10-01-13 | Blog Post
Online Tech is heading to Indy this Friday, October 4 to exhibit encrypted HIPAA hosting solutions at the 2013 Healthcare Compliance Association’s North Central Regional Compliance Conference. HCCA is a member-based organization for compliance professionals in the diverse healthcare field, including hospitals, group practices, home health, academic institutions, payor/managed care and more.
According to HCCA-Info.org, the event will draw healthcare compliance officers and risk managers; healthcare CEOs and CFOs; healthcare consultants and attorneys; privacy officers; health information management specialist; and physicians and other health professionals.
A few notable sessions include:
HITECH in Effect: A Look at the New Breach Analysis and Implementation of the New Rule
Speaker: Stacy Cook, Partner, Barnes & Thornburg
Description: As of September 23, 2013, the HITECH changes to HIPAA are in effect. One important change is the definition of a “breach” of unsecured protected health information (“PHI”). This presentation will take an in-depth look at the analysis and investigation required to determine whether a breach of unsecured protected health information has occurred under the new definition and will also provide a brief review
of the policies, procedures and tasks that should already be implemented following the September 23 enforcement date of the HITECH changes.
Data Mining to Stay Ahead of Government Investigations
Speaker: Jared Krawczyk, Mathematician, Fi-Med Managmenet Inc.
Description:
Cyber Compliance
Speaker: John Maynor, Director, PricewaterhouseCoopers
Description:
Learn more about the conference here. And see a list of our other upcoming events, including seminars and webinars, in our Events section.
HCCA has a number of regional conferences nationwide, including:
For more about health IT security, read our HIPAA Compliant Hosting white paper.
This white paper explores the impact of HITECH and HIPAA on data centers. It includes a description of a HIPAA compliant data center IT architecture, contractual requirements, benefits and risks of data center outsourcing, and vendor selection criteria.