw all privacy and security initiatives. Holly has over 20 years of diverse health care experience in a variety of patient care settings.

MentorHealth

Phone No: 800-385-1607

FaX: 302-288-6884

webinars@mentorhealth.com

Event Link: http://bit.ly/1h0ShMP

http://www.mentorhealth.com/

The CMS Hospital Discharge Planning Standards and Discharge Planning Worksheet Webinar By MentorHea
5/6/2014 10:00 AM - 12:00 PM
online event Fremont, California United States
Event Listing
Summary:

Overview: This program will discuss the CMS worksheet on discharge planning. The discharge planning worksheet states that the necessary medical record information, such as a discharge summary, should be dictated and in the hands of the primary care physician or other physician before the first visit. Is your hospital familiar with the interpretive guidelines and the worksheet information? Come learn what other important things CMS has in their revised worksheet on preventing hospital readmissions!! CMS has recently issued their third revisions to the worksheets.

Every hospital that accepts Medicare and Medicaid must be in compliance with the CMS discharge planning guidelines. These standards must be followed for all patients and not just Medicare or Medicaid. CMS requires a number of discharge planning policies and procedures so come learn which ones are required and why. CMS is placing a high priority on improving patient safety and the quality of care. This is consistent with their initiative, the Partnership for Patients: Better Care, Lower Costs, which is aimed to keep patients from getting injured or harmed while in the hospital setting. The goal is to reduce hospitals acquired conditions by 20%. CMS feels that hospitals in full compliance with the hospital CoPs will be in a better position to reduce healthcare acquired conditions.

Areas Covered in the Session:

CMS issues Discharge Planning memo issued May 17, 2013

Transmittal issued July 19, 2013

CMS Deficiency Memo shows this is a problematic area

Introduction

Blue box or advisory boxes

Consolidation of 24 standards into 13 tags

CMS crosswalk to old tags

Discharge planning

Identification of patients in need of discharge planning

Discharge planning evaluation

RN, social worker or qualified person to develop evaluation

Timely evaluation

Discussion of evaluation with patient or individual acting on their behalf

Discharge evaluation must be in the medical record

Discharge plan

Physician request for discharge planning

Implementation of the patient's discharge plan

Reassessment of the discharge plan

Freedom of choice for LTC or home health agencies

Transfer or referral

crosswalk

Who Will Benefit:

Discharge Planners

Transitional Care Nurses

Case Managers

Social Workers

Chief Nursing Officer

Compliance Officer

Chief Operation Officer

Chief Medical Officers

Physicians

Sue Dill Calloway R.N., M.S.N, J.D. is a nurse attorney and President of Patient Safety and Healthcare Consulting and Education. She is the past Chief Learning Officer for the Emergency Medicine Patient Safety Foundation. She was the past VP of Legal Services at a community hospital in addition to being the Privacy Officer and the Compliance Officer. She worked for over 8 years as the Director of Risk Management and Health Policy for the Ohio Hospital Association. She was also the immediate past director of hospital patient safety and risk management for The Doctors Insurance Company in Columbus area for five years. She does frequent lectures on legal and risk management issues and writes numerous publications.

MentorHealth

Phone No: 800-385-1607

FaX: 302-288-6884

webinars@mentorhealth.com

Event Link: http://bit.ly/1jWTzKU

http://www.mentorhealth.com/

The Politics And Ethics Of Health Care Reform Webinar By MentorHealth
5/8/2014 10:00 AM - 11:00 AM
online event Fremont, California United States
Event Listing
Summary:

Overview: All major health policy initiatives that seek to redraw lines and reshape the system are going to be controversial; that is a given. However, recent efforts to address cost, coverage, and efficiency issues in the system have produced a firestorm of debate, political posturing, and questionable behavior. There have been threats, dire predictions of disaster, overblown expectations, dysfunctional web sites, quirky Supreme Court decisions, and other events that have turned the normally dry field of health policy into high drama.

Patients are turning to health care professionals to find out what is really going on, and many of those professionals are not always able to separate the wheat from the chaff. Among the key issues are:

Patient fears that Medicare will somehow be compromised or even eliminated

Massive variations among states regarding expansion of the Medicaid program

Insurer practices that appear to be seeking to continue the practice of discrimination against the sick - practices that in some cases have the support of state governors, who are refusing to enforce anti-discrimination provisions of the ACA

Concerns about the privacy of personal patient medical information, which has always been at risk, but is widely seen as being more vulnerable as system- and even community-wide health care data bases are developed and electronic medical records and e-prescribing become the order of the day

Issues of access to care, as fewer and fewer physicians accept Medicaid patients, physicians treating Medicare patients move to "concierge" practices, and physicians move from individual or small-group practices to large medical groups

The growing problem of overprescribing and misuse of opioids and other addictive drugs - will e-prescribing make it worse?

The battle for the "hearts and minds" of the public, which has involved both scare tactics and intentional misinformation

None of this is new; the battle 50 years ago over the creation of Medicare and Medicaid was one of the nastiest political fights in American history. When the war was finally over, the most powerful lobby in Washington, DC, had lost much of its clout, and a new era of government involvement in care of the aging had been ushered in. Could the current debate have similar far-reaching consequences?

This webinar will examine what has happened historically with tough health policy fights and their results, and will apply some of those lessons to the current situation. It will also provide objective information about some of the major contemporary battles, what the truths and falsehoods are, and what may happen with regard to them. It will also identify political and ethics issues that are part and parcel of the changing scene that have been largely overlooked - and that could play a major role in determining the success or failure of health care reform. These include ACA's failure to provide for the poorest of the poor, the gray area of coverage for undocumented immigrants, the coming fight over what constitutes optimal care for a given condition, changes in payment structure that will force providers to think in entirely new ways, and the failure of the ACA (or any other initiative, for that matter) to ensure that health care will be both accessible and affordable going forward.

Why should you attend: There has been enough inaccurate information spread about the major reform initiatives of the day - the Affordable Care Act (ACA), the HITECH Act, and state coverage innovations - to make the Brothers Grimm appear to have been telling the absolute truth. That has been one major dilemma in the debate over sweeping changes in the health care system that is being attempted by powers both public and private. But there have been other problems as well, and among them has been a passionate, but at the same time, dispiriting political fight over government's role in health care and the responsibility of the individual. Insurers have tried to get around the new rules; state governors have refused to participate in or enforce certain provisions of the Affordable Care Act; adoption of new approaches by providers, even when virtually mandated, has been spotty. The result is a landscape littered with uncertainty and inconsistency that has left the average health care professional confused and, in many cases, angry.

On top of those stresses have been thorny ethics problems that have dogged reform efforts from the beginning. A provision in the ACA that would have paid physicians $50 for discussing end-of-life issues with Medicare patients (which most physicians do, anyway) was condemned as an attempt to shorten the lives of those patients. A commission charged with finding ways to reduce inflation in the Medicare program was condemned as a "death panel." A $2 billion fund to improve public and preventive health activities was diverted by Congress to non-health care purposes.

Where does the truth lie? How can the politics of health get this ugly? What are the real political and ethical quandaries posed by health care reform, and how might they be addressed? Health care professionals need to know, not only in order to be in compliance with new laws and regulations, but also because they should be involved in addressing these thorny issues.

Areas Covered in the Session:

Previous major battles over health care system reform initiatives - what happened and why

The politics of reform - high stakes, key players

Unresolved political issues of recent reform initiatives

Unresolved ethics issues of recent reform initiatives

Improving both the environment and the quality of the debate

Who Will Benefit:

Health Care Professionals

Hospital and Health System Trustees

Executives, Clinician Leaders, and Department Heads

Employers and Employer Health Care Coalitions

Biomedical Ethicists and Consultants

News Media Representatives who cover the health care field

Community Health Care Advocates

Health Care Planners

Emily Friedman is an independent health policy and ethics analyst based in Chicago. She has been researching and writing and speaking about health policy since 1977. Among her areas of interest are future trends in health care; health care reform initiatives; “comparative effectiveness” and other quality improvement efforts; the social ethics of health care; the future of health care leadership; the ethics of health care leadership; health policy and how it works (or doesn’t); the impact of demographic change on health care; insurance and coverage issues; lessons from international health systems; and the relationship of the public and society with the health care system. She is an Adjunct Assistant Professor at the Boston University School of Public Health, where she has repeatedly been named one of the School’s best teachers; an honorary life member of both the American Hospital Association and the American Medical Association; and a prolific lecturer and writer.

MentorHealth

Phone No: 800-385-1607

FaX: 302-288-6884

webinars@mentorhealth.com

Event Link: http://bit.ly/1pHTmu3

http://www.mentorhealth.com/

Events Map