Subscribe to Events Feeds

257 Results Found

When and How to Build Private and Hybrid Clouds Webinar By EITAGlobal
4/30/2014 10:00 AM - 11:30 AM
Online Event(World wide) Fremont, California United States
Event Listing
Summary:

Why Should you Attend: Private cloud is a big ticket item that is on the radar for most Fortune 2000 companies. Its premises are appealing - get the best of both worlds, the flexibility of a public cloud and the control over your own infrastructure. However, Forrester found that most enterprises haven’t matured their cloud management practices to the point where they could fully exploit the private cloud.

There are also significant risk factors: often the implementation costs are under estimated (we already have the hardware, right?) as well as the management complexity of a private cloud, and the in-house staff often does not have the skills to successfully operate the cloud.

European Union Filings and Registrations
4/25/2014 10:00 AM - 11:30 AM
Online Event Fremont, California United States
Event Listing
Summary:

This session covers the various licensing methods (for Drugs, Biologics & Combination Products) by which applicants can file for product licenses (Marketing Authorizations) in one or multiple Member States, as well as fully across all Member States of the European Union. This course specifically outlines and discusses the structure of the regulatory agencies at the EU-level and across specific Member States. Course content will explain which procedures are available for which products and then will follow the license processing steps for each pathway.

FDA Acceptance of Foreign Clinical Studies Not Conducted Under An IND
4/25/2014 10:00 AM - 11:30 AM
Online Event Fremont, California United States
Event Listing
Summary:

This session covers the various licensing methods (for Drugs, Biologics & Combination Products) by which applicants can file for product licenses (Marketing Authorizations) in one or multiple Member States, as well as fully across all Member States of the European Union. This course specifically outlines and discusses the structure of the regulatory agencies at the EU-level and across specific Member States. Course content will explain which procedures are available for which products and then will follow the license processing steps for each pathway.

Risk Management for Pharmaceutical Change Control program
4/22/2014 10:00 AM - 11:00 AM
Online Event Fremont, California United States
Event Listing
Summary:

It is a process that can significantly impact the efficiency of an organization. This presentation will introduce a risk based approach and procedure with regard to severity, likelihood and detection to manage the change control program.

Business Associate Agreements Why the Pushback from Business Associates
5/27/2014 10:00 AM - 11:00 AM
online event Fremont, California United States
Event Listing
Summary:

Overview: We will take a look at the recent Omnibus Final Rule outlining that all CE's are required to present their BA's with new BAA's, before September 23, 2014. You will also learn why some of the attitudes have recently surfaced from the BA's, why they are resisting some of these agreements, what the BAA's are now required to do according to the same Omnibus Final Rule, and more.

We will discuss responsibility, liability, indemnification, injunctive relief, and other topics that are causing, or may be causing, contention. In the past, so many BA's simply sign these agreements in an effort to continue to do business with each CE. And now, they want to negotiate terms? Why are they making this so complicated? After all, the CE's business that they provide to the BA is more important than an agreement, right? Find out more….

Why should you attend: The business associates (BA's) that a covered entity (CE) uses to perform a covered function for them must now assume responsibility and liability for their actions when it comes to the handling of protected health information (PHI). Learn what these responsibilities are, the reasons for some potential pushback from them regarding liability, providing proof of HIPAA training, etc. It used to be that a majority of BAA's would simply sign the agreements presented to them, but now they are requesting more and more changes to our agreements. In this webinar, you will learn some of the reasons for this new attitude.

Areas Covered in the Session:

Omnibus Final Rule requirements regarding BAA's

The BAA-what it was, what it is now, and what it might be in the future

The CE's Obligations

The BA's Obligations

Liability

Indemnification

Pushback

Who Will Benefit:

Compliance Director

CEO

CFO

Privacy Officer

Security Officer

Information Systems Manager

HIPAA Officer

Chief Information Officer

Health Information Manager

Healthcare Counsel/lawyer

Office Manager

Contracts Manager

Tom Dumez has more than 13 years of records management experience. He started Prime Compliance earlier in 2013 in an effort to provide a ‘real world’ employee HIPAA training program to both business associates and covered entities. Tom has spoken at many conferences, educational workshops, and seminars across the US, London, and Guam.

MentorHealth

Phone No: 800-385-1607

FaX: 302-288-6884

webinars@mentorhealth.com

Event Link: http://bit.ly/1dM8N2I

http://www.mentorhealth.com/

Coding and Documenting CPT and HCPC Modifiers Accurately and Compliantly
5/13/2014 10:00 AM - 11:30 AM
online event Fremont, California United States
Event Listing
Summary:

Overview: Learn specific examples how to use modifiers to report services and procedures accurately and effectively. With the coming implementation of ICD-10, proper documentation will be more important than ever.This sixty-minute Webinar will provide a wealth of information concerning documentation for a wide variety of procedures and environments.

In addition to the code for the specific procedure or service provided to the patient, there might be times when you will have to apply a modifier. Modifiers are two-character codes that add clarification and additional details to the procedure code's original description, as listed in the main portion of the CPT book. At times, the modifier provides necessary explanation to the third-party payer that directly relates to the reimbursement that the facility or physician will receive.

Why should you attend: In this webinar you will learn how to code with modifiers and all modifier guidelines. Modifiers create clear, concise communications between the provider and payer, and are essential to the coding process. This webinar uses real-life modifier scenarios and medical records to guide correct CPT® and HCPCS modifier usage. This webinar will provide guidance on how and when to use modifiers in order to avoid costly payment delays and denials.

Areas Covered in the Session:

Distinguish between CPT modifiers and HCPCS modifiers

This Webinar will help you determine when and if a modifier is required

Apply the guidelines to determine the best, most appropriate modifier

Append multiple modifiers in the proper sequence

Identify circumstances that require a supplemental report

Avoiding Duplicate Denials When Billing with Modifier 76

Proper Billing of the Same Surgical Procedure Code Multiple Times on the Same Day

Clarification on the Use of Modifier 22

Modifier 32 Mandated Services (Help Prevent a Redetermination Request)

Ambulatory Surgical Centers (ASCs) and Modifier 50

Important Information on Modifiers 54 and 55

Who Will Benefit:

Billing Manager

Provider

Practice Manager

Billers

Coders

ICD-10 Implementation Team

Jeffrey Restuccio is the principal owner of Ritecode.com, a healthcare consulting company specializing in online training, live seminars, webinars, chart audits, and specialty consulting. Jeff is certified as both a CPC and a CPC-H from the Academy of Professional Coders (AAPC).

Jeff is an experienced educator and conducts training courses on CPT and ICD-9 coding and billing, auditing and compliance and has taught hundreds of live coding and billing seminars nationwide. He has audited over 10,000 medical records

Jeff teaches specialty seminars on topic such as carrier-specific rules, medical decision making, auditing, compliance plans and winning appeals. His clients include Hospital Corporation of America, Hospital Management Association, St Jude Children’s hospital, the VA, DOD. and hundreds of small practices.

MentorHealth

Phone No: 800-385-1607

FaX: 302-288-6884

webinars@mentorhealth.com

Event Link: http://bit.ly/PfKO0l

http://www.mentorhealth.com/

Ethical Issues in Human Subjects Research Webinar By MentorHealth
5/7/2014 10:00 AM - 11:00 AM
online event Fremont, California United States
Event Listing
Summary:

Overview: This webinar is a compilation of information in areas that generate the most questions for human subject's researchers when conducting research internationally. Discussed in this webinar will be: 45 CFR 46.111 (a)(2) which states, "In evaluating risks and benefits, the IRB should consider only those risks and benefits that may result from the research (as distinguished from risks and benefits of therapies subjects would receive even if not participating in the research)." So what is risk assessment and how does that affect you? The Criteria for Approval found in both the FDA and HHS regulations stipulates what will be looked at during the approval process yet many do not know how, under which conditions, their study is reviewed and therefore do not anticipate possible questions in their study design.

The Federalwide Assurance is required for NIH funded studies. It is a written assurance filed with the Office for Human Research Protections (OHRP) that outlines under which terms a study will be reviewed, approved, and conducted. Even if the study is not NIH funded the principles in the Federalwide Assurance apply. Because of this assurance, additional criteria get applied to studies. When does that happen? Why? Can it be avoided? These questions and more will be answered by learning the information presented in this webinar.

Why should you attend: All researchers want their studies be reviewed and approved quickly. Most investigators do not think about regulatory criteria when designing a study. Complicating matters is the current trend to conduct research in private physician offices and other community venues. Although this makes research more accessible to potential participants, it also invokes another set of regulations and requirements.

The consent document and process are always areas that generate questions. What can and cannot be used? Why? What is allowable? Risks, benefits and how those are viewed and accessed also confound and befuddle individuals working in this field. Knowing what to consider and what the possible stumbling blocks could be, make getting an approval to conduct human subject's research easier. Attendance at this webinar will do just that. It will not only give you a working knowledge of the areas that create the most confusion, it will also give you an understanding that will help you avoid or work through these areas faster and be of assistance to those around you.

Areas Covered in the Session:

Assurances: What are these? What do they stipulate? How they affect you as a researcher

Criteria for review. What to think about and consider when developing or conducting your study

Consent and assent. What is required? What choices do you have?

Community research. What is involved when you ask a private physician to conduct your study or to recruit from his/her clinic?

Risk/Benefit Assessment. What is it? Who makes the determination? What does that determination mean with regards to additional requirements? What is allowable?

Who Will Benefit:

Principal Investigators / Sub-investigators

Clinical Research Scientists (PKs, Biostatisticians,)

Safety Nurses

Clinical Research Associates (CRAs) and Coordinators (CRCs)

Recruiting Staff

QA / QC auditors and Staff

Clinical Research Data Managers

Human Research Protection Professionals

Sarah Fowler-Dixon, PhD, CIP is Education Specialist and instructor with Washington University School of Medicine. She has developed a comprehensive education program for human subject research which has served as a model for other institutions. She crafted budgets, policies, procedures, reporting, and training for the new program. She has initiated the planning, development, authorship and implementation of many human subjects research policies, practices, guidelines, submission and reviewer forms often working with state and federal authorities.

MentorHealth

Phone No: 800-385-1607

FaX: 302-288-6884

webinars@mentorhealth.com

Event Link: http://bit.ly/1pM4cgK

http://www.mentorhealth.com/

HIPAA Enforcement and Portable Devices Today
5/13/2014 10:00 AM - 11:30 AM
online event Fremont, California United States
Event Listing
Summary:

Overview: It seems everyone is moving to a new smart phone and wants to use it in all the incredible ways it can be used, including for health care purposes. New health care apps are being released all the time, and even good old e-mail is being used more and more to communicate, by providers and patients alike.

In order to integrate the use of mobile technology into patient communications, it is essential to perform the proper steps in an information security compliance process to evaluate and address the risks of using the technology. This session will describe the information security compliance process, how it works, and how it can help you decide how to integrate mobile technology into your organization in a compliant way. The process, including the use of information security risk analysis, will be explained, and the policies needed to support the process will be described.

But the process must also include consideration of various patient access requirements in the HIPAA Privacy Rule. There are new requirements to provide patients electronic access of electronically held PHI which raise new questions of how that access will be provided and how the information will be protected during and after access. And there has long been a HIPAA requirement for covered entities to do their best to meet the requests of their patients for particular modes of communication, and using a mobile device is no exception.

The stakes are high – any improper exposure of PHI may result in an official breach that must be reported to the individual and to the US Department of Health and Human Services, at great cost and with the potential to bring fines and other enforcement actions if a violation of rules is involved. Likewise, complaints by a patient if they are not afforded the access they desire can bring about HHS inquiries and enforcement actions, so it is essential to find the right balance of access and control.

HHS compliance audit activity and enforcement penalties are both increased, especially in instances of willful neglect of compliance, if, for instance, your organization hasn't adopted the complete suite of policies and procedures needed for compliance, or hasn’t adequately considered the impact of mobile devices on your compliance. Given that mobile devices are a leading source of breaches of PHI, it is essential to consider these devices and how their use affects the privacy and security of PHI; not doing so is inviting enforcement action by HHS.

The session will discuss the requirements, the risks, and the issues of the increasing use of mobile devices for patient communications and provide a road map for how to use them safely and effectively, to increase the quality of health care and patient satisfaction.

Areas Covered in the Session:

Find out the ways that patients want to use their mobile technology to communicate with providers, and the ways providers want to use their mobile technology to enable better patient care.

Learn what are the risks of using mobile technology, what can go wrong, and what can result when it does.

Find out about HIPAA requirements for access and patient preferences, as well as the requirements to protect PHI.

Learn how to use an information security management process to evaluate risks and make decisions about how best to protect PHI and meet patient needs and desires.

Find out what policies and procedures you should have in place for dealing with mobile devices and any new technology.

Learn about the training and education that must take place to ensure your staff uses mobile devices properly and does not risk exposure of PHI.

Find out the steps that must be followed in the event of a breach of PHI.

Learn about how the HIPAA audit and enforcement activities are now being increased and what you need to do to survive a HIPAA audit.

Who Will Benefit:

Compliance Director

CEO

CFO

Privacy Officer

Security Officer

Information Systems Manager

HIPAA Officer

Chief Information Officer

Health Information Manager

Healthcare Counsel/lawyer

Office Manager

Jim Sheldon-Dean is the founder and director of compliance services at Lewis Creek Systems, LLC, a Vermont-based consulting firm founded in 1982, providing information privacy and security regulatory compliance services to a wide variety of health care entities.

MentorHealth

Phone No: 800-385-1607

FaX: 302-288-6884

webinars@mentorhealth.com

Event Link: http://bit.ly/1hyxw9X

http://www.mentorhealth.com/

HIPAA Issues in Mental and Behavioral Health Webinar By MentorHealth
5/1/2014 10:00 AM - 11:31 AM
online training Fremont, California United States
Event Listing
Summary:

Overview: Without the proper legal awareness needed to stay in compliance, you may face grave legal and financial consequences. This webinar will help alleviate confusion by providing an overview of HIPAA and the Security and Privacy Rules and the changes that the HITECH Act caused, especially regarding civil and criminal penalties for violating HIPAA. Learn how and when HIPAA preempts (does away with) state law and the exceptions to preemption, and what other laws preempt HIPAA, such as 42 Code of Federal Regulations Part II's added protection for substance abuse treatment information.

Gain insight on the Security Rule issues for mental and behavioral health practitioners in terms of the five categories of security requirements: general provisions, administrative safeguards, physical safeguards, technical safeguards, and documentation requirements. Understand the privacy rights of clients under HIPAA, specifically the individual's right of access to protected health information ("PHI"), the individual's right to an accounting of uses and disclosures of PHI, the individual's right to notice of information practices, the individual's right to request restriction of uses and disclosures of PHI, and the individual's right to request correction/amendment of PHI.

The information presented is valuable legal and practical information on how to comply with the laws and regulations that haunt your daily duties. Social workers, psychologists, psychiatrists, counselors, addiction professionals, case managers, health care administrators, privacy officers, security officers, CFO's and risk managers will acquire useful knowledge and solutions to your compliance nightmares and fears of ethics violations, litigation, depositions, and court room testimony. This program will boost your confidence in all of these areas and help you continue to provide "top shelf" care, treatment and advice to your clients. Focus your energies where they count the most and gain the expertise you need to meet the requirements of HIPAA, the HITECH Act, and Omnibus Rule change. Become and remain confident that your Mental and Behavioral health care practice is on the right track.

Why should you attend: The Health Insurance Portability and Accountability Act of 1996 ("HIPAA") and its implementing Department of Health and Human Services ("DHHS") regulations, primarily the Security Rule and the Privacy Rule, however, greatly complicate many important issues, such as whether a clinician could release a second opinion by another clinician to the client under the client's HIPAA right of access or whether HIPAA's narrow exception to disclosure to the client if the disclosure would be reasonably likely to result in death or serious injury would prohibit the disclosure if it would impair the therapeutic relationship.

Much of this type of confusion comes from HIPAA's preemption standard. HIPAA preempts (does away with) other state or federal law that is inconsistent with HIPAA unless, among other grounds, the state or federal law provides more privacy protection. One of the problems, for example, is figuring out whether a state law saying that a psychologist may not release a third-party document to the patient provides more or less privacy protection.

Areas Covered in the Session:

Group therapy

Disclosure to law enforcement and others when the client presents a danger to him or herself or others including interaction with the Tarasoff duty to warn

Denying client chart access

What to do if your client's records contain information about other family members

Whether you can discuss a client's case with another clinician without a signed consent

When you must disclose psychotherapy notes

May you release copyright protected raw test data?

Questions and answers

Who Will Benefit:

HIPAA Compliance Officers

HIPAA Security Officers

HIPAA Privacy Officers

CEOs, COOs, CIOs

Human Resources Directors

Medical Records Personnel

Psychologists, Psychiatrists

Licensed Clinical Social Workers

Mental and Behavioral Health Practitioners

Jonathan P. Tomes , J.D., is a health care attorney and partner in the law firm of TOMES & DVORAK, CHARTERED. He has written more than 50 books, including The Compliance Guide to HIPAA and the DHHS Regulations, and dozens of articles in the area of HIPAA compliance.

MentorHealth

Phone No: 800-385-1607

FaX: 302-288-6884

webinars@mentorhealth.com

Event Link: http://bit.ly/1i1Bkx1

http://www.mentorhealth.com/

Information System Activity Review
5/14/2014 10:00 AM - 11:00 AM
online event Fremont, California United States
Event Listing
Summary:

Overview: Everyone that has access to Protected Health Information has a role in activity review monitoring. The user may need to monitor activity under their login, supervisors, managers and directors should understand what is happening within their departments, security personnel must know and understand what they should be reviewing, the management of the organizations should know what is being reviewed,why it is being reviewed and what that means to the organization. This session will include activity review at the application and network layer.

Audit logs and information can be found at the network, server and application level and all levels of the organization should be aware of the importance of these activity reviews. This includes every employee to the board of the company. This session will explore the type of information everyone should be aware of and methods to communicate this to them. When actively reviewing access reports this session will discuss methods to accomplish this important task.

Why should you attend: The HIPAA Security Management Standard is the foundation of the security rule and it requires organizations to - Implement procedures to regularly review records of information system activity, such as:

Audit logs;

Access Reports; and

Security incident tracking reports

In this session we will review what audit logs should be reviewed and why, how to review access reports and what construes a security incident and why and how an organization should review them. In addition, this session will discuss what information should be communicated to various levels within the organization. Security is everyone’s responsibility and understanding what can be reviewed and by whom is critical.

Areas Covered in the Session:

Why it is important to review this information

Who should be involved in this review

What information should be reviewed

How to obtain this information

Who Will Benefit:

Information Security Officers

IT Management

Compliance and Privacy Officers

Risk Managers

IT/IS Management and Staff

Contract Management Department

William Miaoulis CISA, CISM, is a senior healthcare information system (IS) professional with more than 20 years of healthcare Information Security experience. Bill is the founder and primary consultant for HSP Associates. Prior to starting HSP Associates in January of 2013, Bill was the Chief Information Security Officer (CISO) and led the HIPAA security and privacy consulting efforts for Phoenix Health Systems for over 11 years and also was the HIPAA Consulting Manager for SAIC for 18 months. For seven years, Miaoulis was the University of Alabama Birmingham (UAB) Medical Center’s Information Security Officer, where he instituted the first security and privacy programs at UAB starting in October 1992.

MentorHealth

Phone No: 800-385-1607

FaX: 302-288-6884

webinars@mentorhealth.com

Event Link: http://bit.ly/1cvopTU

http://www.mentorhealth.com/

Events Map