Loading…

To view more information visit here.




Welcome to the Healthcare Documentation Integrity Conference interactive schedule application, Sched! With Sched you can easily read session descriptions and speaker bios. Personalize Sched by creating a custom schedule based on the sessions you are interested in attending using the Sched website or mobile app. You can view your schedule as a simple list, detailed view, or grid view; sort by venue or session type; and identify each activity at a glance with Sched’s useful color-coding system. Once you are headed to or arrive at the conference, you can print or sync your schedule to your smart phone for easy viewing!

Sched even highlights friends and contacts also attending, so after you create a Sched profile, connect using your Facebook, Twitter, LinkedIn, and Foursquare accounts to network ahead of time.

Current information as of 5-29-2014; schedule subject to change.
Thursday, July 24 • 11:30am - 12:30pm
Shoring Up the Printer/Copier HIPAA Hazard

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

Data and document security are key concerns for any healthcare organization. Consider this: In 2010, CBS News purchased a copier formerly leased by a not-for-profit managed healthcare plan only to discover private medical information for more than 335,000 patients still stored on the hard drive. In August 2012, under a settlement with the U.S. Department of Health and Human Services, the plan paid over $1.2 million in damages for violating HIPAA Privacy and Security rules. In today's healthcare environment, how do organizations safeguard their multi-function devices (MFDs)—equipment that offers scanning, printing, copying, and faxing capabilities—and ensure they are compliant with the HIPAA/HITECH act, which mandates them to maintain and produce an audit trail so they can answer the questions who, what, when, where and why? During this session, we'll discuss how to protect printed and electronic protected health information against opportunistic or targeted threats, both internal and external. We'll outline common security concerns to consider and discuss how to protect your MFDs from physical as well as infrastructure security issues.

Learning Objectives:
1. Identify HIPAA/HITECH implications for MFDs in health care.
2. Summarize what you are required to provide should you be audited.
3. Describe the audit notification process and documentation submission
4. Define what policies and procedures need to be in place to safeguard medical information.  5. Explain the physical and infrastructure security actions you need to take, including authentication and encryption.

Credit: 1ML

Register Now!

Speakers
avatar for Kash Hatton

Kash Hatton

Manager, Technical Architect Solutions for Healthcare, Ricoh America
At Ricoh, Kash Hatton is manager of Technical Architect Solutions for Healthcare. He has more than 20 years' experience designing, developing, and managing technology as well as ensuring compliance with multiple regulations including HIPAA, the Payment Card Industry Data Security... Read More →
avatar for Nannette Sloan

Nannette Sloan

Nannette Sloan has 30 years of healthcare experience in acute, ambulatory, post-acute, home care, and long-term care on both the client and EMR vendor side with emphasis in regulatory and compliance, with her last 7 years focusing on all aspects of EMR application government certifications... Read More →


Thursday July 24, 2014 11:30am - 12:30pm PDT
Molise 3 The M Resort

Attendees (1)