Subscribe to Events Feeds

246 Results Found

FDA Acceptance of Foreign Clinical Studies Not Conducted Under An IND
4/25/2014 10:00 AM - 11:30 AM
Online Event Fremont, California United States
Event Listing
Summary:

This session covers the various licensing methods (for Drugs, Biologics & Combination Products) by which applicants can file for product licenses (Marketing Authorizations) in one or multiple Member States, as well as fully across all Member States of the European Union. This course specifically outlines and discusses the structure of the regulatory agencies at the EU-level and across specific Member States. Course content will explain which procedures are available for which products and then will follow the license processing steps for each pathway.

Business Associate Agreements Why the Pushback from Business Associates
5/27/2014 10:00 AM - 11:00 AM
online event Fremont, California United States
Event Listing
Summary:

Overview: We will take a look at the recent Omnibus Final Rule outlining that all CE's are required to present their BA's with new BAA's, before September 23, 2014. You will also learn why some of the attitudes have recently surfaced from the BA's, why they are resisting some of these agreements, what the BAA's are now required to do according to the same Omnibus Final Rule, and more.

We will discuss responsibility, liability, indemnification, injunctive relief, and other topics that are causing, or may be causing, contention. In the past, so many BA's simply sign these agreements in an effort to continue to do business with each CE. And now, they want to negotiate terms? Why are they making this so complicated? After all, the CE's business that they provide to the BA is more important than an agreement, right? Find out more….

Why should you attend: The business associates (BA's) that a covered entity (CE) uses to perform a covered function for them must now assume responsibility and liability for their actions when it comes to the handling of protected health information (PHI). Learn what these responsibilities are, the reasons for some potential pushback from them regarding liability, providing proof of HIPAA training, etc. It used to be that a majority of BAA's would simply sign the agreements presented to them, but now they are requesting more and more changes to our agreements. In this webinar, you will learn some of the reasons for this new attitude.

Areas Covered in the Session:

Omnibus Final Rule requirements regarding BAA's

The BAA-what it was, what it is now, and what it might be in the future

The CE's Obligations

The BA's Obligations

Liability

Indemnification

Pushback

Who Will Benefit:

Compliance Director

CEO

CFO

Privacy Officer

Security Officer

Information Systems Manager

HIPAA Officer

Chief Information Officer

Health Information Manager

Healthcare Counsel/lawyer

Office Manager

Contracts Manager

Tom Dumez has more than 13 years of records management experience. He started Prime Compliance earlier in 2013 in an effort to provide a ‘real world’ employee HIPAA training program to both business associates and covered entities. Tom has spoken at many conferences, educational workshops, and seminars across the US, London, and Guam.

MentorHealth

Phone No: 800-385-1607

FaX: 302-288-6884

webinars@mentorhealth.com

Event Link: http://bit.ly/1dM8N2I

http://www.mentorhealth.com/

Coding and Documenting CPT and HCPC Modifiers Accurately and Compliantly
5/13/2014 10:00 AM - 11:30 AM
online event Fremont, California United States
Event Listing
Summary:

Overview: Learn specific examples how to use modifiers to report services and procedures accurately and effectively. With the coming implementation of ICD-10, proper documentation will be more important than ever.This sixty-minute Webinar will provide a wealth of information concerning documentation for a wide variety of procedures and environments.

In addition to the code for the specific procedure or service provided to the patient, there might be times when you will have to apply a modifier. Modifiers are two-character codes that add clarification and additional details to the procedure code's original description, as listed in the main portion of the CPT book. At times, the modifier provides necessary explanation to the third-party payer that directly relates to the reimbursement that the facility or physician will receive.

Why should you attend: In this webinar you will learn how to code with modifiers and all modifier guidelines. Modifiers create clear, concise communications between the provider and payer, and are essential to the coding process. This webinar uses real-life modifier scenarios and medical records to guide correct CPT® and HCPCS modifier usage. This webinar will provide guidance on how and when to use modifiers in order to avoid costly payment delays and denials.

Areas Covered in the Session:

Distinguish between CPT modifiers and HCPCS modifiers

This Webinar will help you determine when and if a modifier is required

Apply the guidelines to determine the best, most appropriate modifier

Append multiple modifiers in the proper sequence

Identify circumstances that require a supplemental report

Avoiding Duplicate Denials When Billing with Modifier 76

Proper Billing of the Same Surgical Procedure Code Multiple Times on the Same Day

Clarification on the Use of Modifier 22

Modifier 32 Mandated Services (Help Prevent a Redetermination Request)

Ambulatory Surgical Centers (ASCs) and Modifier 50

Important Information on Modifiers 54 and 55

Who Will Benefit:

Billing Manager

Provider

Practice Manager

Billers

Coders

ICD-10 Implementation Team

Jeffrey Restuccio is the principal owner of Ritecode.com, a healthcare consulting company specializing in online training, live seminars, webinars, chart audits, and specialty consulting. Jeff is certified as both a CPC and a CPC-H from the Academy of Professional Coders (AAPC).

Jeff is an experienced educator and conducts training courses on CPT and ICD-9 coding and billing, auditing and compliance and has taught hundreds of live coding and billing seminars nationwide. He has audited over 10,000 medical records

Jeff teaches specialty seminars on topic such as carrier-specific rules, medical decision making, auditing, compliance plans and winning appeals. His clients include Hospital Corporation of America, Hospital Management Association, St Jude Children’s hospital, the VA, DOD. and hundreds of small practices.

MentorHealth

Phone No: 800-385-1607

FaX: 302-288-6884

webinars@mentorhealth.com

Event Link: http://bit.ly/PfKO0l

http://www.mentorhealth.com/

Ethical Issues in Human Subjects Research Webinar By MentorHealth
5/7/2014 10:00 AM - 11:00 AM
online event Fremont, California United States
Event Listing
Summary:

Overview: This webinar is a compilation of information in areas that generate the most questions for human subject's researchers when conducting research internationally. Discussed in this webinar will be: 45 CFR 46.111 (a)(2) which states, "In evaluating risks and benefits, the IRB should consider only those risks and benefits that may result from the research (as distinguished from risks and benefits of therapies subjects would receive even if not participating in the research)." So what is risk assessment and how does that affect you? The Criteria for Approval found in both the FDA and HHS regulations stipulates what will be looked at during the approval process yet many do not know how, under which conditions, their study is reviewed and therefore do not anticipate possible questions in their study design.

The Federalwide Assurance is required for NIH funded studies. It is a written assurance filed with the Office for Human Research Protections (OHRP) that outlines under which terms a study will be reviewed, approved, and conducted. Even if the study is not NIH funded the principles in the Federalwide Assurance apply. Because of this assurance, additional criteria get applied to studies. When does that happen? Why? Can it be avoided? These questions and more will be answered by learning the information presented in this webinar.

Why should you attend: All researchers want their studies be reviewed and approved quickly. Most investigators do not think about regulatory criteria when designing a study. Complicating matters is the current trend to conduct research in private physician offices and other community venues. Although this makes research more accessible to potential participants, it also invokes another set of regulations and requirements.

The consent document and process are always areas that generate questions. What can and cannot be used? Why? What is allowable? Risks, benefits and how those are viewed and accessed also confound and befuddle individuals working in this field. Knowing what to consider and what the possible stumbling blocks could be, make getting an approval to conduct human subject's research easier. Attendance at this webinar will do just that. It will not only give you a working knowledge of the areas that create the most confusion, it will also give you an understanding that will help you avoid or work through these areas faster and be of assistance to those around you.

Areas Covered in the Session:

Assurances: What are these? What do they stipulate? How they affect you as a researcher

Criteria for review. What to think about and consider when developing or conducting your study

Consent and assent. What is required? What choices do you have?

Community research. What is involved when you ask a private physician to conduct your study or to recruit from his/her clinic?

Risk/Benefit Assessment. What is it? Who makes the determination? What does that determination mean with regards to additional requirements? What is allowable?

Who Will Benefit:

Principal Investigators / Sub-investigators

Clinical Research Scientists (PKs, Biostatisticians,)

Safety Nurses

Clinical Research Associates (CRAs) and Coordinators (CRCs)

Recruiting Staff

QA / QC auditors and Staff

Clinical Research Data Managers

Human Research Protection Professionals

Sarah Fowler-Dixon, PhD, CIP is Education Specialist and instructor with Washington University School of Medicine. She has developed a comprehensive education program for human subject research which has served as a model for other institutions. She crafted budgets, policies, procedures, reporting, and training for the new program. She has initiated the planning, development, authorship and implementation of many human subjects research policies, practices, guidelines, submission and reviewer forms often working with state and federal authorities.

MentorHealth

Phone No: 800-385-1607

FaX: 302-288-6884

webinars@mentorhealth.com

Event Link: http://bit.ly/1pM4cgK

http://www.mentorhealth.com/

HIPAA Enforcement and Portable Devices Today
5/13/2014 10:00 AM - 11:30 AM
online event Fremont, California United States
Event Listing
Summary:

Overview: It seems everyone is moving to a new smart phone and wants to use it in all the incredible ways it can be used, including for health care purposes. New health care apps are being released all the time, and even good old e-mail is being used more and more to communicate, by providers and patients alike.

In order to integrate the use of mobile technology into patient communications, it is essential to perform the proper steps in an information security compliance process to evaluate and address the risks of using the technology. This session will describe the information security compliance process, how it works, and how it can help you decide how to integrate mobile technology into your organization in a compliant way. The process, including the use of information security risk analysis, will be explained, and the policies needed to support the process will be described.

But the process must also include consideration of various patient access requirements in the HIPAA Privacy Rule. There are new requirements to provide patients electronic access of electronically held PHI which raise new questions of how that access will be provided and how the information will be protected during and after access. And there has long been a HIPAA requirement for covered entities to do their best to meet the requests of their patients for particular modes of communication, and using a mobile device is no exception.

The stakes are high – any improper exposure of PHI may result in an official breach that must be reported to the individual and to the US Department of Health and Human Services, at great cost and with the potential to bring fines and other enforcement actions if a violation of rules is involved. Likewise, complaints by a patient if they are not afforded the access they desire can bring about HHS inquiries and enforcement actions, so it is essential to find the right balance of access and control.

HHS compliance audit activity and enforcement penalties are both increased, especially in instances of willful neglect of compliance, if, for instance, your organization hasn't adopted the complete suite of policies and procedures needed for compliance, or hasn’t adequately considered the impact of mobile devices on your compliance. Given that mobile devices are a leading source of breaches of PHI, it is essential to consider these devices and how their use affects the privacy and security of PHI; not doing so is inviting enforcement action by HHS.

The session will discuss the requirements, the risks, and the issues of the increasing use of mobile devices for patient communications and provide a road map for how to use them safely and effectively, to increase the quality of health care and patient satisfaction.

Areas Covered in the Session:

Find out the ways that patients want to use their mobile technology to communicate with providers, and the ways providers want to use their mobile technology to enable better patient care.

Learn what are the risks of using mobile technology, what can go wrong, and what can result when it does.

Find out about HIPAA requirements for access and patient preferences, as well as the requirements to protect PHI.

Learn how to use an information security management process to evaluate risks and make decisions about how best to protect PHI and meet patient needs and desires.

Find out what policies and procedures you should have in place for dealing with mobile devices and any new technology.

Learn about the training and education that must take place to ensure your staff uses mobile devices properly and does not risk exposure of PHI.

Find out the steps that must be followed in the event of a breach of PHI.

Learn about how the HIPAA audit and enforcement activities are now being increased and what you need to do to survive a HIPAA audit.

Who Will Benefit:

Compliance Director

CEO

CFO

Privacy Officer

Security Officer

Information Systems Manager

HIPAA Officer

Chief Information Officer

Health Information Manager

Healthcare Counsel/lawyer

Office Manager

Jim Sheldon-Dean is the founder and director of compliance services at Lewis Creek Systems, LLC, a Vermont-based consulting firm founded in 1982, providing information privacy and security regulatory compliance services to a wide variety of health care entities.

MentorHealth

Phone No: 800-385-1607

FaX: 302-288-6884

webinars@mentorhealth.com

Event Link: http://bit.ly/1hyxw9X

http://www.mentorhealth.com/

HIPAA Issues in Mental and Behavioral Health Webinar By MentorHealth
5/1/2014 10:00 AM - 11:31 AM
online training Fremont, California United States
Event Listing
Summary:

Overview: Without the proper legal awareness needed to stay in compliance, you may face grave legal and financial consequences. This webinar will help alleviate confusion by providing an overview of HIPAA and the Security and Privacy Rules and the changes that the HITECH Act caused, especially regarding civil and criminal penalties for violating HIPAA. Learn how and when HIPAA preempts (does away with) state law and the exceptions to preemption, and what other laws preempt HIPAA, such as 42 Code of Federal Regulations Part II's added protection for substance abuse treatment information.

Gain insight on the Security Rule issues for mental and behavioral health practitioners in terms of the five categories of security requirements: general provisions, administrative safeguards, physical safeguards, technical safeguards, and documentation requirements. Understand the privacy rights of clients under HIPAA, specifically the individual's right of access to protected health information ("PHI"), the individual's right to an accounting of uses and disclosures of PHI, the individual's right to notice of information practices, the individual's right to request restriction of uses and disclosures of PHI, and the individual's right to request correction/amendment of PHI.

The information presented is valuable legal and practical information on how to comply with the laws and regulations that haunt your daily duties. Social workers, psychologists, psychiatrists, counselors, addiction professionals, case managers, health care administrators, privacy officers, security officers, CFO's and risk managers will acquire useful knowledge and solutions to your compliance nightmares and fears of ethics violations, litigation, depositions, and court room testimony. This program will boost your confidence in all of these areas and help you continue to provide "top shelf" care, treatment and advice to your clients. Focus your energies where they count the most and gain the expertise you need to meet the requirements of HIPAA, the HITECH Act, and Omnibus Rule change. Become and remain confident that your Mental and Behavioral health care practice is on the right track.

Why should you attend: The Health Insurance Portability and Accountability Act of 1996 ("HIPAA") and its implementing Department of Health and Human Services ("DHHS") regulations, primarily the Security Rule and the Privacy Rule, however, greatly complicate many important issues, such as whether a clinician could release a second opinion by another clinician to the client under the client's HIPAA right of access or whether HIPAA's narrow exception to disclosure to the client if the disclosure would be reasonably likely to result in death or serious injury would prohibit the disclosure if it would impair the therapeutic relationship.

Much of this type of confusion comes from HIPAA's preemption standard. HIPAA preempts (does away with) other state or federal law that is inconsistent with HIPAA unless, among other grounds, the state or federal law provides more privacy protection. One of the problems, for example, is figuring out whether a state law saying that a psychologist may not release a third-party document to the patient provides more or less privacy protection.

Areas Covered in the Session:

Group therapy

Disclosure to law enforcement and others when the client presents a danger to him or herself or others including interaction with the Tarasoff duty to warn

Denying client chart access

What to do if your client's records contain information about other family members

Whether you can discuss a client's case with another clinician without a signed consent

When you must disclose psychotherapy notes

May you release copyright protected raw test data?

Questions and answers

Who Will Benefit:

HIPAA Compliance Officers

HIPAA Security Officers

HIPAA Privacy Officers

CEOs, COOs, CIOs

Human Resources Directors

Medical Records Personnel

Psychologists, Psychiatrists

Licensed Clinical Social Workers

Mental and Behavioral Health Practitioners

Jonathan P. Tomes , J.D., is a health care attorney and partner in the law firm of TOMES & DVORAK, CHARTERED. He has written more than 50 books, including The Compliance Guide to HIPAA and the DHHS Regulations, and dozens of articles in the area of HIPAA compliance.

MentorHealth

Phone No: 800-385-1607

FaX: 302-288-6884

webinars@mentorhealth.com

Event Link: http://bit.ly/1i1Bkx1

http://www.mentorhealth.com/

Information System Activity Review
5/14/2014 10:00 AM - 11:00 AM
online event Fremont, California United States
Event Listing
Summary:

Overview: Everyone that has access to Protected Health Information has a role in activity review monitoring. The user may need to monitor activity under their login, supervisors, managers and directors should understand what is happening within their departments, security personnel must know and understand what they should be reviewing, the management of the organizations should know what is being reviewed,why it is being reviewed and what that means to the organization. This session will include activity review at the application and network layer.

Audit logs and information can be found at the network, server and application level and all levels of the organization should be aware of the importance of these activity reviews. This includes every employee to the board of the company. This session will explore the type of information everyone should be aware of and methods to communicate this to them. When actively reviewing access reports this session will discuss methods to accomplish this important task.

Why should you attend: The HIPAA Security Management Standard is the foundation of the security rule and it requires organizations to - Implement procedures to regularly review records of information system activity, such as:

Audit logs;

Access Reports; and

Security incident tracking reports

In this session we will review what audit logs should be reviewed and why, how to review access reports and what construes a security incident and why and how an organization should review them. In addition, this session will discuss what information should be communicated to various levels within the organization. Security is everyone’s responsibility and understanding what can be reviewed and by whom is critical.

Areas Covered in the Session:

Why it is important to review this information

Who should be involved in this review

What information should be reviewed

How to obtain this information

Who Will Benefit:

Information Security Officers

IT Management

Compliance and Privacy Officers

Risk Managers

IT/IS Management and Staff

Contract Management Department

William Miaoulis CISA, CISM, is a senior healthcare information system (IS) professional with more than 20 years of healthcare Information Security experience. Bill is the founder and primary consultant for HSP Associates. Prior to starting HSP Associates in January of 2013, Bill was the Chief Information Security Officer (CISO) and led the HIPAA security and privacy consulting efforts for Phoenix Health Systems for over 11 years and also was the HIPAA Consulting Manager for SAIC for 18 months. For seven years, Miaoulis was the University of Alabama Birmingham (UAB) Medical Center’s Information Security Officer, where he instituted the first security and privacy programs at UAB starting in October 1992.

MentorHealth

Phone No: 800-385-1607

FaX: 302-288-6884

webinars@mentorhealth.com

Event Link: http://bit.ly/1cvopTU

http://www.mentorhealth.com/

Key Factors to Write HIPAA Compliance Policies
5/6/2014 10:00 AM - 11:31 AM
online event Fremont, California United States
Event Listing
Summary:

Overview: The webinar will explain the process for covered entities and business associates to use to draft, adopt, and implement HIPAA compliance policies. The webinar will begin with a discussion of how to decide, using a gap analysis and a risk analysis, what policies the organization needs, including required, addressable, and other policies. Then, the webinar will cover writing a policy. Writing a policy is easier than one may think. It is a three-step process: researching, drafting, and revising.

This webinar will teach you to ask questions, solicit help, collect samples, keep the principles of substance, organization, coherence, style, and correctness in mind while you are drafting, send your draft out for review, incorporate comments, implement the policy, and repeat as necessary. The prospect of developing and writing perhaps as many as 70 policies to attain HIPAA compliance may still seem daunting, but this webinar will teach you how to make a checklist, take it step by step, and enlist the help of others when you need it.

Why should you attend: The majority of the DHHS civil money penalties and settlements in lieu thereof involve, sometimes with other violations, failure to perform a written risk analysis, failure to develop required policies, and failure to conduct adequate HIPAA training. These penalties usually are in the seven-figure range.

Failure to conduct a written risk analysis, adopt required policies, or conduct required training qualifies as "willful neglect," which carries the highest civil money penalty ("CMP") and which penalty cannot be waived by DHHS as can violations due to a reasonable cause. DHHS entered into a settlement with Massachusetts General Hospital for $1 million for a breach involving leaving paper PHI records on a subway. The sanction was because Massachusetts General had not trained its workforce on proper security for PHI taken offsite and did not have a work-at-home policy. Significantly, HIPAA does not even mention working at home, much less specifically require such a policy.

Areas Covered in the Session:

Preliminaries

Learn how to decide which policies to write and adopt, using gap analysis and risk analysis

Learn which policies are required and which are addressable

Learn about other policies that your organization may need that are not mentioned in the HIPAA regulations but that organizations have nonetheless been fined for not having

Researching

Ask questions. Learn why you need to nail down the answers to at least 12 questions before you try to write a policy and how to do so

Solicit help. Learn whom to solicit help from both within and outside your organization and when and why and how

Collect samples. Learn what samples to collect and from whom

Drafting

Substance. Learn what substance means and how to achieve it

Organization. Learn how to draft a clear beginning, a clear middle, and a clear end

Coherence. Learn how to connect your ideas so that readers will not have to wonder where something came from or why

Style. Learn how to write for your target audience as simply and clearly as possible

Correctness. Learn how to get rid of the static in your writing

Revising

Review. Learn whom to contact to review your drafts

Incorporate. Learn how to resolve disputes and incorporate changes

Implement. Learn how to lay out a plan for implementation of the policy, including publishing, distribution, implementing (and perhaps even training the workforce on the policy), and schedule for annual review and revision, if necessary

Questions and answers

Who Will Benefit:

Compliance Director

CEO

CFO

Privacy Officer

Security Officer

Information Systems Manager

HIPAA Officer

Chief Information Officer

Health Information Manager

Healthcare Counsel/lawyer

Office Manager

Contracts Manager

Alice M. McCart has been an editor for more than three decades and an attorney admitted to practice law in Illinois since 1993. She has master’s degrees in teaching and journalism and enjoys freelance editing, tutoring, and teaching effective writing to adults. She has held positions in the federal government, in professional associations, in the corporate world, in private law practice, and in HIPAA consulting.

MentorHealth

Phone No: 800-385-1607

FaX: 302-288-6884

webinars@mentorhealth.com

Event Link: http://bit.ly/1kERG1f

http://www.mentorhealth.com/

Negligent Credentialing Strategies to Protect Your Health Care Entity
5/15/2014 10:00 AM - 11:00 AM
online event Fremont, California United States
Event Listing
Summary:

Overview: Hospitals, as corporate entities, have the ultimate responsibility for the quality of medical care provided in its facilities. This statement can be misleading, however, if one concludes that the hospital is liable for all acts of negligence or malpractice by a physician who practices at the hospital. In truth, the hospital must take reasonable steps:

To select a competent medical staff

To ensure that the individual physician on it staff performs only procedures for which he or she is qualified

To implement certain quality control measures to verify that only qualified practitioners remain on the staff and that quality care is provided in the institution

We will review the historical relationship between the physician and the hospital and, to see this relationship in the proper context, the roles each plays under the "corporate responsibility doctrine." We will also review the development of negligent credentialing and examine what actions should be taken to preclude liability for failure to properly credential practitioners.

Why should you attend: In a medical malpractice action, the plaintiff is looking for the defendant with deepest pocket for recovery. There is little question that hospitals have the deepest pocket. You should attend this program to learn how negligent credentialing develops and learn strategies to defend against it.

Areas Covered in the Session:

A brief history of peer review in hospitals

How the doctrine of corporate responsibility developed

Responsibility of the hospital for monitoring the care provided by physicians

What negligent credentialing is and how it developed

A brief review of state lawsuits involving negligent credentialing

Strategies that should be taken to preclude liability

Who Will Benefit:

Hospital Executives

Medical Staff Officers

Physicians who serve on peer review committees

Medical Staff

Support Staff

Attorneys representing Medical Staffs

William Mack Copeland MS, JD, PhD, LFACHE, practices health care law in Cincinnati at the firm of Copeland Law, LLC. He is also president of Executive & Managerial Development Group, a consulting entity providing compliance and other fraud and abuse related services. A graduate of Northern Kentucky University Salmon P. Chase College of Law, Bill is a frequent author and speaker on health law topics.

MentorHealth

Phone No: 800-385-1607

FaX: 302-288-6884

webinars@mentorhealth.com

Event Link: http://bit.ly/1jaANyP

http://www.mentorhealth.com/

Obstructive Sleep Apnea and the Perioperative Period Webinar By MentorHealth
5/13/2014 10:00 AM - 11:00 AM
online event Fremont, California United States
Event Listing
Summary:

Overview: The webinar focuses on the patient safety issues in patients with diagnosed or undiagnosed OSA undergoing surgery. We'll help you understand the risk factors for OSA and use appropriate screening tools can help identify undiagnosed cases.

Determining which patients and procedures can be safely managed in ambulatory settings vs. inpatient settings will be discussed. Anesthesia and intra-operative considerations will also be discussed. But most important will be the discussion on monitoring of OSA patients in the postoperative period. Monitoring OSA patients with pulse oximetry alone is insufficient and may give a false sense of security.

We use many case examples to illustrate the problems encountered in patients with OSA, including opioid-related events, hazards of supplemental oxygen, and others.

Why should you attend:

Are you aware of which patients have or might have OSA?

Are your patients with diagnosed or undiagnosed OSA at risk of dying?

Have you already had adverse events in patients with diagnosed or undiagnosed OSA?

Are you monitoring your at-risk patients correctly?

Does your staff fully understand the risks involved in patients with OSA?

Areas Covered in the Session:

Prevalence of OSA

Risk factors for OSA

Screening for OSA

Risks of OSA in the Perioperative Period

Inpatient vs. Ambulatory Surgery

Pre-operative Considerations

Operative Considerations

Anesthesia

Post-operative Management

Monitoring

Who Will Benefit:

Nurse Managers

Chief Nursing Officers

Nurses

Chief Medical Officers

Physicians

Patient Safety Officers

Quality Improvement Personnel

OR Staff

Risk Management Staff

Brad Truax, M.D is board-certified in both Neurology and Internal Medicine. He is a clinician and educator with 20+ years of experience in medical administration and has been involved in quality and patient safety for over 25 years. He has provided medical director services in a broad range of healthcare venues - a large public teaching hospital, a large private hospital, a small rural hospital, a managed care organization, and an accountable care organization (ACO). He was an original and long-standing member of the NYSDOH council that advised New York State’s hospital incident reporting system (NYPORTS).

MentorHealth

Phone No: 800-385-1607

FaX: 302-288-6884

webinars@mentorhealth.com

Event Link: http://bit.ly/1gJYjvp

http://www.mentorhealth.com/

Events Map