PRIVACY + SECURITY TRAINING PROGRAM CATALOG
|
|
|
- Bernadette Tucker
- 10 years ago
- Views:
Transcription
1 PRIVACY + SECURITY TRAINING PROGRAM CATALOG
2 TeachPrivacy 261 Old York Rd., Suite 518 P.O. Box 706 Jenkintown, PA Phone: Fax: (215) DATA
3 ABOUT TEACHPRIVACY The TeachPrivacy Advantage Expertise Our training is created by Professor Daniel Solove, an internationallyknown expert in privacy and security. Interactive SCORM-compliant modules have interactive quizzes and activities. Topical We cover more than 50 topics, including HIPAA, FERPA, GLBA, phishing, passwords, portable devices, social media, and much more. Engaging Your workforce will want to take our training and they ll remember it. Short and Modular We have comprehensive courses and short individual modules on particular topics. Customizable We can customize anything TeachPrivacy was founded by Professor Daniel J. Solove, the John Marshall Harlan Research Professor of Law at the George Washington University Law School. He is also a Senior Policy Advisor at the law firm of Hogan Lovells. One of the world s leading experts in privacy law, Solove has authored nine books and more than forty articles. He is the lead author of the most widely-used textbook on information privacy law. He has given lectures around the world, testified before Congress, spoken at the Department of Homeland Security, U.S. Dep t of Education, FCC, FTC, the Library of Congress, and countless universities. Professor Solove has been interviewed and featured in several hundred media broadcasts and articles, including the New York Times, Wall Street Journal, Washington Post, Chicago Tribune, USA Today, AP, Time, Reader s Digest, ABC, CBS, NBC, CNN, and NPR.
4 OUR TRAINING 2 OUR TRAINING PHILOSOPHY I founded TeachPrivacy to create a new and fresh approach to training. Far too often, training is boring and obligatory, a check-the-box exercise like watching an airplane safety video. My goal is to make training engaging. Training should use the time-tested tools of effective education: stories, examples, and interactivity. Training should stimulate the senses. It should be fun, lively, and memorable. I am involved in all facets of the creation of our training. I believe people will learn more effectively when I can impart on them a genuine passion for the material. Professor Daniel J. Solove Professor Solove s knowledge of domestic and global privacy issues, including the often dynamic regulatory environments in Asia and Europe, is unmatched. Furthermore, his ability to take complex privacy issues and reduce them to simple, teachable concepts is exceptional. It is good to be working with the best in the privacy field! Steve Worster Chief Compliance Officer and HIPAA Privacy Officer StoneGate Senior Living, LLC In short, easily understood sessions, Professor Solove personally explains the concepts of information security and privacy in plain language. The excellent content combined with Solove s well-earned reputation make the TeachPrivacy series an essential part of an effective information security awareness program in any organization. Dennis Devlin Chief Information Security Officer, Chief Privacy Officer, and Senior VP of Privacy Practice, Savanture
5 Global Privacy and Data Protection Module ~ 25 mins Overview of privacy and data protection for the global organization. PRIVACY GLOBAL PRIVACY AND DATA PROTECTION COURSE OUTLINE THE PURPOSE OF THIS TRAINING People Care About Privacy Privacy and Security Your Role 3 Masterful synthesis of various privacy principles from regulation around the world covers the common core concepts and accounts for variation in approaches. Easy to customize. Anything can readily be changed, added, or removed. Easy to translate. All spoken text is written in the module, so translation can be without a voice track if desired to save on translation cost. WHY WE PROTECT PERSONAL DATA Respect Prevent Harm Individual Empowerment Trust Reputation Legal Compliance Contractual Compliance WHAT IS PERSONAL DATA? Identifying Personal Data or PII Sensitive Data DATA COLLECTION Lawful Data Collection Data Collection Limitation DATA DATA HANDLING AND PROCESSING Data Quality Limited Access Confidentiality Security Safeguards Data Retention USE OF PERSONAL DATA Minimum Necessary Use Purpose Specification INDIVIDUAL KNOWLEDGE AND PARTICIPATION Notice Access and Correction Consent TRANSFER AND SHARING OF DATA International Transfers of Data Sharing Data with Third Parties Sharing Data Internally ACCOUNTABILITY Accountability Personal Data Refers to Real People Privacy by Design Ask the Privacy Office
6 PRIVACY 4 Privacy Awareness Our general privacy awareness program, consisting of the following segments: Privacy Principles Nothing to Hide: Why Does Privacy Matter? The Relationship Between Privacy and Security 10 quiz questions ~ 15 mins European Union Privacy Law EU Data Protection Directive and the differences between EU and US privacy law (~ 9.5 mins) (abridged version ~ 6.5 mins) United States Privacy Law Types of US privacy law and common requirements (~ 6 mins) Global Privacy Law OECD Privacy Guidelines and the APEC Privacy Framework (~ 5.5 mins) The Safe Harbor Arrangement Derived from the EU Privacy Law program, this program provides a short introduction to the US-EU Safe Harbor Arrangement (~ 2 mins) Privacy by Design Advanced training for engineers, designers of programs/services, and policymakers. Identifies many privacy issues that should be considered (~ 15 mins)
7 PRIVACY 5 Privacy Principles Overview of the Fair Information Practice Principles (~ 6 mins) Nothing to Hide? Why Privacy Matters Why employees should care about protecting personal data (~ 6 mins) The Relationship Between Privacy and Security How data breaches are often caused by humans (~ 3 mins) The App from Hell Cartoon about the importance of privacy by design (~ 2 mins) The Data Misuse Nightmare Cartoon about harms caused by misusing data (~ 4 mins) What Is Personal Data? Defining personally identifiable information and data stewardship (~ 5.5 mins)
8 DATA SECURITY 6 Data Security Awareness Multi-topic course including: Data Security Overview 20-minute version Encryption available - all topics Passwords covered, but with Social Engineering abridged videos. Websites and Software 15 quiz questions. Data Disposal Physical Access Portable Devices and Remote Access Five Key Points for Data Security This course discusses five key points for data security: (1) data security involves you; (2) create powerful passwords; (3) click with caution; (4) keep data where it belongs; and (5) be vigilant (~ 7 mins) This program can be used for refresher training or data security awareness campaigns. It can also be used as a succinct introduction to a general data security training program. 15 quiz questions ~30 mins
9 DATA SECURITY 7 Condensed Version (~ 6 mins) We also offer a condensed version with abridged video content and 4 interactive quiz questions. Phishing Module ~12 mins Video Only ~ 8 mins Raises awareness about phishing and inform trainees about the dangers. Explains the warning signs to help trainees better spot phishing attempts, and it explains what people should do if they have any suspicions about an or phone call. The full-length course takes approximately 12 minutes to complete and contains a series of 3 short videos interspersed with 8 interactive quiz questions. This course can stand alone or can be snapped together with other topic segments. The full-length course is divided into three parts: (1) What Is Phishing? Discusses the dangers and types of phishing, including spear phishing and vishing (phishing via phone). (2) How Do You Spot a Phishing Attempt? Discusses the various warning signs to look out for. (3) What Should You Do When Things Seem Phishy? Discusses what people should do when they have questions or suspicions.
10 DATA SECURITY 8 Data Security Overview Security threats and why security is everyone s responsibility (~ 5 mins) Websites and Software Unauthorized software; detecting malicious websites (~ 4.5 mins) Physical Access Securing workspaces and locking unattended computers (4.5 mins) Passwords Selecting strong passwords (~ 6 mins) Encryption How encryption protects data (~ 4.5 mins) How to identify dubious links and attachments (~ 5.5 mins)
11 DATA SECURITY 9 Social Engineering Phishing, spear phishing, pretexting, and baiting (~5.5 mins) Data Disposal Disposing electronic data and paper documents (~3 mins) Portable Devices Dangers of putting sensitive data on portable devices. (~4 mins) Threats and Vulnerabilities Threats to data security and risky practices that lead to incidents (~3.5 mins) The Costs of Violations Describes the human, reputational, and financial costs of privacy and security violations (~4 mins) The Laptop that Traveled the World Cartoon about putting unencrypted data on a portable device (~ 3 mins) The from the IT Department Interactive cartoon about an from the IT department requesting a password (~ 3 mins) The Thumb Drive Discovery Interactive cartoon about finding an unknown USB drive (~ 3 mins)
12 HEALTHCARE DATA HIPAA HITECH 10 HIPAA Privacy for CEs Health Privacy Overview What Is PHI? Confidentiality and Snooping Minimum Necessary Rule Disclosures Personal Rights Authorizations Compliance Logs Enforcement 15 quiz questions ~40 mins or ~ 20 mins 20-minute version all topics covered, but with abridged videos, 10 quiz questions HIPAA Security for CEs and BAs Data Security Overview Encryption Passwords Websites and Software Data Disposal Physical Access Portable Devices Social Engineering Data Security Breach 15 quiz questions ~40 mins or ~ 20 mins 20-minute version all topics covered, but with abridged videos, 15 quiz questions HIPAA Overview Short basic overview of HIPAA. Contains a series of short videos with 8 interactive quiz questions mixed in. Topics: Scope PHI Responsibilities Use and Disclosure of PHI Patient Rights Security Enforcement Data Breach State Law 8 quiz questions ~ 15 mins A version for law firms is also available. HIPAA Privacy for BAs Health Privacy Overview What Is PHI? Business Associates Confidentiality and Snooping Minimum Necessary Rule Disclosures Compliance Logs Enforcement 15 quiz questions ~40 mins or ~ 20 mins 20-minute version all topics covered, but with abridged videos, 10 quiz questions
13 HEALTHCARE DATA HIPAA HITECH 11 Health Privacy: HIPAA and Beyond Basic overview of the privacy of healthcare data (~ 6 mins) What Is PHI? Definition of PHI (~ 6 mins) Confidentiality and Snooping The importance of not gossiping or snooping into PHI (~ 5 mins) Personal Rights HIPAA rights - notice, access, amendment, complaint (~ 4.5 mins) The Minimum Necessary Rule Overview of the rule and its exceptions (~ 6 mins) Compliance Logs Accounting for disclosures rule (~ 6 mins) Disclosure Mandatory disclosures and disclosures with and without authorization (~ 6.5 mins) Authorization Elements of a valid authorization (~4.5 mins) HIPAA Enforcement Penalties for violating HIPAA (~ 6mins)
14 HEALTHCARE DATA HIPAA HITECH 12 Business Associates Requirements for being a BA and how BAs are regulated (~ 6 mins) Research HIPAA and the Common Rule for research use of PHI (~ 7 mins) De-Identification Statistician and Safe Harbor methods (18 identifiers) (~5.5 mins) The HITECH Act Changes made to HIPAA by the HITECH Act/Omnibus Rule relevant to all employees (~ 4.5 mins) Texas Health Privacy Scope of Texas health law, access to records, enforcement, auditing, and breach notification (~ 5.5 mins) California Health Privacy Differences from HIPAA, access to records, enforcement, and data breach notification (~ 5.5 mins) Data Security Breach Threats to security and consequences of a breach (~ 5.5 mins)
15 HEALTHCARE DATA HIPAA HITECH HIPAA Security Overview Security threats and why security is everyone s responsibility (~ 5 mins) Websites and Software Unauthorized software; detecting malicious websites (~ 4.5 mins) Physical Access Securing workspaces and locking unattended computers (4.5 mins) Passwords Selecting strong passwords (~ 6 mins) Encryption How encryption protects data (~ 4.5 mins) How to identify dubious links and attachments (~ 5.5 mins) Social Engineering Phishing, spear phishing, pretexting, and baiting. (~5.5 mins) Data Disposal Disposing electronic data and paper documents.(~3 mins) Portable Devices Dangers of putting sensitive data on portable devices. (~4 mins)
16 FINANCIAL DATA GLBA 14 Financial Privacy Overview Briefly introduces the GLBA, FCRA, state laws, and data breach notification laws. How to protect financial data (~ 3.5 mins) Gramm-Leach-Bliley Act Scope, notice, confidentiality, data sharing, and security (~6.5 mins) Red Flags Red flags to look out for under the FTC Red Flags Rule. Interactive quiz questions ask trainees to identify red flags in various scenarios (~ 9 mins) COURSE OUTLINE Payment Card Data PCI The special ways that payment card data must be protected under the Payment Card Industry Data Security Standards (PCI DSS). How to identify the various types of payment card data; what data can be collected; how various types of payment data can be stored; the consequences of failing to follow the PCI standards; and various security practices that should be followed. 1. INTRODUCTION 2. PCI OVERVIEW Identifying Payment Card Data Threats Costs and Penalties 3. COLLECTION AND STORAGE OF PAYMENT CARD DATA Minimizing Collection Data Storage Physical Security Data Disposal 4. PROTECTING PAYMENT CARD DATA Passwords Protecting the Network Checking for Tampering 5. CONCLUSION 8 quiz questions ~ 16 mins
17 SOCIAL MEDIA 15 Facebook and the Mysterious Blue Disease Cartoon about posting personal data on a social media site Online Social Media Social media website privacy settings, the myth of total anonymity, the importance of expressly distinguishing personal versus employer views, and the danger of revealing details about a person even if that person isn t identified (~15 or ~ 10 min version available) General version and healthcare version available (~ 3 mins) General version and healthcare version available
18 EDUCATION DATA FERPA 16 FERPA for Higher Education Overview of FERPA to train faculty, administrators, and staff. (~ 15 mins) COURSE OUTLINE Cloud Computing in Education This video discusses the benefits and risks of educational institutions using cloud computing providers. Provides advice for how educational institutions should choose cloud providers, establish a relationship with them, and maintain that relationship with the appropriate protections for privacy and data security. (~ 6 mins) 1. FERPA S SCOPE Introduction What Does It Cover? What Isn t Covered? 2. FERPA RIGHTS AND ENFORCEMENT Who Has FERPA Rights? What Rights Does FERPA Provide? How Is FERPA Enforced? 3. CONFIDENTIALITY AND DISCLOSURE Confidentiality Directory Information Emergency Parents Other Instances 4. EXAMPLES Harassment Police Student in Distress Grades 5. CONCLUSION
19 Please contact us for an evaluation of our programs
20 261 Old York Rd., Suite 518 P.O. Box 706 Jenkintown, PA Phone: Fax: (215)
[Company Name] HIPAA Security Awareness and Workforce Training Program Manual
[Company Name] HIPAA Security Awareness and Workforce Training Program Manual The Importance of Security Awareness Training 4 Data Security Breaches 5 What is Information Security? 6 Roles and Responsibilities
HIPAA Privacy & Security Rules
HIPAA Privacy & Security Rules HITECH Act Applicability If you are part of any of the HIPAA Affected Areas, this training is required under the IU HIPAA Privacy and Security Compliance Plan pursuant to
HIPAA and Health Information Privacy and Security
HIPAA and Health Information Privacy and Security Revised 7/2014 What Is HIPAA? H Health I Insurance P Portability & A Accountability A - Act HIPAA Privacy and Security Rules were passed to protect patient
Network Security & Privacy Landscape
Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies
CSR Breach Reporting Service Frequently Asked Questions
CSR Breach Reporting Service Frequently Asked Questions Quick and Complete Reporting is Critical after Data Loss Why do businesses need this service? If organizations don t have this service, what could
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation
View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP A Note discussing written information security programs (WISPs)
Privacy Law Basics and Best Practices
Privacy Law Basics and Best Practices Information Privacy in a Digital World Stephanie Skaff [email protected] What Is Information Privacy? Your name? Your phone number or home address? Your email address?
Security Is Everyone s Concern:
Security Is Everyone s Concern: What a Practice Needs to Know About ephi Security Mert Gambito Hawaii HIE Compliance and Privacy Officer July 26, 2014 E Komo Mai! This session s presenter is Mert Gambito
Data Breach and Senior Living Communities May 29, 2015
Data Breach and Senior Living Communities May 29, 2015 Todays Objectives: 1. Discuss Current Data Breach Trends & Issues 2. Understanding Why The Senior Living Industry May Be A Target 3. Data Breach Costs
HIPAA and the HITECH Act Privacy and Security of Health Information in 2009
HIPAA and the HITECH Act Privacy and Security of Health Information in 2009 What is HIPAA? Health Insurance Portability & Accountability Act of 1996 Effective April 13, 2003 Federal Law HIPAA Purpose:
Protecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00)
Protecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00) May 15, 2009 LLP US Information Security Framework Historically industry-specific HIPAA Fair Credit Reporting
Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification
Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification Type of Policy and Procedure Comments Completed Privacy Policy to Maintain and Update Notice of Privacy Practices
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation
View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation MELISSA J. KRASNOW, DORSEY & WHITNEY LLP
plantemoran.com What School Personnel Administrators Need to know
plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of
HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist
HIPAA Omnibus Rule Overview Presented by: Crystal Stanton MicroMD Marketing Communication Specialist 1 HIPAA Omnibus Rule - Agenda History of the Omnibus Rule What is the HIPAA Omnibus Rule and its various
HIPAA Privacy and Information Security Management Briefing
HIPAA Privacy and Information Security Management Briefing Karen Pagliaro-Meyer Privacy Officer [email protected] (212) 305-7315 Soumitra Sengupta Information Security Officer [email protected] (212)
HIPAA TRAINING. A training course for Shiawassee County Community Mental Health Authority Employees
HIPAA TRAINING A training course for Shiawassee County Community Mental Health Authority Employees WHAT IS HIPAA? HIPAA is an acronym that stands for Health Insurance Portability and Accountability Act.
HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing
HIPAA Omnibus Rule Practice Impact Kristen Heffernan MicroMD Director of Prod Mgt and Marketing 1 HIPAA Omnibus Rule Agenda History of the Rule HIPAA Stats Rule Overview Use of Personal Health Information
Privacy Officer Job Description 4/28/2014. HIPAA Privacy Officer Orientation. Cathy Montgomery, RN. Presented by:
HIPAA Privacy Officer Orientation Presented by: Cathy Montgomery, RN Privacy Officer Job Description Serve as leader Develop Policies and Procedures Train staff Monitor activities Manage Business Associates
Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits
HIPAA Breaches, Security Risk Analysis, and Audits Derrick Hill Senior Health IT Advisor Kentucky REC Why Does Privacy and Security Matter? Trust Who Must Comply with HIPAA Rules? Covered Entities (CE)
Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches
Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches Speakers Phillip Long CEO at Business Information Solutions Art Gross President & CEO of HIPAA
Information Security Policy and Handbook Overview. ITSS Information Security June 2015
Information Security Policy and Handbook Overview ITSS Information Security June 2015 Information Security Policy Control Hierarchy System and Campus Information Security Policies UNT System Information
HIPAA: Privacy/Info Security
HIPAA: Privacy/Info Security Jeff Jones HIPAA Privacy Officer HIPAA Information Security Officer KY Region What you should know Discussion Topics Protected Health Security Awareness Information(PHI) Disclosure
ACCOUNTABLE HEALTHCARE IPA HIPAA PRIVACY AND SECURITY TRAINING. By: Jerry Jackson Compliance and Privacy Officer
ACCOUNTABLE HEALTHCARE IPA HIPAA PRIVACY AND SECURITY TRAINING By: Jerry Jackson Compliance and Privacy Officer 1 1 Introduction Welcome to Privacy and Security Training course. This course will help you
OCR UPDATE Breach Notification Rule & Business Associates (BA)
OCR UPDATE Breach Notification Rule & Business Associates (BA) Alicia Galan Supervisory Equal Opportunity Specialist March 7, 2014 HITECH OMNIBUS A Reminder of What s Included: Final Modifications of the
INFORMATION SECURITY FOR YOUR AGENCY
INFORMATION SECURITY FOR YOUR AGENCY Presenter: Chad Knutson Secure Banking Solutions, LLC CONTACT INFORMATION Dr. Kevin Streff Professor at Dakota State University Director - National Center for the Protection
HIPAA Compliance The Time is Now Changes on the Horizon: The Final Regulations on Privacy and Security. May 7, 2013
HIPAA Compliance The Time is Now Changes on the Horizon: The Final Regulations on Privacy and Security May 7, 2013 Presenters James Clay President Employee Benefits & HR Consulting The Miller Group [email protected]
Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style.
Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style March 27, 2013 www.mcguirewoods.com Introductions Holly Carnell McGuireWoods LLP
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Table of Contents Introduction... 1 1. Administrative Safeguards...
COMPLIANCE ALERT 10-12
HAWAII HEALTH SYSTEMS C O R P O R A T I O N "Touching Lives Every Day COMPLIANCE ALERT 10-12 HIPAA Expansion under the American Recovery and Reinvestment Act of 2009 The American Recovery and Reinvestment
Policy Implications: Privacy, Security and Liability Big Data in Telecom. June 7 2012 TIA 2012: INSIDE THE NETWORK Dallas TX
Policy Implications: Privacy, Security and Liability Big Data in Telecom June 7 2012 TIA 2012: INSIDE THE NETWORK Dallas TX Who We Are Leading trade association in support of information and communications
HIPAA Security Rule Compliance
HIPAA Security Rule Compliance Caryn Reiker MAXIS360 HIPAA Security Rule Compliance what is it and why you should be concerned about it Table of Contents About HIPAA... 2 Who Must Comply... 2 The HIPAA
Montclair State University. HIPAA Security Policy
Montclair State University HIPAA Security Policy Effective: June 25, 2015 HIPAA Security Policy and Procedures Montclair State University is a hybrid entity and has designated Healthcare Components that
Overview of the HIPAA Security Rule
Office of the Secretary Office for Civil Rights () Overview of the HIPAA Security Rule Office for Civil Rights Region IX Alicia Cornish, EOS Sheila Fischer, Supervisory EOS Topics Upon completion of this
The Practical Guide to HIPAA Privacy and Security Compliance
The Practical Guide to HIPAA Privacy and Security Compliance By Kevin Beaver and Rebecca Herold Published by Auerbach Publications in December 2003 TABLE OF CONTENTS SECTION 1 HIPAA ESSENTIALS 1 Introduction
2014 Core Training 1
2014 Core Training 1 Course Agenda Review of Key Privacy Laws/Regulations: Federal HIPAA/HITECH regulations State privacy laws Privacy & Security Policies & Procedures Huntsville Hospital Health System
Protecting personally identifiable information: What data is at risk and what you can do about it
Protecting personally identifiable information: What data is at risk and what you can do about it Virtually every organization acquires, uses and stores personally identifiable information (PII). Most
SANS Securing The Human
SANS Securing The Human Introduction Most organizations have invested in security technology to protect their information, putting in place solutions such as firewalls, encryption or IDS sensors. However,
CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. Email: [email protected] Phone: (336) 478-1131
CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION Robert N. Young, Director Carruthers & Roth, P.A. Email: [email protected] Phone: (336) 478-1131 TOPICS 1. Threats to your business s data 2. Legal obligations
Securing the FOSS VistA Stack HIPAA Baseline Discussion. Jack L. Shaffer, Jr. Chief Operations Officer
Securing the FOSS VistA Stack HIPAA Baseline Discussion Jack L. Shaffer, Jr. Chief Operations Officer HIPAA as Baseline of security: To secure any stack which contains ephi (electonic Protected Health
Online Lead Generation: Data Security Best Practices
Online Lead Generation: Data Security Best Practices Released September 2009 The IAB Online Lead Generation Committee has developed these Best Practices. About the IAB Online Lead Generation Committee:
Annual Compliance Training. HITECH/HIPAA Refresher
Annual Compliance Training HITECH/HIPAA Refresher January 2015 Sisters of Charity of Leavenworth Health System, Inc. All rights reserved. 1 Annual Refresher Training Welcome to the SCL Health System Compliance
Health Information Privacy Refresher Training. March 2013
Health Information Privacy Refresher Training March 2013 1 Disclosure There are no significant or relevant financial relationships to disclose. 2 Topics for Today State health information privacy law Federal
HIPAA Happenings in Hospital Systems. Donna J Brock, RHIT System HIM Audit & Privacy Coordinator
HIPAA Happenings in Hospital Systems Donna J Brock, RHIT System HIM Audit & Privacy Coordinator HIPAA Health Insurance Portability and Accountability Act of 1996 Title 1 Title II Title III Title IV Title
HIPAA Audit Risk Assessment - Risk Factors
I II Compliance Compliance I Compliance II SECTION ONE COVERED ENTITY RESPONSIBILITIES AREA ONE Notice of Privacy Practices 1 Is your full notice of privacy practices given to every new patient in your
HIPAA Compliance: Are you prepared for the new regulatory changes?
HIPAA Compliance: Are you prepared for the new regulatory changes? Baker Tilly CARIS Innovation, Inc. April 30, 2013 Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed
New HIPAA Breach Notification Rule: Know Your Responsibilities. Loudoun Medical Group Spring 2010
New HIPAA Breach Notification Rule: Know Your Responsibilities Loudoun Medical Group Spring 2010 Health Information Technology for Economic and Clinical Health Act (HITECH) As part of the Recovery Act,
Jeff M. Bauman, Psy.D. P.A. and Associates FLORIDA-HIPAA PRIVACY NOTICE FORM
Jeff M. Bauman, Psy.D. P.A. and Associates FLORIDA-HIPAA PRIVACY NOTICE FORM Notice of Psychologists Policies and Practices to Protect the Privacy of Your Health Information THIS NOTICE DESCRIBES HOW PSYCHOLOGICAL
When HHS Calls, Will Your Plan Be HIPAA Compliant?
When HHS Calls, Will Your Plan Be HIPAA Compliant? Petula Workman, J.D., CEBS Division Vice President Compliance Counsel Gallagher Benefit Services, Inc., Sugar Land, Texas The opinions expressed in this
8/3/2015. Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice
Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice Monday, August 3, 2015 1 How to ask a question during the webinar If you dialed in to this webinar on your phone
HIPAA Compliance. 2013 Annual Mandatory Education
HIPAA Compliance 2013 Annual Mandatory Education What is HIPAA? Health Insurance Portability and Accountability Act Federal Law enacted in 1996 that mandates adoption of Privacy protections for health
Taking a Data-Centric Approach to Security in the Cloud
Taking a Data-Centric Approach to Security in the Cloud Bob West Chief Trust Officer CipherCloud 2014 CipherCloud All rights reserved 1 Taking a Data-Centric Approach to Cloud Data Protection Bob West
Compliance Challenges. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard. Increased Audits & On-site Investigations
Enabling a HITECH & HIPAA Compliant Organization: Addressing Meaningful Use Mandates & Ensuring Audit Readiness Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard Compliance Mandates Increased
Secure File Sharing for HIPAA Compliance: Protecting PHI
A N A C C E L L I O N W H I T E P A P E R Secure File Sharing for HIPAA Compliance: Protecting PHI Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite 200 www.accellion.com
Who Should Know This Policy 2 Definitions 2 Contacts 3 Procedures 3 Forms 5 Related Documents 5 Revision History 5 FAQs 5
Information Security Policy Type: Administrative Responsible Office: Office of Technology Services Initial Policy Approved: 09/30/2009 Current Revision Approved: 08/10/2015 Policy Statement and Purpose
Hackers, Slackers & Packers: Preventing Data Loss & Dealing with the Inevitable. Data Breaches Are All Too Common
Hackers, Slackers & Packers: Preventing Data Loss & Dealing with the Inevitable Steven J. Fox ([email protected]) Peter D. Hardy ([email protected]) Robert Brandfass ([email protected]) (Mr. Brandfass
HIPAA Compliance Evaluation Report
Jun29,2016 HIPAA Compliance Evaluation Report Custom HIPAA Risk Evaluation provided for: OF Date of Report 10/13/2014 Findings Each section of the pie chart represents the HIPAA compliance risk determinations
New HIPAA regulations require action. Are you in compliance?
New HIPAA regulations require action. Are you in compliance? Mary Harrison, JD Tami Simon, JD May 22, 2013 Discussion topics Introduction Remembering the HIPAA Basics HIPAA Privacy Rules HIPAA Security
Dissecting New HIPAA Rules and What Compliance Means For You
Dissecting New HIPAA Rules and What Compliance Means For You A White Paper by Cindy Phillips of CMIT Solutions and Kelly McClendon of CompliancePro Solutions TABLE OF CONTENTS Introduction 3 What Are the
Faster, Smarter, More Secure: IT Services Geared for the Health Care Industry A White Paper by CMIT Solutions
Faster, Smarter, More Secure: IT Services Geared for the Health Care Industry A White Paper by CMIT Solutions Table of Contents Introduction... 3 1. Data Backup: The Most Critical Part of any IT Strategy...
Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy
Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy I. PURPOSE To identify the requirements needed to comply with
SECURITY RISK ASSESSMENT SUMMARY
Providers Business Name: Providers Business Address: City, State, Zip Acronyms NIST FIPS PHI EPHI BA CE EHR HHS IS National Institute of Standards and Technology Federal Information Process Standards Protected
12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule
HIPAA More Important Than You Realize J. Ira Bedenbaugh Consulting Shareholder February 20, 2015 This material was used by Elliott Davis Decosimo during an oral presentation; it is not a complete record
HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY
HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY Illinois Department of Healthcare and Family Services Training Outline: Training Goals What is the HIPAA Security Rule? What is the HFS Identity
Legal Ethics in the Information Age: Unique Data Privacy Issues Faced by Law Firms. v2.18.11, rev
Legal Ethics in the Information Age: Unique Data Privacy Issues Faced by Law Firms v2.18.11, rev 1 Presenters Joseph DeMarco, Partner DeVore & DeMarco, LLP Lauren Shy, Assistant General Counsel Fragomen,
HIPAA and Mental Health Privacy:
HIPAA and Mental Health Privacy: What Social Workers Need to Know Presenter: Sherri Morgan, JD, MSW Associate Counsel, NASW Legal Defense Fund and Office of Ethics & Professional Review 2010 National Association
Privacy & Information Security Training. For Health Science Workforce Members
Privacy & Information Security Training For Health Science Workforce Members Privacy Program, 4/6/2015 Objectives Understand what information must be protected under state and federal privacy laws Understand
Privacy Compliance Health Occupations Students
Privacy Compliance Health Occupations Students Health Occupations Students The information in this power point is the same information provided to new SCHS caregivers at their orientation. We cannot stress
