Training

Governance , Privacy , Standards, Regulations & Compliance

HIPAA and HITECH Enforcement: How to Secure Health Information

HIPAA and HITECH Enforcement: How to Secure Health Information
New HIPAA Security Rule enforcement began in February 2010 under the HITECH Act. Healthcare providers and their business associates that fail to secure protected health information are now subject to new penalties. Register for this webinar to learn:
  • Strategies for protecting your patients and your business;
  • Best-practices from a veteran healthcare/security leader.

Background

After months of discussion, compliance time is here.

Security rules found under HIPAA now enforced by the HITECH Act enable state attorney general's offices to pursue civil charges on behalf of victims. HIPAA violations that result in a data breach are subject to fines of up to $1.5 million per year.

Faced with the looming threat of serious fines, healthcare providers, plan administrators and other business associates that handle private patient health information are seeking ways to become HIPAA compliant.

But where are the greatest vulnerabilities for healthcare organizations?

What must they do to protect their patients - and themselves?

Where can they pick up practical tips?

In this session, Rapid7, in conjunction with High Point Regional Health System, will spell out exactly how you can protect your patients and secure your business. Get first-hand info from Miles Romello, IT Security Coordinator at High Point Regional Health System.


Rapid7 is the leading provider of unified vulnerability management, compliance, and penetration testing solutions, delivering actionable intelligence about an organization's entire IT environment. Rapid7 offers the only integrated threat management solution that enables organizations to implement and maintain best practices and optimize their network security, Web application security and database security strategies.

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access
Have an account? Sign in.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.